{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:11Z","timestamp":1773615611814,"version":"3.50.1"},"reference-count":56,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700822","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:52Z","timestamp":1741962172000},"page":"1192-1203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Segmenting Input Data to Improve the Quality of Identification of Information Security Events"],"prefix":"10.3103","volume":"58","author":[{"given":"M. E.","family":"Sukhoparov","sequence":"first","affiliation":[]},{"given":"I. S.","family":"Lebedev","sequence":"additional","affiliation":[]},{"given":"D. D.","family":"Tikhonov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7781_CR1","doi-asserted-by":"publisher","first-page":"8654","DOI":"10.3390\/app12178654","volume":"12","author":"Yu. Zhang","year":"2022","unstructured":"Zhang, Yu., Liu, J., and Shen, W., A review of ensemble learning algorithms used in remote sensing applications, Appl. Sci., 2022, vol. 12, no. 17, p. 8654. https:\/\/doi.org\/10.3390\/app12178654","journal-title":"Appl. Sci."},{"key":"7781_CR2","doi-asserted-by":"publisher","unstructured":"Ivanov, D., Kalinin, M., Krundyshev, V., and Orel, E., Automatic security management of smart infrastructures using attack graph and risk analysis, 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020. https:\/\/doi.org\/10.1109\/worlds450073.2020.9210410","DOI":"10.1109\/worlds450073.2020.9210410"},{"key":"7781_CR3","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., The security risk analysis methodology for smart network environments, 2020 International Russian Automation Conference (RusAutoCon), Sochi, 2020, IEEE, 2020, pp. 437\u2013442. https:\/\/doi.org\/10.1109\/rusautocon49822.2020.9208116","DOI":"10.1109\/rusautocon49822.2020.9208116"},{"key":"7781_CR4","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Prevention of cyber attacks in smart manufacturing applying modern neural network methods, IOP Conf. Ser.: Mater. Sci. Eng., 2020, vol. 940, no. 1, p. 012011. https:\/\/doi.org\/10.1088\/1757-899x\/940\/1\/012011","DOI":"10.1088\/1757-899x\/940\/1\/012011"},{"key":"7781_CR5","doi-asserted-by":"publisher","first-page":"78","DOI":"10.3390\/machines9040078","volume":"9","author":"M. Kalinin","year":"2021","unstructured":"Kalinin, M., Krundyshev, V., and Zegzhda, P., Cybersecurity risk assessment in smart city infrastructures, Machines, 2021, vol. 9, no. 4, p. 78. https:\/\/doi.org\/10.3390\/machines9040078","journal-title":"Machines"},{"key":"7781_CR6","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M., Zeghda, D., and Kalinin, M., Technology for developing a unified security policy in heterogeneous big data systems, 2024 International Conference on Information Processes and Systems Development and Quality Assurance (IPS), St. Petersburg, 2024, IEEE, 2024, pp. 43\u201346. https:\/\/doi.org\/10.1109\/ips62349.2024.10499286","DOI":"10.1109\/ips62349.2024.10499286"},{"key":"7781_CR7","doi-asserted-by":"publisher","first-page":"8724","DOI":"10.3390\/s23218724","volume":"23","author":"M. Kalinin","year":"2023","unstructured":"Kalinin, M., Zavadskii, E., and Busygin, A., A graph-based technique for securing the distributed cyber-physical system infrastructure, Sensors, 2023, vol. 23, no. 21, p. 8724. https:\/\/doi.org\/10.3390\/s23218724","journal-title":"Sensors"},{"key":"7781_CR8","unstructured":"Lebedev, I.S. and Borisov, Yu.B., Formalization models of natural-language messages in information security monitoring systems of open computer networks, Informatsionno-Upravlyayushchie Sistemy, 2011, no. 2, pp. 37\u201343."},{"key":"7781_CR9","doi-asserted-by":"publisher","first-page":"126040","DOI":"10.1109\/access.2023.3327637","volume":"11","author":"N. Liu","year":"2023","unstructured":"Liu, N. and Zhao, J., Streaming data classification based on hierarchical concept drift and online ensemble, IEEE Access, 2023, vol. 11, pp. 126040\u2013126051. https:\/\/doi.org\/10.1109\/access.2023.3327637","journal-title":"IEEE Access"},{"key":"7781_CR10","unstructured":"Pechenkin, A.I. and Zegzhda, D.P., Application of machine learning and intelligent analysis methods in information security tasks, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2017, no. 26, p. 48."},{"key":"7781_CR11","doi-asserted-by":"publisher","first-page":"107632","DOI":"10.1016\/j.knosys.2021.107632","volume":"235","author":"G. Zhong","year":"2022","unstructured":"Zhong, G., Shu, T., Huang, G., and Yan, X., Multi-view spectral clustering by simultaneous consensus graph learning and discretization, Knowl.-Based Syst., 2022, vol. 235, no. 4, p. 107632. https:\/\/doi.org\/10.1016\/j.knosys.2021.107632","journal-title":"Knowl.-Based Syst."},{"key":"7781_CR12","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1007\/s10618-023-00931-x","volume":"37","author":"H.O. Marques","year":"2023","unstructured":"Marques, H.O., Swersky, L., Sander, J., Campello, R.J.G.B., and Zimek, A., On the evaluation of outlier detection and one-class classification: a comparative study of algorithms, model selection, and ensembles, Data Min. Knowl. Discovery, 2023, vol. 37, no. 4, pp. 1473\u20131517. https:\/\/doi.org\/10.1007\/s10618-023-00931-x","journal-title":"Data Min. Knowl. Discovery"},{"key":"7781_CR13","doi-asserted-by":"publisher","unstructured":"Lebedev, I.S., Adaptive application of machine learning methods on separate segments of a data sample in regression and classfication problems, Informatsionno-Upravlyayushchie Sistemy, 2022, no. 3, pp. 20\u201330. https:\/\/doi.org\/10.31799\/1684-8853-2022-3-20-30","DOI":"10.31799\/1684-8853-2022-3-20-30"},{"key":"7781_CR14","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.3390\/sym14102208","volume":"14","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Ovasapyan, T., and Poltavtseva, M., Application of the learning automaton model for ensuring cyber resiliency, Symmetry, 2022, vol. 14, no. 10, p. 2208. https:\/\/doi.org\/10.3390\/sym14102208","journal-title":"Symmetry"},{"key":"7781_CR15","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11416-022-00435-0","volume":"19","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M. and Krundyshev, V., Security intrusion detection using quantum machine learning techniques, J.\u00a0Comput. Virol. Hacking Tech., 2022, vol. 19, no. 1, pp. 125\u2013136. https:\/\/doi.org\/10.1007\/s11416-022-00435-0","journal-title":"J.\u00a0Comput. Virol. Hacking Tech."},{"key":"7781_CR16","doi-asserted-by":"publisher","unstructured":"Cho, H., Andreev, A., Kalinin, M., Moskvin, D., and Zegzhda, D., Mismatch-resistant intrusion detection with bioinspired suffix tree algorithm, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungvari, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 1\u201316. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_1","DOI":"10.1007\/978-3-030-93872-7_1"},{"key":"7781_CR17","doi-asserted-by":"publisher","unstructured":"Kalinin, M.O. and Krundyshev, V.M., Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions, 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2021, IEEE, 2021, pp. 118\u2013122. https:\/\/doi.org\/10.1109\/worlds451998.2021.9514004","DOI":"10.1109\/worlds451998.2021.9514004"},{"key":"7781_CR18","doi-asserted-by":"publisher","first-page":"820","DOI":"10.15622\/IA.20.4.3","volume":"20","author":"D.P. Zegzhda","year":"2021","unstructured":"Zegzhda, D.P., Kalinin, M.O., Krundyshev, V.M., Lavrova, D.S., Moskvin, D.A., and Pavlenko, E.Yu., Application of bioinformatics algorithms for polymorphic cyberattacks detection, Informatika i Avtomatizatsiya, 2021, vol. 20, no. 4, pp. 820\u2013844. https:\/\/doi.org\/10.15622\/IA.20.4.3","journal-title":"Informatika i Avtomatizatsiya"},{"key":"7781_CR19","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., Belenko, V., and Chernenko, V., Detection and prediction of safety faults in inter-device networks applying a set of data-driven methods, Proceedings of International Scientific Conference on Telecommunications, Computing and Control, Voinov, N., Schreck, T., and Khan, S., Eds., Smart Innovation, Systems and Technologies, vol. 220, Singapore: Springer, 2021, pp. 15\u201325. https:\/\/doi.org\/10.1007\/978-981-33-6632-9_2","DOI":"10.1007\/978-981-33-6632-9_2"},{"key":"7781_CR20","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Generative adversarial network for detecting cyber threats in industrial systems, Proceedings of International Scientific Conference on Telecommunications, Computing and Control, Voinov, N., Schreck, T., and Khan, S., Eds., Smart Innovation, Systems and Technologies, vol. 220, Singapore: Springer, 2021, pp. 1\u201313. https:\/\/doi.org\/10.1007\/978-981-33-6632-9_1","DOI":"10.1007\/978-981-33-6632-9_1"},{"key":"7781_CR21","doi-asserted-by":"publisher","unstructured":"Cho, H., Lim, S., Kalinin, M., Krundyshev, V., Belenko, V., and Chernenko, V., Genetic sequence alignment computing for ensuring cyber security of the IoT systems, Sustainable Intelligent Systems, Joshi, A., Nagar, A.K., and Marin-Raventos, G., Eds., Advances in Sustainability Science and Technology, Singapore: Springer, 2021, pp. 235\u2013252. https:\/\/doi.org\/10.1007\/978-981-33-4901-8_14","DOI":"10.1007\/978-981-33-4901-8_14"},{"key":"7781_CR22","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Prevention of cyber attacks in smart manufacturing applying modern neural network methods, IOP Conf. Ser.: Mater. Sci. Eng., 2020, vol. 940, no. 1, p. 012011. https:\/\/doi.org\/10.1088\/1757-899x\/940\/1\/012011","DOI":"10.1088\/1757-899x\/940\/1\/012011"},{"key":"7781_CR23","doi-asserted-by":"publisher","first-page":"397","DOI":"10.33581\/1561-4085-2020-23-4-397-404","volume":"23","author":"M. Kalinin","year":"2020","unstructured":"Kalinin, M. and Krundyshev, V., Sequence alignment algorithms for intrusion detection in the Internet of Things, Nonlinear Phenom. Complex Syst., 2020, vol. 23, no. 4, pp. 397\u2013404. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-4-397-404","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7781_CR24","doi-asserted-by":"publisher","first-page":"850","DOI":"10.3103\/s014641162008009x","volume":"54","author":"A.G. Busygin","year":"2020","unstructured":"Busygin, A.G. and Konoplev, A.S., Blockchain based system model for assessment of security against threats caused by uneven distribution of computational power, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp.\u00a0850\u2013853. https:\/\/doi.org\/10.3103\/s014641162008009x","journal-title":"Autom. Control Comput. Sci."},{"key":"7781_CR25","doi-asserted-by":"publisher","first-page":"5409","DOI":"10.1109\/tcyb.2019.2962584","volume":"51","author":"D. Guijo-Rubio","year":"2020","unstructured":"Guijo-Rubio, D., Duran-Rosal, A.M., Gutierrez, P.A., Troncoso, A., and Hervas-Martinez, C., Time-series clustering based on the characterization of segment typologies, IEEE Trans. Cybern., 2020, vol. 51, no. 11, pp.\u00a05409\u20135422. https:\/\/doi.org\/10.1109\/tcyb.2019.2962584","journal-title":"IEEE Trans. Cybern."},{"key":"7781_CR26","unstructured":"Kalinin, M.O. and Shterenberg, S.I., The analysis of information security of the enterprise on the basis of monitoring of information resources with use of machine learning, Intellektual\u2019nye Tekhnologii na Transporte, 2018, no. 3, pp. 47\u201354."},{"key":"7781_CR27","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/2333401","volume":"42","author":"E.S. Page","year":"1955","unstructured":"Page, E.S., A test for a change in a parameter occurring at an unknown point, Biometrika, 1955, vol. 42, no. 3\/4, pp. 523\u2013527. https:\/\/doi.org\/10.2307\/2333401","journal-title":"Biometrika"},{"key":"7781_CR28","doi-asserted-by":"publisher","first-page":"789","DOI":"10.2307\/2281952","volume":"53","author":"W.D. Fisher","year":"1958","unstructured":"Fisher, W.D., On grouping for maximum homogeneity, J. Am. Stat. Assoc., 1958, vol. 53, no. 284, pp. 789\u2013798. https:\/\/doi.org\/10.2307\/2281952","journal-title":"J. Am. Stat. Assoc."},{"key":"7781_CR29","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1145\/366573.366611","volume":"4","author":"R. Bellman","year":"1961","unstructured":"Bellman, R., On the approximation of curves by line segments using dynamic programming, Commun. ACM, 1961, vol. 4, no. 6, pp. 284\u2013301. https:\/\/doi.org\/10.1145\/366573.366611","journal-title":"Commun. ACM"},{"key":"7781_CR30","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.3390\/sym13122453","volume":"13","author":"D. Zegzhda","year":"2021","unstructured":"Zegzhda, D., Pavlenko, E., and Aleksandrova, E., Modelling artificial immunization processes to counter cyberthreats, Symmetry, 2021, vol. 13, no. 12, p. 2453. https:\/\/doi.org\/10.3390\/sym13122453","journal-title":"Symmetry"},{"key":"7781_CR31","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1214\/16-ba998","volume":"12","author":"L. Bardwell","year":"2017","unstructured":"Bardwell, L. and Fearnhead, P., Bayesian detection of abnormal segments in multiple time series, Bayesian Anal., 2017, vol. 12, no. 1, pp. 193\u2013218. https:\/\/doi.org\/10.1214\/16-ba998","journal-title":"Bayesian Anal."},{"key":"7781_CR32","unstructured":"Melnyk, I. and Banerjee, A., A spectral algorithm for inference in hidden semi-Markov models, J. Mach. Learn. Res., 2017, no. 18, pp. 1\u201339."},{"key":"7781_CR33","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/TEVC.2004.832863","volume":"8","author":"F.-L. Chung","year":"2004","unstructured":"Chung, F.-L., Fu, T.-C., Ng, V., and Luk, R.W.P., An evolutionary approach to pattern-based time series segmentation, IEEE Trans. Evol. Comput., 2004, vol. 8, no. 5, pp. 471\u2013489. https:\/\/doi.org\/10.1109\/TEVC.2004.832863","journal-title":"IEEE Trans. Evol. Comput."},{"key":"7781_CR34","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1016\/j.patrec.2009.05.013","volume":"30","author":"V.S. Tseng","year":"2009","unstructured":"Tseng, V.S., Chen, C.-H., Huang, P.-C., and Hong, T.-P., Cluster-based genetic segmentation of time series with DWT, Pattern Recognit. Lett., 2009, vol. 30, no. 13, pp. 1190\u20131197. https:\/\/doi.org\/10.1016\/j.patrec.2009.05.013","journal-title":"Pattern Recognit. Lett."},{"key":"7781_CR35","doi-asserted-by":"publisher","first-page":"1919","DOI":"10.1007\/s00382-014-2405-0","volume":"44","author":"A. Nikolaou","year":"2015","unstructured":"Nikolaou, A., Guti\u00e9rrez, P.A., Dur\u00e1n, A., Dicaire, I., Fern\u00e1ndez-Navarro, F., and Herv\u00e1s-Mart\u00ednez, C., Detection of early warning signals in paleoclimate data using a genetic time series segmentation algorithm, Clim. Dyn., 2015, vol. 44, nos. 7\u20138, pp. 1919\u20131933. https:\/\/doi.org\/10.1007\/s00382-014-2405-0","journal-title":"Clim. Dyn."},{"key":"7781_CR36","doi-asserted-by":"publisher","first-page":"803","DOI":"10.3103\/s0146411620080027","volume":"54","author":"E.B. Aleksandrova","year":"2020","unstructured":"Aleksandrova, E.B., Shtyrkina, A.A., and Yarmak, A.V., Isogeny-based cryptographic access control, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 803\u2013812. https:\/\/doi.org\/10.3103\/s0146411620080027","journal-title":"Autom. Control Comput. Sci."},{"key":"7781_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b71620","volume-title":"Minimum message length segmentation, Research and Development in Knowledge Discovery and Data Mining","author":"J.J. Oliver","year":"1998","unstructured":"Oliver, J.J., Baxter, R.A., and Wallace, C.S., Minimum message length segmentation, Research and Development in Knowledge Discovery and Data Mining, Wu, X., Kotagiri, R., and Korb, K.B., Eds., Lecture Notes in Computer Science, vol. 1394, Berlin: Springer, 1998, pp. 222\u2013233."},{"key":"7781_CR38","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1109\/tpami.2010.44","volume":"32","author":"E. Fuchs","year":"2010","unstructured":"Fuchs, E., Gruber, T., Nitschke, J., and Sick, B., Online segmentation of time series based on polynomial least-squares approximations, IEEE Trans. Pattern Anal. Mach. Intell., 2010, vol. 32, no. 12, pp. 2232\u20132245. https:\/\/doi.org\/10.1109\/tpami.2010.44","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"7781_CR39","doi-asserted-by":"publisher","first-page":"8654","DOI":"10.3390\/app12178654","volume":"12","author":"Yu. Zhang","year":"2022","unstructured":"Zhang, Yu., Liu, J., and Shen, W., A review of ensemble learning algorithms used in remote sensing applications, Appl. Sci., 2022, vol. 12, no. 17, p. 8654. https:\/\/doi.org\/10.3390\/app12178654","journal-title":"Appl. Sci."},{"key":"7781_CR40","doi-asserted-by":"publisher","first-page":"113406","DOI":"10.1016\/j.eswa.2020.113406","volume":"152","author":"B. Trevizan","year":"2020","unstructured":"Trevizan, B., Chamby-Diaz, J., Bazzan, A.L.C., and Recamonde-Mendoza, M., A comparative evaluation of aggregation methods for machine learning over vertically partitioned data, Expert Syst. Appl., 2020, vol. 152, no.\u00a02, p. 113406. https:\/\/doi.org\/10.1016\/j.eswa.2020.113406","journal-title":"Expert Syst. Appl."},{"key":"7781_CR41","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M.A. and Kalinin, M.O., Conceptual data modeling using aggregates to ensure large-scale distributed data management systems security, Intelligent Distributed Computing XIII. IDC 2019, Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., and Ivanovic, M., Eds., Studies in Computational Intelligence, vol. 868, Cham: Springer, 2020, pp. 41\u201347. https:\/\/doi.org\/10.1007\/978-3-030-32258-8_5","DOI":"10.1007\/978-3-030-32258-8_5"},{"key":"7781_CR42","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/s00607-019-00768-7","volume":"102","author":"Sh. Wang","year":"2020","unstructured":"Wang, Sh., Zhou, W., and Jiang, Ch., A survey of word embeddings based on deep learning, Computing, 2020, vol. 102, no. 3, pp. 717\u2013740. https:\/\/doi.org\/10.1007\/s00607-019-00768-7","journal-title":"Computing"},{"key":"7781_CR43","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1049\/cdt2.12051","volume":"17","author":"M. Vousden","year":"2023","unstructured":"Vousden, M., Morris, J., Mclachlan Bragg, G., Beaumont, J., Rafiev, A., Luk, W., Thomas, D., and Brown, A., Event-based high throughput computing: A series of case studies on a massively parallel softcore machine, IET Comput. Digital Tech., 2023, vol. 17, no. 1, pp. 29\u201342. https:\/\/doi.org\/10.1049\/cdt2.12051","journal-title":"IET Comput. Digital Tech."},{"key":"7781_CR44","doi-asserted-by":"publisher","first-page":"29169","DOI":"10.1007\/s10489-023-04794-z","volume":"53","author":"J. Huang","year":"2023","unstructured":"Huang, J., Chen, P., Lu, L., Deng, Yu., and Zou, Q., WCDForest: A weighted cascade deep forest model toward the classification tasks, Appl. Intell., 2023, vol. 53, no. 23, pp. 29169\u201329182. https:\/\/doi.org\/10.1007\/s10489-023-04794-z","journal-title":"Appl. Intell."},{"key":"7781_CR45","doi-asserted-by":"publisher","unstructured":"Deng, R., Bao, F., and Wang, G., Privacy-preserving support vector machines with flexible deployment and error correction, Information Security Practice and Experience, Deng, R., Bao, F., Wang, G., Shen, J., Ryan, M., Meng, W., and Wang, D., Eds., Lecture Notes in Computer Science, vol. 13107, Cham: Springer, 2021, pp. 242\u2013262. https:\/\/doi.org\/10.1007\/978-3-030-93206-0_15","DOI":"10.1007\/978-3-030-93206-0_15"},{"key":"7781_CR46","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.3103\/s0146411621080198","volume":"55","author":"I.I. Marshev","year":"2021","unstructured":"Marshev, I.I., Zhukovskii, E.V., and Aleksandrova, E.B., Protection against adversarial attacks on malware detectors using machine learning algorithms, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1025\u20131028. https:\/\/doi.org\/10.3103\/s0146411621080198","journal-title":"Autom. Control Comput. Sci."},{"key":"7781_CR47","doi-asserted-by":"publisher","unstructured":"Brown, A.D., Beaumont, J.R., Thomas, D.B., Shillcock, J.C., Naylor, M.F., Bragg, G.M., Vousden, M.L., Moore, S.W., and Fleming, Sh.T., POETS: An event-driven approach to dissipative particle dynamics: Implementing a massively compute-intensive problem on a novel hard\/software architecture, ACM Trans. Parallel Comput., 2023, vol. 10, no. 2. https:\/\/doi.org\/10.1145\/3580372","DOI":"10.1145\/3580372"},{"key":"7781_CR48","unstructured":"Zegzhda, D.P. and Gololobov, N.V., Defense against data poisoning attack based on neural network with long short-term memory, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2023, no. 32, pp.\u00a015\u201316."},{"key":"7781_CR49","doi-asserted-by":"publisher","first-page":"012006","DOI":"10.1088\/1742-6596\/1924\/1\/012006","volume":"1924","author":"X. Zhang","year":"2021","unstructured":"Zhang, X. and Wang, M., Weighted random forest algorithm based on Bayesian algorithm, J. Phys.: Conf. Ser., 2021, vol. 1924, no. 1, p. 012006. https:\/\/doi.org\/10.1088\/1742-6596\/1924\/1\/012006","journal-title":"J. Phys.: Conf. Ser."},{"key":"7781_CR50","unstructured":"Sukhoparov, M.E., Semenov, V.V., and Lebedev, I.S., Information security monitoring of cyberphysical system elements using artificial nonironic networks, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2018, no. 27, pp. 59\u201360."},{"key":"7781_CR51","doi-asserted-by":"publisher","first-page":"858282","DOI":"10.3389\/fpubh.2022.858282","volume":"10","author":"S. Mishra","year":"2022","unstructured":"Mishra, S., Shaw, K., Mishra, D., Patil, Sh., Kotecha, K., Kumar, S., and Bajaj, S., Improving the accuracy of ensemble machine learning classification models using a novel bit-fusion algorithm for healthcare AI systems, Front. Public Health, 2022, vol. 10, p. 858282. https:\/\/doi.org\/10.3389\/fpubh.2022.858282","journal-title":"Front. Public Health"},{"key":"7781_CR52","unstructured":"Ognev, R.A., Zegzhda, D.P., and Zhukovskii, E.V., Assessing the resilience of machine learning models to adversarial attacks under incomplete information conditions, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2022, no. 31, pp. 51\u201353."},{"key":"7781_CR53","doi-asserted-by":"publisher","first-page":"704","DOI":"10.28991\/esj-2023-07-03-03","volume":"7","author":"I.S. Lebedev","year":"2023","unstructured":"Lebedev, I.S. and Sukhoparov, M.E., Adaptive learning and integrated use of information flow forecasting methods, Emerging Science Journal, 2023, vol. 7, no. 3, pp. 704\u2013723. https:\/\/doi.org\/10.28991\/esj-2023-07-03-03","journal-title":"Emerging Science Journal"},{"key":"7781_CR54","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s42524-020-0112-6","volume":"7","author":"Sh. Si","year":"2020","unstructured":"Si, Sh., Zhao, J., Cai, Zh., and Dui, H., Recent advances in system reliability optimization driven by importance measures, Front. Eng. Manage., 2020, vol. 7, no. 3, pp. 335\u2013358. https:\/\/doi.org\/10.1007\/s42524-020-0112-6","journal-title":"Front. Eng. Manage."},{"key":"7781_CR55","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1007\/s11135-020-01037-y","volume":"55","author":"G. Di Franco","year":"2020","unstructured":"Di Franco, G. and Santurro, M., Machine learning, artificial neural networks and social research, Quality & Quantity, 2020, vol. 55, no. 3, pp. 1007\u20131025. https:\/\/doi.org\/10.1007\/s11135-020-01037-y","journal-title":"Quality & Quantity"},{"key":"7781_CR56","doi-asserted-by":"publisher","first-page":"3419","DOI":"10.1109\/tkde.2021.3138962","volume":"35","author":"W. Tong","year":"2023","unstructured":"Tong, W., Wang, Yu., and Liu, D., An adaptive clustering algorithm based on local-density peaks for imbalanced data without parameters, IEEE Trans. Knowl. Data Eng., 2023, vol. 35, no. 4, pp. 3419\u20133432. https:\/\/doi.org\/10.1109\/tkde.2021.3138962","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700822.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700822","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700822.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:15Z","timestamp":1773612135000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700822"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":56,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7781"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700822","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"11 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}