{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:49Z","timestamp":1773615649994,"version":"3.50.1"},"reference-count":18,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700858","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:05Z","timestamp":1741962185000},"page":"1218-1225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Attacks Using Artificial Neural Networks"],"prefix":"10.3103","volume":"58","author":[{"given":"I. A.","family":"Sikarev","sequence":"first","affiliation":[]},{"given":"T. M.","family":"Tatarnikova","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7784_CR1","unstructured":"GOST R (State Standard) 53114-2008: Protection of information. Information security provision in organization. Basic terms and definitions, Moscow: Standartinform, 2009."},{"key":"7784_CR2","unstructured":"Landscape of treats for industrial automation systems, Kaspersky Lab ICS CERT. https:\/\/icscert.kaspersky.ru\/reports\/2018\/03\/26\/threat-landscape-for-industrial-automationsystems-in-h2-2017\/#_Toc508825260. Cited Jun 20, 2023."},{"key":"7784_CR3","doi-asserted-by":"publisher","unstructured":"Pavlenko, E. and Poltavtseva, M., Mathematical methods for implementing homeostatic control in digital production systems, Technological Transformation: A New Role For Human, Machines And Management, Schaumburg, H., Korablev, V., and Ungvari, L., Eds., Lecture Notes in Networks and Systems, vol. 157, Cham: Springer, 2021, pp. 1\u20139. https:\/\/doi.org\/10.1007\/978-3-030-64430-7_1","DOI":"10.1007\/978-3-030-64430-7_1"},{"key":"7784_CR4","first-page":"909","volume":"68","author":"M. Kalinin","year":"2015","unstructured":"Kalinin, M., Lavrova, D., and Pechenkin, A., High performance traffic processing in virtualized framework, Proceedings of the Bulgarian Academy of Sciences, 2015, vol. 68, no. 7, pp. 909\u2013916.","journal-title":"Proceedings of the Bulgarian Academy of Sciences"},{"key":"7784_CR5","unstructured":"NSL-KDD dataset, University of New Brunswick. https:\/\/www.unb.ca\/cic\/datasets\/nsl.html. Cited June 20, 2023."},{"key":"7784_CR6","unstructured":"Traffic data from Kyoto University\u02bcs honeypots. http:\/\/www.takakura.com\/Kyoto_data\/. Cited June 20, 2023."},{"key":"7784_CR7","unstructured":"Datasets on information security for machine learning, SecurityLab.ru by Positive Technologies, https:\/\/www.securitylab.ru\/blog\/personal\/Business_without_danger\/345789.php. Cited June 20, 2023."},{"key":"7784_CR8","doi-asserted-by":"publisher","unstructured":"Suprun, A., Anisimov, V., Anisimov, E., Saurenko, T., and Manciu, I., Models and method of decision support for the formation of cybersecurity systems, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp.\u00a0357\u2013367. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_29","DOI":"10.1007\/978-3-030-93872-7_29"},{"key":"7784_CR9","doi-asserted-by":"publisher","first-page":"626","DOI":"10.25559\/SITITO.14.201803.626-632","volume":"14","author":"N.F. Bakhareva","year":"2018","unstructured":"Bakhareva, N.F., Tarasov, V.N., Shukhman, A.E., Polezhaev, P.N., Ushakov, Yu.A., and Matveev, A.A., Attack detection in enterprise networks by machine learning methods, Sovremennye Informatsionnye Tekhnologii i IT-Obrazovanie, 2018, vol. 14, no. 3, pp. 626\u2013632. https:\/\/doi.org\/10.25559\/SITITO.14.201803.626-632","journal-title":"Sovremennye Informatsionnye Tekhnologii i IT-Obrazovanie"},{"key":"7784_CR10","unstructured":"Tatarnikova, T.M., Bimbetov, F., and Bogdanov, P.Yu., Identifying network traffic anomalies by deep learning, Izvestiya SPbGETU LETI, 2021, no. 4, pp. 36\u201341."},{"key":"7784_CR11","doi-asserted-by":"publisher","unstructured":"Anchishkin, A.P., Comparative analysis of modern intrusion detection systems, Colloquium-Journal, 2019, vols.\u00a026\u20131, p. 63. https:\/\/doi.org\/10.24411\/2520-6990-2019-11088","DOI":"10.24411\/2520-6990-2019-11088"},{"key":"7784_CR12","first-page":"215","volume":"17","author":"A.G. Rostovtsev","year":"2014","unstructured":"Rostovtsev, A.G. and Suprun, A.F., Strengthening differential and linear attacks using virtual isomorphisms, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 215\u2013230.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7784_CR13","doi-asserted-by":"publisher","unstructured":"Thing, V.L.L., IEEE 802.11 Network anomaly detection and attack classification: A deep learning approach, 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, 2017, IEEE, 2017, pp.\u00a01\u20136. https:\/\/doi.org\/10.1109\/WCNC.2017.7925567","DOI":"10.1109\/WCNC.2017.7925567"},{"key":"7784_CR14","doi-asserted-by":"publisher","unstructured":"Tatarnikova, T.M. and Bogdanov, P.Yu., Intrusion detection in Internet of Things networks based on machine learning methods, Informatsionno-Upravlyayushchie Sistemy, 2021, no. 6, pp. 42\u201352. https:\/\/doi.org\/10.31799\/1684-8853-2021-6-42-52","DOI":"10.31799\/1684-8853-2021-6-42-52"},{"key":"7784_CR15","doi-asserted-by":"publisher","first-page":"2425","DOI":"10.3390\/sym13122425","volume":"13","author":"M. Poltavtseva","year":"2021","unstructured":"Poltavtseva, M., Shelupanov, A., Bragin, D., Zegzhda, D., and Alexandrova, E., Key concepts of systemological approach to CPS adaptive information security monitoring, Symmetry, 2021, vol. 13, no. 12, p. 2425. https:\/\/doi.org\/10.3390\/sym13122425","journal-title":"Symmetry"},{"key":"7784_CR16","doi-asserted-by":"publisher","first-page":"817","DOI":"10.3103\/s0146411617080132","volume":"51","author":"D.S. Lavrova","year":"2017","unstructured":"Lavrova, D.S. and Vasil\u2019ev, Yu.S., An ontological model of the domain of applications for the Internet of Things in analyzing information security, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 817\u2013823. https:\/\/doi.org\/10.3103\/s0146411617080132","journal-title":"Autom. Control Comput. Sci."},{"key":"7784_CR17","unstructured":"Sikarev, I.A., Milyakov, D.F., and Travin, S.V., Artificial neural networks in the system of ensuring safety of navigation of autonomous crewless vessels, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2023, no. 2, pp. 193\u2013203."},{"key":"7784_CR18","unstructured":"Sikarev, I.A., Lebedev, I.S., and Sukhoparov, M.E., Adaptive model learning for predicting data flows in information and telecommunication systems, Informatsiya i Kosmos, 2022, no. 4, pp. 115\u2013121."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700858.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700858","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700858.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:46Z","timestamp":1773612166000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700858"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7784"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700858","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"4 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}