{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:24Z","timestamp":1773615684228,"version":"3.50.1"},"reference-count":22,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701013","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:44Z","timestamp":1741962164000},"page":"1343-1351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protection of Ad Hoc Networks against Distributed Network Scanning"],"prefix":"10.3103","volume":"58","author":[{"given":"M. A.","family":"Pakhomov","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7800_CR1","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/s11277-020-07376-1","volume":"114","author":"M. Boulaiche","year":"2020","unstructured":"Boulaiche, M., Survey of secure routing protocols for wireless ad hoc networks, Wireless Pers. Commun., 2020, vol. 114, no. 1, pp. 483\u2013517. https:\/\/doi.org\/10.1007\/s11277-020-07376-1","journal-title":"Wireless Pers. Commun."},{"key":"7800_CR2","doi-asserted-by":"publisher","first-page":"908","DOI":"10.3103\/s0146411621080150","volume":"55","author":"M.O. Kalinin","year":"2021","unstructured":"Kalinin, M.O., Application of neuro-fuzzy inference to detect network scanning, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 908\u2013917. https:\/\/doi.org\/10.3103\/s0146411621080150","journal-title":"Autom. Control Comput. Sci."},{"key":"7800_CR3","doi-asserted-by":"publisher","first-page":"927","DOI":"10.3103\/s0146411622080089","volume":"56","author":"V.M. Krundyshev","year":"2022","unstructured":"Krundyshev, V.M. and Kalinin, M.O., Mathematical model of the spread of computer attacks on critical information infrastructure, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 927\u2013933. https:\/\/doi.org\/10.3103\/s0146411622080089","journal-title":"Autom. Control Comput. Sci."},{"key":"7800_CR4","doi-asserted-by":"publisher","first-page":"4123","DOI":"10.3390\/en15114123","volume":"15","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https:\/\/doi.org\/10.3390\/en15114123","journal-title":"Energies"},{"key":"7800_CR5","doi-asserted-by":"publisher","first-page":"207","DOI":"10.15622\/sp.45.13","volume":"2","author":"A.A. Branitskiy","year":"2016","unstructured":"Branitskiy, A.A. and Kotenko, I.V., Analysis and classification of methods for network attack detection, Trudy SPIIRAN, 2016, vol. 2, no. 45, pp. 207\u2013244. https:\/\/doi.org\/10.15622\/sp.45.13","journal-title":"Trudy SPIIRAN"},{"key":"7800_CR6","unstructured":"Anan\u2019in, E.V., Kozhevnikova, I.S., and Datskaya, L.V., Analysis of existing methods for detecting unauthorized port scanning, Tendentsii i perspektivy razvitiya nauki XXI Veka. Sbornik statei Mezhdunarodnoi nauchno-prakticheskoi konferentsii (Trends and Prospects of Development of Science of 21st Century: Proceedings of the International Scientific and Practical Conference), Yekaterinburg, 2015, Sukiasyan, A.A., Ed., Ufa: Omega Sains, 2015, vol. 2, pp. 32\u201335."},{"key":"7800_CR7","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.3103\/s0146411618080321","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P., Usov, E.S., Nikol\u2019skii, A.V., and Pavlenko, E.Yu., Ensuring secure data input\/output operations for SGX ENCLAVE, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1036\u20131041. https:\/\/doi.org\/10.3103\/s0146411618080321","journal-title":"Autom. Control Comput. Sci."},{"key":"7800_CR8","unstructured":"PortSentry for detecting an attack, part 1: Methods of operation. https:\/\/www.securitylab.ru\/analytics\/216206.php\/. Cited April 4, 2024."},{"key":"7800_CR9","unstructured":"Psad\u2014Intrusion detection with iptables logs. https:\/\/github.com\/mrash\/psad\/. Cited April 4, 2024."},{"key":"7800_CR10","unstructured":"Snort\u2014Network intrusion detection. https:\/\/www.snort.org\/. Cited April 4, 2024."},{"key":"7800_CR11","volume-title":"Computer Networks","author":"A.S. Tanenbaum","year":"2010","unstructured":"Tanenbaum, A.S. and Wetheral, D.J., Computer Networks, Englewood Cliffs, NJ: Prentice-Hall, 2010, 5th ed."},{"key":"7800_CR12","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.3103\/s0146411619080133","volume":"53","author":"D.S. Lavrova","year":"2019","unstructured":"Lavrova, D.S., Forecasting the state of components of smart grids for early detection of cyberattacks, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1023\u20131025. https:\/\/doi.org\/10.3103\/s0146411619080133","journal-title":"Autom. Control Comput. Sci."},{"key":"7800_CR13","unstructured":"Gordon Lyon Nmap network scanning. https:\/\/nmap.org\/. Cited April 4, 2024."},{"key":"7800_CR14","doi-asserted-by":"publisher","unstructured":"Chiba, D., Tobe, K., Mori, T., and Goto, Sh., Detecting malicious websites by learning IP address features, 2012 IEEE\/IPSJ 12th International Symposium on Applications and the Internet, Izmir, Turkey, 2012, IEEE, 2012, pp. 29\u201339. https:\/\/doi.org\/10.1109\/saint.2012.14","DOI":"10.1109\/saint.2012.14"},{"key":"7800_CR15","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Poltavtseva, M., Shtyrkina, A., and Zegzhda, P., Detection of cyber threats to network infrastructure of digital production based on the methods of big data and multifractal analysis of traffic, SHS Web of Conferences, 2018, vol. 44, no. 7, p. 00051. https:\/\/doi.org\/10.1051\/shsconf\/20184400051","DOI":"10.1051\/shsconf\/20184400051"},{"key":"7800_CR16","doi-asserted-by":"publisher","unstructured":"Fatin, A., Pavlenko, E., and Zegzhda, P., Detection of anomalies in IoT systems by neuroevolution algorithms, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 47\u201355. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_5","DOI":"10.1007\/978-3-030-93872-7_5"},{"key":"7800_CR17","doi-asserted-by":"publisher","unstructured":"Goldstein, M., Reif, M., Stahl, A., and Breuel, T., Server-side prediction of source IP addresses using density estimation, 2009 International Conference on Availability, Reliability and Security, Fukuoka, Japan, 2009, IEEE, 2009, pp. 82\u201389. https:\/\/doi.org\/10.1109\/ares.2009.113","DOI":"10.1109\/ares.2009.113"},{"key":"7800_CR18","doi-asserted-by":"publisher","unstructured":"Pack, G., Yoon, J., Collins, E., and Estan, C., On filtering of DDoS attacks based on source address prefixes, 2006 Securecomm and Workshops, Baltimore, MD, 2006, IEEE, 2006, pp. 1\u201312. https:\/\/doi.org\/10.1109\/seccomw.2006.359537","DOI":"10.1109\/seccomw.2006.359537"},{"key":"7800_CR19","unstructured":"IoT network intrusion dataset. https:\/\/ieee-dataport.org\/open-access\/iot-network-intrusion-dataset. Cited April 4, 2024."},{"key":"7800_CR20","unstructured":"Scanlogd\u2014A port scan detection tool. https:\/\/www.openwall.com\/scanlogd\/. Cited April 4, 2024."},{"key":"7800_CR21","unstructured":"Daily feed of bad IPs (with blacklist hit scores). https:\/\/github.com\/stamparm\/ipsum. Cited April 4, 2024."},{"key":"7800_CR22","unstructured":"Dataset of malicious and benign webpages. https:\/\/data.mendeley.com\/datasets\/gdx3 pkwp47\/2. Cited April 4, 2024."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701013.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701013","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701013.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:17Z","timestamp":1773612197000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":22,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7800"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701013","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"9 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author of this work declares that he has no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}