{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:43Z","timestamp":1773615583080,"version":"3.50.1"},"reference-count":21,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701050","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:20Z","timestamp":1741962200000},"page":"1386-1391","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent Recommendation System for Countering Network Attacks"],"prefix":"10.3103","volume":"58","author":[{"given":"I. A.","family":"Goretskii","sequence":"first","affiliation":[]},{"given":"D. S.","family":"Lavrova","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7804_CR1","unstructured":"Kaspersky Lab\u02bcs real-time cyber threat map. https:\/\/cybermap.kaspersky.com\/ru\/stats#country=213&type=IDS&period=m. Cited May 2, 2024."},{"key":"7804_CR2","doi-asserted-by":"publisher","first-page":"150","DOI":"10.4236\/jis.2013.43018","volume":"4","author":"Sh. Tripathi","year":"2013","unstructured":"Tripathi, Sh., Gupta, B., Almomani, A., Mishra, A., and Veluru, S., Hadoop based defense solution to handle distributed denial of service (DDoS) attacks, Journal of Information Security, 2013, vol. 4, no. 3, pp. 150\u2013164. https:\/\/doi.org\/10.4236\/jis.2013.43018","journal-title":"Journal of Information Security"},{"key":"7804_CR3","unstructured":"DDoS attack trends and insights. https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/02\/21\/2022-in-review-ddos-attack-trends-and-insights\/. Cited May 2, 2024."},{"key":"7804_CR4","volume-title":"Data visualization: Experiment to impose DDoS attack and its recovery on software-defined networks, Data Visualization: Trends and Challenges Toward Multidisciplinary Perception","author":"B. Goswami","year":"2020","unstructured":"Goswami, B., Wilson, S., Asadollahi, S., and Manuel, T., Data visualization: Experiment to impose DDoS attack and its recovery on software-defined networks, Data Visualization: Trends and Challenges Toward Multidisciplinary Perception, Anouncia, S., Gohel, H., and Vairamuthu, S., Eds., Singapore: Springer, 2020, pp. 141\u2013160."},{"key":"7804_CR5","doi-asserted-by":"publisher","unstructured":"Pavlenko, E. and Poltavtseva, M., Mathematical methods for implementing homeostatic control in digital production systems, Technological Transformation: A New Role For Human, Machines And Management. TT 2020, Schaumburg, H., Korablev, V., and Ungvari, L., Eds., Lecture Notes in Networks and Systems, vol. 157, Cham: Springer, 2021, pp. 1\u20139. https:\/\/doi.org\/10.1007\/978-3-030-64430-7_1","DOI":"10.1007\/978-3-030-64430-7_1"},{"key":"7804_CR6","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., and Zubkov, E., Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms, SHS Web of Conferences, 2018, vol. 44, p. 00044. https:\/\/doi.org\/10.1051\/shsconf\/20184400044","DOI":"10.1051\/shsconf\/20184400044"},{"key":"7804_CR7","doi-asserted-by":"publisher","unstructured":"Ivanov, D., Kalinin, M., Krundyshev, V., and Orel, E., Automatic security management of smart infrastructures using attack graph and risk analysis, 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020. https:\/\/doi.org\/10.1109\/worlds450073.2020.9210410","DOI":"10.1109\/worlds450073.2020.9210410"},{"key":"7804_CR8","doi-asserted-by":"publisher","unstructured":"Kalinin, M.O. and Krundyshev, V.M., Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions, 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2021, IEEE, 2021. https:\/\/doi.org\/10.1109\/worlds451998.2021.9514004","DOI":"10.1109\/worlds451998.2021.9514004"},{"key":"7804_CR9","doi-asserted-by":"publisher","first-page":"4123","DOI":"10.3390\/en15114123","volume":"15","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https:\/\/doi.org\/10.3390\/en15114123","journal-title":"Energies"},{"key":"7804_CR10","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.3390\/sym14102208","volume":"14","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Ovasapyan, T., and Poltavtseva, M., Application of the learning automaton model for ensuring cyber resiliency, Symmetry, 2022, vol. 14, no. 10, p. 2208. https:\/\/doi.org\/10.3390\/sym14102208","journal-title":"Symmetry"},{"key":"7804_CR11","doi-asserted-by":"publisher","first-page":"102984","DOI":"10.1016\/j.cose.2022.102984","volume":"124","author":"M. Bashendy","year":"2023","unstructured":"Bashendy, M., Tantawy, A., and Erradi, A., Intrusion response systems for cyber-physical systems: A comprehensive survey, Comput. Secur., 2023, vol. 124, p. 102984. https:\/\/doi.org\/10.1016\/j.cose.2022.102984","journal-title":"Comput. Secur."},{"key":"7804_CR12","doi-asserted-by":"publisher","first-page":"2847","DOI":"10.1109\/tcomm.2023.3244239","volume":"71","author":"Zh. Li","year":"2023","unstructured":"Li, Zh., Wang, X., Pan, L., Zhu, L., Wang, Zh., Feng, J., Deng, Ch., and Huang, L., Network topology optimization via deep reinforcement learning, IEEE Trans. Commun., 2023, vol. 71, no. 5, pp. 2847\u20132859. https:\/\/doi.org\/10.1109\/tcomm.2023.3244239","journal-title":"IEEE Trans. Commun."},{"key":"7804_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.52953\/yxtb5085","volume":"2","author":"Z. Han","year":"2021","unstructured":"Han, Z., Kong, J., Wang, Zh., Zhang, Yi., Liu, K., Pan, L., Li, S., and Wu, D., AI-based network topology optimization system, ITU Journal on Future and Evolving Technologies, 2021, vol. 2, no. 4, pp. 81\u201390. https:\/\/doi.org\/10.52953\/yxtb5085","journal-title":"ITU Journal on Future and Evolving Technologies"},{"key":"7804_CR14","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.3390\/sym13122453","volume":"13","author":"D. Zegzhda","year":"2021","unstructured":"Zegzhda, D., Pavlenko, E., and Aleksandrova, E., Modelling artificial immunization processes to counter cyberthreats, Symmetry, 2021, vol. 13, no. 12, p. 2453. https:\/\/doi.org\/10.3390\/sym13122453","journal-title":"Symmetry"},{"key":"7804_CR15","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.eij.2015.06.005","volume":"16","author":"F.O. Isinkaye","year":"2015","unstructured":"Isinkaye, F.O., Folajimi, Y.O., and Ojokoh, B.A., Recommendation systems: Principles, methods and evaluation, Egypt. Inf. J., 2015, vol. 16, no. 3, pp. 261\u2013273. https:\/\/doi.org\/10.1016\/j.eij.2015.06.005","journal-title":"Egypt. Inf. J."},{"key":"7804_CR16","doi-asserted-by":"publisher","first-page":"110618","DOI":"10.1016\/j.rser.2020.110618","volume":"137","author":"A.T.D. Perera","year":"2021","unstructured":"Perera, A.T.D. and Kamalaruban, P., Applications of reinforcement learning in energy systems, Renewable Sustainable Energy Rev., 2021, vol. 137, p. 110618. https:\/\/doi.org\/10.1016\/j.rser.2020.110618","journal-title":"Renewable Sustainable Energy Rev."},{"key":"7804_CR17","first-page":"284","volume":"17","author":"V.V. Platonov","year":"2014","unstructured":"Platonov, V.V. and Semenov, P.O., Dimension reduction in network attacks detection systems, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 284\u2013289.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7804_CR18","volume-title":"Training agents to play 2D games using reinforcement learning, Design of Intelligent Applications using Machine Learning and Deep Learning Techniques","author":"H. Jhaveri","year":"2021","unstructured":"Jhaveri, H., Madhani, N., and Shekokar, N.M., Training agents to play 2D games using reinforcement learning, Design of Intelligent Applications using Machine Learning and Deep Learning Techniques, Mangrulkar, R.Sh., Michalas, A., Shekokar, N., Narvekar, M., and Chavan, P.V., Eds., New York: Chapman and Hall\/CRC, 2021, pp. 309\u2013319."},{"key":"7804_CR19","doi-asserted-by":"publisher","unstructured":"Huang, Sh. and Onta\u00f1\u00f3n, S., A closer look at invalid action masking in policy gradient algorithms, The International FLAIRS Conference Proceedings, 2022, vol. 35. https:\/\/doi.org\/10.32473\/flairs.v35i.130584","DOI":"10.32473\/flairs.v35i.130584"},{"key":"7804_CR20","doi-asserted-by":"publisher","unstructured":"Zegzhda, D.P., Pavlenko, E., and Shtyrkina, A., Cybersecurity and control sustainability in digital economy and advanced production, The Economics of Digital Transformation, Devezas, T., Leit\u00e3o, J., and Sarygulov, A., Eds., Studies on Entrepreneurship, Structural Change and Industrial Dynamics, Cham: Springer, 2021, pp. 173\u2013185. https:\/\/doi.org\/10.1007\/978-3-030-59959-1_11","DOI":"10.1007\/978-3-030-59959-1_11"},{"key":"7804_CR21","doi-asserted-by":"publisher","first-page":"171","DOI":"10.69511\/ijdsaa.v4i0.160","volume":"4","author":"D.M. Vistro","year":"2022","unstructured":"Vistro, D.M., Mahmood, I., Rehman, A.U., and Javed, F., Review and comparative analysis of routing protocols in network, International Journal of Data Science and Advanced Analytics, 2022, vol. 4, pp. 171\u2013176. https:\/\/doi.org\/10.69511\/ijdsaa.v4i0.160","journal-title":"International Journal of Data Science and Advanced Analytics"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701050.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701050","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701050.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:52Z","timestamp":1773612112000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7804"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701050","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"9 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}