{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:52Z","timestamp":1773615652520,"version":"3.50.1"},"reference-count":26,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701074","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:41Z","timestamp":1741962161000},"page":"1396-1405","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Development of Software and Hardware to Protect Technological Processes from Cyber Threats"],"prefix":"10.3103","volume":"58","author":[{"given":"F. G.","family":"Pashaev","sequence":"first","affiliation":[]},{"given":"D. I.","family":"Zeinalov","sequence":"additional","affiliation":[]},{"given":"G. T.","family":"Nadzhafov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7806_CR1","unstructured":"Goryunov, A.G., Liventsov, S.N., and Chursin, Yu.A., Telekontrol\u2019 i teleupravlenie (Remote Monitoring and Control), Tomsk: Izdatel\u2019stvo Tomskogo Politekhnicheskogo Universiteta, 2011."},{"key":"7806_CR2","unstructured":"Chertkov, A., Cyber security in industrial automation, Promyshlennye ASU i Kontrollery, 2017, no. 5, pp. 68\u201372."},{"key":"7806_CR3","unstructured":"Abdullaev, A.A., Dzhavadov, A.A., Levin, A.A., and Nabiev, I.A., Telemekhanicheskie kompleksy dlya neftyanoi promyshlennosti (Telemechanical Complexes for Oil Industry), Moscow: Nedra, 1982."},{"key":"7806_CR4","unstructured":"Tagirov, D.N., Besprovodnaya neftedobycha. Opyt SNG (Wireless Oil Production: CIS Experience), 2015."},{"key":"7806_CR5","doi-asserted-by":"publisher","unstructured":"Rzaev, A.G., Automation of oil production processes by rod deep well pumps with application of interference technology, Nauchnye Trudy NIPI Neftegaz GNKAR, 2012, no. 4, pp. 76\u201380. https:\/\/doi.org\/10.5510\/OGP20120400137","DOI":"10.5510\/OGP20120400137"},{"key":"7806_CR6","doi-asserted-by":"publisher","first-page":"314","DOI":"10.17587\/mau.16.314-320","volume":"16","author":"T.A. Aliev","year":"2015","unstructured":"Aliev, T.A., Nuspatov, O.G., Guluyev, G.A., Rzayev, A.H., Pashayev, F.H., Rezvan, M.H., and Kerimov, A.B., Algorithms for diagnostics of fault conditions of the sucker rod pumping units, Mekhatronika, Avtomatizatsiya, \n               Upravlenie, 2015, vol. 16, no. 5, pp. 314\u2013320. https:\/\/doi.org\/10.17587\/mau.16.314-320","journal-title":"Upravlenie"},{"key":"7806_CR7","volume-title":"Protection against cyberattacks","author":"Schneider Electric","year":"2011","unstructured":"Schneider Electric, Protection against cyberattacks, 2011, vol. 36."},{"key":"7806_CR8","unstructured":"Flores, Callejas., J., Afifi, A., and Lozinskiy, N.V. (Joint Inspection Unit), Review of Cybersecurity in the United Nations system organizations, Geneva: United Nations, 2021. http:\/\/digitallibrary.un.org\/record\/3945323. Cited March 4, 2024."},{"key":"7806_CR9","unstructured":"Palaeva, L.V., Khafizov, A.M., Gilyazetdinova, A.M., Vakhitova, A.R., Davydova, K.N., and Sirotina, E.R., Main types of cyberattacks on automated control system of technological process and means of protection from them, Fundamental\u2019nye Issledovaniya, 2017, nos. 10\u20133, pp. 507\u2013511."},{"key":"7806_CR10","unstructured":"Lopukhov, I., Industrial networks in the face of increased cyber threats, STA, 2014, no. 4, pp. 6\u201310."},{"key":"7806_CR11","unstructured":"Vorob, E.S., Deep protection of the industrial network perimeter, STA, 2017, no. 4, pp. 26\u201333."},{"key":"7806_CR12","doi-asserted-by":"publisher","first-page":"98","DOI":"10.25045\/jpit.v09.i1.11","volume":"09","author":"B. Nabiyev","year":"2018","unstructured":"Nabiyev, B., Application of clustering methods network traffic for detecting DDoS attacks, Problems of Information Technology, 2018, vol. 09, no. 1, pp. 98\u2013107. https:\/\/doi.org\/10.25045\/jpit.v09.i1.11","journal-title":"Problems of Information Technology"},{"key":"7806_CR13","doi-asserted-by":"publisher","unstructured":"Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., and Hahn, A., Guide to Industrial Control Systems (ICS) Security, National Institute of Standards and Technology, 2024. https:\/\/doi.org\/10.6028\/nist.sp.800-82r2","DOI":"10.6028\/nist.sp.800-82r2"},{"key":"7806_CR14","unstructured":"Fedotov, A.M., A corporate net information security, Problemy Bezopasnosti i Chrezvychainykh Situatsii, 2008, no. 2, pp. 88\u2013101."},{"key":"7806_CR15","doi-asserted-by":"publisher","unstructured":"Fatkieva, R.R., Secure data transmission method for the movement of autonomous vehicles, Informatsionno-Upravlyayushchie Sistemy, 2023, no. 6, pp. 46\u201356. https:\/\/doi.org\/10.31799\/1684-8853-2023-6-46-56","DOI":"10.31799\/1684-8853-2023-6-46-56"},{"key":"7806_CR16","doi-asserted-by":"publisher","unstructured":"Makarenko, S.I., Information weapon in technical area: Terminology, classification and examples, Sistemy Upravleniya, Svyazi i Bezopasnosti, 2016, no. 3, pp. 292\u2013376. https:\/\/doi.org\/10.24411\/2410-9916-2016-10311","DOI":"10.24411\/2410-9916-2016-10311"},{"key":"7806_CR17","doi-asserted-by":"publisher","unstructured":"Sommestad, T., Ericsson, G.N., and Nordlander, J., SCADA system cyber security\u2014A comparison of standards, IEEE PES General Meeting, Minneapolis, MN, 2010, IEEE, 2010, pp. 1\u20138. https:\/\/doi.org\/10.1109\/pes.2010.5590215","DOI":"10.1109\/pes.2010.5590215"},{"key":"7806_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.24032\/ijeacs\/0201\/01","volume":"2","author":"Ch. Kim","year":"2017","unstructured":"Kim, Ch., Cyber-defensive architecture for networked industrial control systems, International Journal of Engineering and Applied Computer Science, 2017, vol. 2, no. 1, pp. 1\u20139. https:\/\/doi.org\/10.24032\/ijeacs\/0201\/01","journal-title":"International Journal of Engineering and Applied Computer Science"},{"key":"7806_CR19","unstructured":"RM0090. Reference manual. https:\/\/www.st.com\/content\/ccc\/resource\/technical\/document\/reference_manual\/ 3d\/6d\/5a\/66\/b4\/99\/40\/d4\/DM00031020.pdf\/files\/DM00031020.pdf\/jcr:content\/translations\/en.DM00031_020.pdf. Cited March 4, 2024."},{"key":"7806_CR20","unstructured":"STM32Cube. https:\/\/istarik.ru\/file\/STM32Cube-Presentation.pdf. Cited March 4, 2024."},{"key":"7806_CR21","unstructured":"Basics of the SPI communication protocol. http:\/\/www.circuitbasics.com\/basics-of-the-spi-communication-protocol\/. Cited March 4, 2024."},{"key":"7806_CR22","unstructured":"SPI: Overview and use of the PICmicro serial peripheral interface. https:\/\/www.picmicrolab.com\/wp-content\/uploads\/2014\/02\/SPI-Overview.pdf. Cited March 4, 2024."},{"key":"7806_CR23","unstructured":"Basics of UART communication. https:\/\/web.stanford.edu\/class\/cs140e\/notes\/lec4\/uart-basics.pdf. Cited March 4, 2024."},{"key":"7806_CR24","unstructured":"MPU-9250 register map and descriptions revision 1.4. https:\/\/invensense.tdk.com\/wp-content\/uploads\/2015\/02\/MPU-9250-Register-Map.pdf. Cited March 4, 2024."},{"key":"7806_CR25","unstructured":"The i2c-bus specification. Version 2.1. https:\/\/www.csd.uoc.gr\/%7Ehy428\/reading\/i2c_spec.pdf. Cited March 4, 2024."},{"key":"7806_CR26","unstructured":"Interfacing the standard parallel port. https:\/\/web.archive.org\/web\/20120301022928\/http:\/\/retired.beyondlogic.org\/spp\/parallel.pdf. Cited March 4, 2024."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701074.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701074","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701074.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:48Z","timestamp":1773612168000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":26,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7806"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701074","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"20 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}