{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:46Z","timestamp":1773615646091,"version":"3.50.1"},"reference-count":20,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701244","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:19Z","timestamp":1741962199000},"page":"1442-1449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Graph of Self-Regulation of Various Types of Networks with Adaptive Topology"],"prefix":"10.3103","volume":"58","author":[{"given":"E. Yu.","family":"Pavlenko","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Pakhomov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7811_CR1","doi-asserted-by":"publisher","first-page":"31342","DOI":"10.1109\/access.2019.2903629","volume":"7","author":"F. Janu\u00e1rio","year":"2019","unstructured":"Janu\u00e1rio, F., Cardoso, A., and Gil, P., A distributed multi-agent framework for resilience enhancement in cyber-physical systems, IEEE Access, 2019, vol. 7, pp. 31342\u201331357. https:\/\/doi.org\/10.1109\/access.2019.2903629","journal-title":"IEEE Access"},{"key":"7811_CR2","doi-asserted-by":"publisher","first-page":"906","DOI":"10.3103\/s0146411622080132","volume":"56","author":"E.Yu. Pavlenko","year":"2022","unstructured":"Pavlenko, E.Yu., Systematization of cyber threats to large-scale systems with adaptive network topology, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 906\u2013915. https:\/\/doi.org\/10.3103\/s0146411622080132","journal-title":"Autom. Control Comput. Sci."},{"key":"7811_CR3","doi-asserted-by":"publisher","unstructured":"Basati, A., Cyber-resilient control structures in DC microgrids with cyber-physical threats, PhD Thesis, Aalborg, Denmark: Aalborg University, 2023. https:\/\/doi.org\/10.54337\/aau548142466","DOI":"10.54337\/aau548142466"},{"key":"7811_CR4","first-page":"135","volume":"3","author":"V. Rani","year":"2013","unstructured":"Rani, V. and Dhir, R., A study of ad hoc network: A review, International Journal of Advanced Research in Computer Science and Software Engineering, 2013, vol. 3, no. 3, pp. 135\u2013138.","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"7811_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3390\/asi3010014","volume":"3","author":"D. Kandris","year":"2020","unstructured":"Kandris, D., Nakas, Ch., Vomvas, D., and Koulouras, G., Applications of wireless sensor networks: An up-to-date survey, Appl. Syst. Innovation, 2020, vol. 3, no. 1, p. 14. https:\/\/doi.org\/10.3390\/asi3010014","journal-title":"Appl. Syst. Innovation"},{"key":"7811_CR6","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3103\/s0146411618080084","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971\u2013976. https:\/\/doi.org\/10.3103\/s0146411618080084","journal-title":"Autom. Control Comput. Sci."},{"key":"7811_CR7","doi-asserted-by":"publisher","unstructured":"Zegzhda, D. and Stepanova, T., Achieving Internet of Things security via providing topological sustainability, 2015 Science and Information Conference (SAI), London, 2015, IEEE, 2015, pp. 269\u2013276. https:\/\/doi.org\/10.1109\/sai.2015.7237154","DOI":"10.1109\/sai.2015.7237154"},{"key":"7811_CR8","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.1016\/j.comnet.2012.12.017","volume":"57","author":"W. Wang","year":"2013","unstructured":"Wang, W. and Lu, Z., Cyber security in the smart grid: Survey and challenges, Comput. Networks, 2013, vol. 57, no. 5, pp. 1344\u20131371. https:\/\/doi.org\/10.1016\/j.comnet.2012.12.017","journal-title":"Comput. Networks"},{"key":"7811_CR9","unstructured":"Boyer, W.F. and McBride, S.A., Study of security attributes of smart grid systems-current cyber security issues. https:\/\/www.smartgrid.gov\/files\/documents\/Study_Security_Attributes_Smart_Grid_Systems_Current_Cyber_200903.pdf. Cited August 25, 2023."},{"key":"7811_CR10","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.3103\/s0146411622080168","volume":"56","author":"E.Yu. Pavlenko","year":"2022","unstructured":"Pavlenko, E.Yu., Functional model of adaptive network topology of large-scale systems based on dynamical graph theory, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 1016\u20131024. https:\/\/doi.org\/10.3103\/s0146411622080168","journal-title":"Autom. Control Comput. Sci."},{"key":"7811_CR11","doi-asserted-by":"publisher","unstructured":"Suprun, A., Anisimov, V., Anisimov, E., Saurenko, T., and Manciu, I., Models and method of decision support for the formation of cybersecurity systems, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp.\u00a0357\u2013367. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_29","DOI":"10.1007\/978-3-030-93872-7_29"},{"key":"7811_CR12","doi-asserted-by":"publisher","first-page":"106990","DOI":"10.1016\/j.nanoen.2022.106990","volume":"95","author":"H.-X. Zou","year":"2022","unstructured":"Zou, H.-X., Zhao, L.-C., Wang, Q., Gao, Q.-H., Yan, G., Wei, K.-X., and Zhang, W.-M., A self-regulation strategy for triboelectric nanogenerator and self-powered wind-speed sensor, Nano Energy, 2022, vol. 95, p. 106990. https:\/\/doi.org\/10.1016\/j.nanoen.2022.106990","journal-title":"Nano Energy"},{"key":"7811_CR13","doi-asserted-by":"publisher","first-page":"15121","DOI":"10.1007\/s10586-018-2504-5","volume":"22","author":"S. Balaji","year":"2019","unstructured":"Balaji, S. and Sasilatha, T., Detection of denial of service attacks by domination graph application in wireless sensor networks, Cluster Comput., 2019, vol. 22, no. s6, pp. 15121\u201315126. https:\/\/doi.org\/10.1007\/s10586-018-2504-5","journal-title":"Cluster Comput."},{"key":"7811_CR14","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s11277-020-07213-5","volume":"117","author":"D.E. Boubiche","year":"2021","unstructured":"Boubiche, D.E., Athmani, S., Boubiche, S., and Toral-Cruz, H., Cybersecurity issues in wireless sensor networks: Current challenges and solutions, Wireless Pers. Commun., 2021, vol. 117, no. 1, pp. 177\u2013213. https:\/\/doi.org\/10.1007\/s11277-020-07213-5","journal-title":"Wireless Pers. Commun."},{"key":"7811_CR15","doi-asserted-by":"publisher","first-page":"107094","DOI":"10.1016\/j.comnet.2019.107094","volume":"169","author":"M.Z. Gunduz","year":"2020","unstructured":"Gunduz, M.Z. and Das, R., Cyber-security on smart grid: Threats and potential solutions, Comput. Networks, 2020, vol. 169, p. 107094. https:\/\/doi.org\/10.1016\/j.comnet.2019.107094","journal-title":"Comput. Networks"},{"key":"7811_CR16","doi-asserted-by":"publisher","unstructured":"Aleksandrova, E., Pendrikova, O., Shtyrkina, A., Shkorkina, E., Yarmak, A., and Tick, J., Threshold isogeny-based group authentication scheme, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 117\u2013126. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_10","DOI":"10.1007\/978-3-030-93872-7_10"},{"key":"7811_CR17","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/mcom.2017.1600210c","volume":"55","author":"S. Bi","year":"2017","unstructured":"Bi, S. and Zhang, Yi.J.A., Graph-based cyber security analysis of state estimation in smart power grid, IEEE Commun. Mag., 2017, vol. 55, no. 4, pp. 176\u2013183. https:\/\/doi.org\/10.1109\/mcom.2017.1600210c","journal-title":"IEEE Commun. Mag."},{"key":"7811_CR18","doi-asserted-by":"publisher","first-page":"102500","DOI":"10.1016\/j.jisa.2020.102500","volume":"52","author":"M.A. Ferrag","year":"2020","unstructured":"Ferrag, M.A., Babaghayou, M., and Yazici, M.A., Cyber security for fog-based smart grid SCADA systems: Solutions and challenges, J. Inf. Secur. Appl., 2020, vol. 52, p. 102500. https:\/\/doi.org\/10.1016\/j.jisa.2020.102500","journal-title":"J. Inf. Secur. Appl."},{"key":"7811_CR19","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M.A. and Zegzhda, P., Heterogeneous semi-structured objects analysis, Intelligent Systems and Applications. IntelliSys \n               2018, Arai, K., Kapoor, S., and Bhatia, R., Eds., Advances in Intelligent Systems and Computing, vol. 868, Cham: Springer, pp. 1259\u20131270. https:\/\/doi.org\/10.1007\/978-3-030-01054-6_88","DOI":"10.1007\/978-3-030-01054-6_88"},{"key":"7811_CR20","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s11416-020-00356-w","volume":"16","author":"N. Shenets","year":"2020","unstructured":"Shenets, N., Multi-party pairwise key agreement in linear number of Diffie\u2013Hellman key exchanges, J. Comput. Virol. Hacking Tech., 2020, vol. 16, no. 4, pp. 275\u2013284. https:\/\/doi.org\/10.1007\/s11416-020-00356-w","journal-title":"J. Comput. Virol. Hacking Tech."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701244.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701244","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701244.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:43Z","timestamp":1773612163000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7811"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701244","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"14 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}