{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:13Z","timestamp":1773615733675,"version":"3.50.1"},"reference-count":18,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700713","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:34:58Z","timestamp":1771936498000},"page":"1201-1208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Study of the Problems of Information-Security Auditing of Geographically Distributed Internet-of-Things Devices"],"prefix":"10.3103","volume":"59","author":[{"given":"V. O.","family":"Erastov","sequence":"first","affiliation":[]},{"given":"E. A.","family":"Zubkov","sequence":"additional","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7906_CR1","doi-asserted-by":"publisher","unstructured":"Rid, T., Cyber war will not take place, Strategic Studies: A Reader, Mahnken, T. and Maiolo, J., Eds., International Affairs, vol. 90, Routledge, 2014, 2nd ed., no. 1, pp. 203\u2013204. https:\/\/doi.org\/10.4324\/9781315814803","DOI":"10.4324\/9781315814803"},{"key":"7906_CR2","doi-asserted-by":"publisher","first-page":"17525","DOI":"10.1109\/JIOT.2021.3081741","volume":"8","author":"A.S.D. Duque","year":"2021","unstructured":"Duque, A.S.D., Fraunholz, D., and Krohmer, D., The global state of security in industrial control systems: An empirical analysis of vulnerabilities around the world, IEEE Internet Things J., 2021, vol. 8, no. 24, pp. 17525\u201317540. https:\/\/doi.org\/10.1109\/JIOT.2021.3081741","journal-title":"IEEE Internet Things J."},{"key":"7906_CR3","doi-asserted-by":"publisher","unstructured":"On the origin of scanning: The impact of location on Internet-wide scans, Proceedings of the ACM Internet Measurement Conference, New York: Association for Computing Machinery, 2020, pp. 662\u2013679. https:\/\/doi.org\/10.1145\/3419394.3424214","DOI":"10.1145\/3419394.3424214"},{"key":"7906_CR4","doi-asserted-by":"publisher","first-page":"405","DOI":"10.33581\/1561-4085-2020-23-4-405-413","volume":"23","author":"E.B. Aleksandrova","year":"2020","unstructured":"Aleksandrova, E.B., Shtyrkina, A.A., and Yarmak, A.V., Post-quantum group-oriented authentication in IoT, Nonlinear Phenom. Complex Syst., 2020, vol. 23, no. 4, pp. 405\u2013413. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-4-405-413","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7906_CR5","doi-asserted-by":"publisher","first-page":"397","DOI":"10.33581\/1561-4085-2020-23-4-397-404","volume":"23","author":"M. Kalinin","year":"2020","unstructured":"Kalinin, M. and Krundyshev, V., Sequence alignment algorithms for intrusion detection in the Internet of Things, Nonlinear Phenom. Complex Syst., 2020, vol. 23, no. 4, pp. 397\u2013404. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-4-397-404","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7906_CR6","doi-asserted-by":"publisher","unstructured":"Pechenkin, A.I., Poltavtseva, M.A., and Lavrova, D.S., An approach to data normalization in the Internet of Things for security analysis, Programmnye Produkty i Sistemy, 2016, no. 2, pp. 83\u201388. https:\/\/doi.org\/10.15827\/0236-235X.114.083-088","DOI":"10.15827\/0236-235X.114.083-088"},{"key":"7906_CR7","doi-asserted-by":"publisher","unstructured":"Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., and Halderman, J.A., A search engine backed by Internet-wide scanning, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, 2015, New York: Association for Computing Machinery, 2015, pp. 542\u2013553. https:\/\/doi.org\/10.1145\/2810103.2813703","DOI":"10.1145\/2810103.2813703"},{"key":"7906_CR8","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1109\/tdsc.2020.3037908","volume":"19","author":"B. Zhao","year":"2020","unstructured":"Zhao, B., Ji, Sh., Lee, W.-H., Lin, Ch., Weng, H., Wu, J., Zhou, P., Fang, L., and Beyah, R., A large-scale empirical study on the vulnerability of deployed IoT devices, IEEE Trans. Dependable Secure Comput., 2020, vol.\u00a019, no. 3, pp. 1826\u20131840. https:\/\/doi.org\/10.1109\/tdsc.2020.3037908","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7906_CR9","doi-asserted-by":"publisher","unstructured":"Kashyap, P. and Selvarajah, V., Analysis of different methods of reconnaissance, Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021), Atlantis Highlights in Computer Sciences, Atlantis Press, 2021, pp. 509\u2013519. https:\/\/doi.org\/10.2991\/ahis.k.210913.064","DOI":"10.2991\/ahis.k.210913.064"},{"key":"7906_CR10","doi-asserted-by":"publisher","first-page":"2696","DOI":"10.1002\/sec.1262","volume":"9","author":"B. Genge","year":"2016","unstructured":"Genge, B. and En\u0103chescu, C., ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services, Security and Communication Networks, 2016, vol. 9, no. 15, pp. 2696\u20132714. https:\/\/doi.org\/10.1002\/sec.1262","journal-title":"Security and Communication Networks"},{"key":"7906_CR11","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/mc.2012.37","volume":"45","author":"E. Brewer","year":"2012","unstructured":"Brewer, E., CAP twelve years later: How the \u201crules\u201d have changed, Computer, 2012, vol. 45, no. 2, pp. 23\u201329. https:\/\/doi.org\/10.1109\/mc.2012.37","journal-title":"Computer"},{"key":"7906_CR12","unstructured":"Moskvin, D.A., Ovasapyan, T.D., and Nikulkin, V.A., Adaptive control of honeypot system for Internet of Things cybersecurity, Zashchita Informatsii. Insaid, 2022, no. 2, pp. 16\u201321."},{"key":"7906_CR13","volume-title":"The Byzantine generals problem, Concurrency: The Works of Leslie Lamport","author":"L. Lamport","year":"2019","unstructured":"Lamport, L., Shostak, R., and Pease, M., The Byzantine generals problem, Concurrency: The Works of Leslie Lamport, Malkhi, D., Ed., New York: Association for Computing Machinery, 2019, pp. 203\u2013226."},{"key":"7906_CR14","first-page":"41","volume":"7","author":"A.F. Suprun","year":"2021","unstructured":"Suprun, A.F., Veselko, A.A., and Kastyrin, M.A., Seucrity in Internet of Things systems by the method of low-resource cryptography, Zhurnal Tekhnicheskikh Issledovanii, 2021, vol. 7, no. 4, pp. 41\u201348.","journal-title":"Zhurnal Tekhnicheskikh Issledovanii"},{"key":"7906_CR15","unstructured":"Ongaro, D. and Ousterhout, J., In search of an understandable consensus algorithm, USENIX Annual Technical Conference (USENIX ATC 14), 2014, pp. 305\u2013319."},{"key":"7906_CR16","doi-asserted-by":"publisher","first-page":"397","DOI":"10.33581\/1561-4085-2020-23-4-397-404","volume":"23","author":"M. Kalinin","year":"2020","unstructured":"Kalinin, M. and Krundyshev, V., Sequence alignment algorithms for intrusion detection in the Internet of Things, Nonlinear Phenom. Complex Syst., 2020, vol. 23, no. 4, pp. 397\u2013404. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-4-397-404","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7906_CR17","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/568425.568433","volume":"32","author":"L. Lamport","year":"2001","unstructured":"Lamport, L., Paxos made simple, ACM SIGACT News Distributed Computing Column, 2001, vol. 32, pp. 51\u201358. https:\/\/doi.org\/10.1145\/568425.568433","journal-title":"ACM SIGACT News Distributed Computing Column"},{"key":"7906_CR18","unstructured":"Aleksandrova, E.B. and Yarmak, A.V., Hierarchical group-based authentication for Industrial Internet of Things, Zashchita Informatsii. Insaid, 2021, no. 2, pp. 23\u201327."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700713.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700713","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700713.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:53Z","timestamp":1773612233000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700713"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7906"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700713","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"21 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}