{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:26Z","timestamp":1773615746151,"version":"3.50.1"},"reference-count":22,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700877","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:31:35Z","timestamp":1771936295000},"page":"1328-1337","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Model of Interaction of Mobile Ad Hoc Network Nodes Taking into Account Protection against Active Network Attacks"],"prefix":"10.3103","volume":"59","author":[{"given":"M. A.","family":"Pakhomov","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7922_CR1","doi-asserted-by":"publisher","unstructured":"Ramphull, D., Mungur, A., Armoogum, Sh., and Pudaruth, S., A review of mobile ad hoc network (MANET) protocols and their applications, 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2021, IEEE, 2021, pp. 204\u2013211. https:\/\/doi.org\/10.1109\/iciccs51141.2021.9432258","DOI":"10.1109\/iciccs51141.2021.9432258"},{"key":"7922_CR2","doi-asserted-by":"publisher","first-page":"336","DOI":"10.33581\/1561-4085-2019-22-4-336-341","volume":"22","author":"D.V. Ivanov","year":"2019","unstructured":"Ivanov, D.V. and Moskvin, D.A., Application of fractal methods to ensure the cyber-resilience of self-organizing networks, Nonlinear Phenom. Complex Syst., 2019, vol. 22, no. 4, pp. 336\u2013341. https:\/\/doi.org\/10.33581\/1561-4085-2019-22-4-336-341","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7922_CR3","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.3103\/s0146411624700731","volume":"58","author":"M.O. Kalinin","year":"2024","unstructured":"Kalinin, M.O. and Konoplev, A.S., The concept of secure distributed ledger technology in the digital environment of a smart city, Autom. Control Comput. Sci., 2024, vol. 58, no. 8, pp. 1114\u20131118. https:\/\/doi.org\/10.3103\/s0146411624700731","journal-title":"Autom. Control Comput. Sci."},{"key":"7922_CR4","doi-asserted-by":"publisher","first-page":"699","DOI":"10.17586\/2226-1494-2022-22-4-699-707","volume":"22","author":"L.V. Legashev","year":"2022","unstructured":"Legashev, L.V., Grishina, L.S., Parfenov, D.I., and Zhigalov, A.Yu., Development of a model for network traffic anomaly detection in wireless distributed self-organizing networks, Nauchn.-Tekh. Vestn. Inf. Tekhnol., \n               Mekh. Opt., 2022, vol. 22, no. 4, pp. 699\u2013707. https:\/\/doi.org\/10.17586\/2226-1494-2022-22-4-699-707","journal-title":"Mekh. Opt."},{"key":"7922_CR5","doi-asserted-by":"publisher","first-page":"101740","DOI":"10.1016\/j.adhoc.2018.08.010","volume":"90","author":"N. Fan","year":"2019","unstructured":"Fan, N. and Wu, Ch.Q., On trust models for communication security in vehicular ad-hoc networks, Ad Hoc Networks, 2019, vol. 90, p. 101740. https:\/\/doi.org\/10.1016\/j.adhoc.2018.08.010","journal-title":"Ad Hoc Networks"},{"key":"7922_CR6","doi-asserted-by":"publisher","unstructured":"Olanrewaju, R.F., Khan, B.U.I., Anwar, F., Mir, R.N., Yaacob, M., and Mehraj, T., Bayesian signaling game based efficient security model for MANETs, Advances in Information and Communication. FICC 2019, Arai, K. and Bhatia, R., Eds., Lecture Notes in Networks and Systems, vol. 70, Cham: Springer, 2020, pp. 1106\u20131122. https:\/\/doi.org\/10.1007\/978-3-030-12385-7_75","DOI":"10.1007\/978-3-030-12385-7_75"},{"key":"7922_CR7","doi-asserted-by":"publisher","first-page":"1406","DOI":"10.1049\/iet-com.2017.1279","volume":"12","author":"R.M. Chintalapalli","year":"2018","unstructured":"Chintalapalli, R.M. and Ananthula, V.R., M-LionWhale: Multi-objective optimisation model for secure routing in mobile ad-hoc network, IET Communications, 2018, vol. 12, no. 12, pp. 1406\u20131415. https:\/\/doi.org\/10.1049\/iet-com.2017.1279","journal-title":"IET Communications"},{"key":"7922_CR8","doi-asserted-by":"publisher","unstructured":"Somov, S.K., Use of data replication in mobile networks of arbitrary MANET structure, Upravlenie razvitiem krupnomasshtabnykh sistem (MLSD\u20192021) (Managing Large-Scale Systems Development (MLSD\u20192021)), 2021, pp. 1478\u20131484. https:\/\/doi.org\/10.25728\/5925.2021.82.92.001","DOI":"10.25728\/5925.2021.82.92.001"},{"key":"7922_CR9","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.3103\/s0146411618080059","volume":"52","author":"A.G. Busygin","year":"2018","unstructured":"Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080\u20131083. https:\/\/doi.org\/10.3103\/s0146411618080059","journal-title":"Autom. Control Comput. Sci."},{"key":"7922_CR10","first-page":"34","volume":"2603","author":"D. Lavrova","year":"2019","unstructured":"Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., 2019, vol. 2603, pp. 34\u201339.","journal-title":"CEUR Workshop Proc."},{"key":"7922_CR11","doi-asserted-by":"publisher","unstructured":"Siami-Namini, S., Tavakoli, N., and Siami Namin, A., A comparison of ARIMA and LSTM in forecasting time series, 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), Orlando, FL, 2018, IEEE, 2018, pp. 1394\u20131401. https:\/\/doi.org\/10.1109\/icmla.2018.00227","DOI":"10.1109\/icmla.2018.00227"},{"key":"7922_CR12","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M. and Tick, A., Automatic control approach to the cyber-physical systems security monitoring, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 17\u201330. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_2","DOI":"10.1007\/978-3-030-93872-7_2"},{"key":"7922_CR13","doi-asserted-by":"publisher","first-page":"83105","DOI":"10.1109\/access.2021.3085085","volume":"9","author":"R. Chandra","year":"2021","unstructured":"Chandra, R., Goyal, Sh., and Gupta, R., Evaluation of deep learning models for multi-step ahead time series prediction, IEEE Access, 2021, vol. 9, pp. 83105\u201383123. https:\/\/doi.org\/10.1109\/access.2021.3085085","journal-title":"IEEE Access"},{"key":"7922_CR14","doi-asserted-by":"publisher","unstructured":"Siami-Namini, S., Tavakoli, N., and Namin, A.S., The performance of LSTM and BiLSTM in forecasting time series, 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, 2019, IEEE, 2019, pp. 3285\u20133292. https:\/\/doi.org\/10.1109\/bigdata47090.2019.9005997","DOI":"10.1109\/bigdata47090.2019.9005997"},{"key":"7922_CR15","doi-asserted-by":"publisher","first-page":"103139","DOI":"10.1016\/j.adhoc.2023.103139","volume":"144","author":"O.G. Uyan","year":"2023","unstructured":"Uyan, O.G., Akbas, A., and Gungor, V.C., Machine learning approaches for underwater sensor network parameter prediction, Ad Hoc Networks, 2023, vol. 144, p. 103139. https:\/\/doi.org\/10.1016\/j.adhoc.2023.103139","journal-title":"Ad Hoc Networks"},{"key":"7922_CR16","doi-asserted-by":"publisher","first-page":"86181","DOI":"10.1109\/ACCESS.2022.3199372","volume":"10","author":"W. Xianbin","year":"2022","unstructured":"Xianbin, W., Liu, H., Xu, H., and Zhang, X., Network traffic prediction based on LSTM and transfer learning, IEEE Access, 2022, vol. 10, pp. 86181\u201386190. https:\/\/doi.org\/10.1109\/ACCESS.2022.3199372","journal-title":"IEEE Access"},{"key":"7922_CR17","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.3103\/s0146411621080320","volume":"55","author":"K.V. Vasil\u2019eva","year":"2021","unstructured":"Vasil\u2019eva, K.V. and Lavrova, D.S., Detecting anomalies in cyber-physical systems using graph neural networks, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1051\u20131060. https:\/\/doi.org\/10.3103\/s0146411621080320","journal-title":"Autom. Control Comput. Sci."},{"key":"7922_CR18","unstructured":"Wetschoreck, F., RIP correlation. Introducing the predictive power score. https:\/\/medium.com\/towards-data-science\/rip-correlation-introducing-the-predictive-power-score-3d90808b9598. Cited January 16, 2025."},{"key":"7922_CR19","doi-asserted-by":"publisher","unstructured":"Singh, P.K., Gupta, R.R., Nandi, S.K., and Nandi, S., Machine learning based approach to detect wormhole attack in VANETs, Web, Artificial Intelligence and Network Applications. WAINA 2019, Barolli, L., Takizawa, M., Xhafa, F., and Enokido, T., Eds., Advances in Intelligent Systems and Computing, vol. 927, Cham: Springer, 2019, pp. 651\u2013661. https:\/\/doi.org\/10.1007\/978-3-030-15035-8_63","DOI":"10.1007\/978-3-030-15035-8_63"},{"key":"7922_CR20","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1007\/s11277-020-07549-y","volume":"114","author":"K. Adhikary","year":"2020","unstructured":"Adhikary, K., Bhushan, Sh., Kumar, S., and Dutta, K., Hybrid algorithm to detect DDoS attacks in VANETs, Wireless Pers. Commun., 2020, vol. 114, no. 4, pp. 3613\u20133634. https:\/\/doi.org\/10.1007\/s11277-020-07549-y","journal-title":"Wireless Pers. Commun."},{"key":"7922_CR21","first-page":"1468","volume":"7","author":"T.A. Teli","year":"2022","unstructured":"Teli, T.A., Yousuf, R., and Khan, D.A., MANET routing protocols attacks and mitigation techniques: A review, International Journal of Mechanical Engineering, 2022, vol. 7, no. 2, pp. 1468\u20131478.","journal-title":"International Journal of Mechanical Engineering"},{"key":"7922_CR22","doi-asserted-by":"publisher","first-page":"6665","DOI":"10.32604\/cmc.2023.032140","volume":"74","author":"V.A. Vuyyuru","year":"2023","unstructured":"Vuyyuru, V.A., Alotaibi, Y., Veeraiah, N., Alghamdi, S., and Sirisha, K., EsECC_SDN: Attack detection and classification model for MANET, Comput., \n               Mater. Continua, 2023, vol. 74, no. 3, pp. 6665\u20136688. https:\/\/doi.org\/10.32604\/cmc.2023.032140","journal-title":"Mater. Continua"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700877.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700877","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700877.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:01Z","timestamp":1773612241000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700877"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":22,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7922"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700877","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"10 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author of this work declares that he has no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}