{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:38Z","timestamp":1773615638320,"version":"3.50.1"},"reference-count":24,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625701019","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:33:04Z","timestamp":1771936384000},"page":"1457-1463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Using Entropy Metrics to Detect Data Integrity Attacks in Real Time"],"prefix":"10.3103","volume":"59","author":[{"given":"T. D.","family":"Ovasapyan","sequence":"first","affiliation":[]},{"given":"T. A.","family":"Bondarenko","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"Piskov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7936_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.46852\/0424-2513.1.2024.5","volume":"69","author":"T. Baranovska","year":"2024","unstructured":"Baranovska, T., Savitskyi, V., Serbov, M., Stoliar, Yu., and Krutik, Yu., The impact of cybercrime on state and institutional security: Analysis of threats and potential protection measures, Econ. Aff., 2024, vol. 69, no. 1, pp.\u00a033\u201342. https:\/\/doi.org\/10.46852\/0424-2513.1.2024.5","journal-title":"Econ. Aff."},{"key":"7936_CR2","doi-asserted-by":"publisher","first-page":"144925","DOI":"10.1109\/access.2019.2945839","volume":"7","author":"E. Berrueta","year":"2019","unstructured":"Berrueta, E., Morato, D., Magana, E., and Izal, M., A survey on detection techniques for cryptographic ransomware, IEEE Access, 2019, vol. 7, pp. 144925\u2013144944. https:\/\/doi.org\/10.1109\/access.2019.2945839","journal-title":"IEEE Access"},{"key":"7936_CR3","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.3103\/s0146411624700779","volume":"58","author":"T.D. Ovasapyan","year":"2024","unstructured":"Ovasapyan, T.D., Volkovskii, M.A., and Makarov, A.S., Detecting malware using deep neural networks, Autom. Control Comput. Sci., 2024, vol. 58, no. 8, pp. 1147\u20131155. https:\/\/doi.org\/10.3103\/s0146411624700779","journal-title":"Autom. Control Comput. Sci."},{"key":"7936_CR4","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.3103\/s0146411621080320","volume":"55","author":"K.V. Vasil\u2019eva","year":"2021","unstructured":"Vasil\u2019eva, K.V. and Lavrova, D.S., Detecting anomalies in cyber-physical systems using graph neural networks, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1051\u20131060. https:\/\/doi.org\/10.3103\/s0146411621080320","journal-title":"Autom. Control Comput. Sci."},{"key":"7936_CR5","doi-asserted-by":"publisher","first-page":"958","DOI":"10.3103\/s0146411623080060","volume":"57","author":"N.A. Gribkov","year":"2023","unstructured":"Gribkov, N.A., Ovasapyan, T.D., and Moskvin, D.A., Analysis of decompiled program code using abstract syntax trees, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 958\u2013967. https:\/\/doi.org\/10.3103\/s0146411623080060","journal-title":"Autom. Control Comput. Sci."},{"key":"7936_CR6","unstructured":"Boczan, T., The evolution of GandCrab ransomware. https:\/\/www.vmray.com\/cyber-security-blog\/gandcrab-ransomware-evolution-analysis\/. Cited January 6, 2025."},{"key":"7936_CR7","unstructured":"Virlock ransomware. https:\/\/www.knowbe4.com\/virlock-ransomware. Cited January 6, 2025."},{"key":"7936_CR8","doi-asserted-by":"publisher","first-page":"104231","DOI":"10.1016\/j.cose.2024.104231","volume":"150","author":"N. Singh","year":"2025","unstructured":"Singh, N. and Tripathy, S., Unveiling the veiled: An early stage detection of fileless malware, Comput. Secur., 2025, vol. 150, p. 104231. https:\/\/doi.org\/10.1016\/j.cose.2024.104231","journal-title":"Comput. Secur."},{"key":"7936_CR9","unstructured":"Marsaglia, G., The Marsaglia random number CDROM including the diehard battery of tests of randomness. http:\/\/www.stat.fsu.edu\/pub\/diehard\/. Cited March 30, 2025."},{"key":"7936_CR10","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.3390\/e24101503","volume":"24","author":"S.R. Davies","year":"2022","unstructured":"Davies, S.R., Macfarlane, R., and Buchanan, W.J., Comparison of entropy calculation methods for ransomware encrypted file identification, Entropy, 2022, vol. 24, no. 10, p. 1503. https:\/\/doi.org\/10.3390\/e24101503","journal-title":"Entropy"},{"key":"7936_CR11","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11416-022-00435-0","volume":"19","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M. and Krundyshev, V., Security intrusion detection using quantum machine learning techniques, J.\u00a0Comput. Virol. Hacking Tech., 2022, vol. 19, no. 1, pp. 125\u2013136. https:\/\/doi.org\/10.1007\/s11416-022-00435-0","journal-title":"J.\u00a0Comput. Virol. Hacking Tech."},{"key":"7936_CR12","doi-asserted-by":"publisher","first-page":"110205","DOI":"10.1109\/access.2019.2931136","volume":"7","author":"K. Lee","year":"2019","unstructured":"Lee, K., Lee, S.-Y., and Yim, K., Machine learning based file entropy analysis for ransomware detection in backup systems, IEEE Access, 2019, vol. 7, pp. 110205\u2013110215. https:\/\/doi.org\/10.1109\/access.2019.2931136","journal-title":"IEEE Access"},{"key":"7936_CR13","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.3103\/s0146411621080198","volume":"55","author":"I.I. Marshev","year":"2021","unstructured":"Marshev, I.I., Zhukovskii, E.V., and Aleksandrova, E.B., Protection against adversarial attacks on malware detectors using machine learning algorithms, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1025\u20131028. https:\/\/doi.org\/10.3103\/s0146411621080198","journal-title":"Autom. Control Comput. Sci."},{"key":"7936_CR14","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E., Communication theory of secrecy systems, Bell Syst. Tech. J., 1949, vol. 28, no. 4, pp. 656\u2013715. https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst. Tech. J."},{"key":"7936_CR15","doi-asserted-by":"publisher","unstructured":"Arakkal, A., Pazheri Sharafudheen, Sh., and Vasudevan, A.R., Crypto-ransomware detection: A honey-file based approach using chi-square test, Information Systems Security. ICISS 2023, Muthukkumarasamy, V., Sudarsan, S.D., and Shyamasundar, R.K., Eds., Lecture Notes in Computer Science, vol. 14424, Cham: Springer, 2023, pp. 449\u2013458. https:\/\/doi.org\/10.1007\/978-3-031-49099-6_27","DOI":"10.1007\/978-3-031-49099-6_27"},{"key":"7936_CR16","unstructured":"Walker, J., Pseudorandom number sequence test program. https:\/\/www.fourmilab.ch\/random\/. Cited March 30, 2025."},{"key":"7936_CR17","doi-asserted-by":"publisher","first-page":"133","DOI":"10.3390\/technologies11050133","volume":"11","author":"M. Severt","year":"2023","unstructured":"Severt, M., Casado-Vara, R., and Mart\u00edn Del Rey, A., A comparison of Monte Carlo-Based and PINN parameter estimation methods for malware identification in IoT networks, Technologies, 2023, vol. 11, no. 5, p. 133. https:\/\/doi.org\/10.3390\/technologies11050133","journal-title":"Technologies"},{"key":"7936_CR18","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1137\/1012065","volume":"12","author":"M.D. MacLaren","year":"1970","unstructured":"MacLaren, M.D., The Art of Computer Programming. Volume 2: Seminumerical Algorithms (Donald E. Knuth), SIAM Rev., 1970, vol. 12, no. 2, pp. 306\u2013308. https:\/\/doi.org\/10.1137\/1012065","journal-title":"SIAM Rev."},{"key":"7936_CR19","unstructured":"Morales, N., Chavez, I.N., Ragasa, N.G., et al., Agenda ransomware uses Rust to target more vital industries. https:\/\/www.trendmicro.com\/ru_ru\/research\/22\/l\/agenda-ransomware-uses-rust-to-target-more-vital-industries.html. Cited January 26, 2025."},{"key":"7936_CR20","unstructured":"Cooper, S., What is Jigsaw ransomware & how to protect against it?. https:\/\/www.comparitech.com\/net-admin\/jigsaw-ransomware\/. Cited January 26, 2025."},{"key":"7936_CR21","unstructured":"Ghanasyam, S.L., Step-by-step through the Money Message ransomware. https:\/\/news.sophos.com\/en-us\/2023\/10\/31\/step-by-step-through-the-money-message-ransomware\/. Cited January 26, 2025."},{"key":"7936_CR22","unstructured":"SwiftSlicer: A simple yet dangerous data wiper. https:\/\/www.acronis.com\/en-us\/cyber-protection-center\/posts\/swiftslicer-a-simple-yet-dangerous-data-wiper\/. Cited January 26, 2025."},{"key":"7936_CR23","unstructured":"Alraddadi, W. and Sarvotham, H., A comprehensive analysis of WannaCry: Technical analysis, Reverse Engineering, and Motivation. https:\/\/people-ece.vse.gmu.edu\/coursewebpages\/ECE\/ECE646\/F19\/project\/F18_presentations\/Session_III\/Session_III_Report_3.pdf. Cited January 26, 2025."},{"key":"7936_CR24","doi-asserted-by":"publisher","unstructured":"Larkin, K.G., Reflections on shannon information: In search of a natural information-entropy for images, arXiv Preprint, 2016. https:\/\/doi.org\/10.48550\/arXiv.1609.01117","DOI":"10.48550\/arXiv.1609.01117"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701019.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625701019","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701019.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:37Z","timestamp":1773612157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625701019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":24,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7936"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625701019","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"21 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}