{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:04Z","timestamp":1773615844545,"version":"3.50.1"},"reference-count":9,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625701056","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:31:26Z","timestamp":1771936286000},"page":"1491-1496","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ensuring the Cybersecurity of the Functional Network of CII Facilities Using the Optimal Honeypot Node Deployment Strategy"],"prefix":"10.3103","volume":"59","author":[{"given":"E. V.","family":"Zavadskii","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7940_CR1","unstructured":"Wifitalents reports. Advanced Persistent Threat Statistics. https:\/\/wifitalents.com\/advanced-persistent-threat-statistics\/. Cited July 31, 2025."},{"key":"7940_CR2","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.3103\/s0146411621080460","volume":"55","author":"E.V. Zavadskii","year":"2021","unstructured":"Zavadskii, E.V. and Ivanov, D.V., Implementation of honeypot systems based on the potential attack graph, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1194\u20131200. https:\/\/doi.org\/10.3103\/s0146411621080460","journal-title":"Autom. Control Comput. Sci."},{"key":"7940_CR3","doi-asserted-by":"publisher","first-page":"977","DOI":"10.3103\/s0146411620080222","volume":"54","author":"D.S. Lavrova","year":"2020","unstructured":"Lavrova, D.S. and Shtyrkina, A.A., The analysis of artificial neural network structure recovery possibilities based on the theory of graphs, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 977\u2013982. https:\/\/doi.org\/10.3103\/s0146411620080222","journal-title":"Autom. Control Comput. Sci."},{"key":"7940_CR4","doi-asserted-by":"publisher","first-page":"36107","DOI":"10.1103\/physreve.78.036107","volume":"78","author":"N. Perra","year":"2008","unstructured":"Perra, N. and Fortunato, S., Spectral centrality measures in complex networks, Phys. Rev. E, 2008, vol. 78, no.\u00a03, p. 36107. https:\/\/doi.org\/10.1103\/physreve.78.036107","journal-title":"Phys. Rev. E"},{"key":"7940_CR5","doi-asserted-by":"publisher","first-page":"32318","DOI":"10.1103\/physreva.95.032318","volume":"95","author":"J.A. Izaac","year":"2017","unstructured":"Izaac, J.A., Zhan, X., Bian, Zh., Wang, K., Li, J., Wang, J.B., and Xue, P., Centrality measure based on continuous-time quantum walks and experimental realization, Phys. Rev. A, 2017, vol. 95, no. 3, p. 32318. https:\/\/doi.org\/10.1103\/physreva.95.032318","journal-title":"Phys. Rev. A"},{"key":"7940_CR6","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.3103\/s0146411621080253","volume":"55","author":"T.D. Ovasapyan","year":"2021","unstructured":"Ovasapyan, T.D., Nikulkin, V.A., and Moskvin, D.A., Applying honeypot technology with adaptive behavior to Internet-of-Things networks, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1104\u20131110. https:\/\/doi.org\/10.3103\/s0146411621080253","journal-title":"Autom. Control Comput. Sci."},{"key":"7940_CR7","doi-asserted-by":"publisher","first-page":"2704","DOI":"10.1137\/20m1385998","volume":"81","author":"L. B\u00f6ttcher","year":"2021","unstructured":"B\u00f6ttcher, L. and Porter, M.A., Classical and quantum random-walk centrality measures in multilayer networks, SIAM J. Appl. Math., 2021, vol. 81, no. 6, pp. 2704\u20132724. https:\/\/doi.org\/10.1137\/20m1385998","journal-title":"SIAM J. Appl. Math."},{"key":"7940_CR8","unstructured":"Vulnerability database of the Federal Service for Technical and Export Control of Russia. https:\/\/bdu.fstec.ru\/vul. Cited July 31, 2025."},{"key":"7940_CR9","doi-asserted-by":"publisher","unstructured":"Zegzhda, D.P., Pavlenko, E., and Shtyrkina, A., Cybersecurity and control sustainability in digital economy and advanced production, The Economics of Digital Transformation. Studies on Entrepreneurship, Devezas, T., Leit\u00e3o, J., and Sarygulov, A., Eds., Structural Change and Industrial Dynamics, Cham: Springer, 2021, pp. 173\u2013185. https:\/\/doi.org\/10.1007\/978-3-030-59959-1_11","DOI":"10.1007\/978-3-030-59959-1_11"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701056.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625701056","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625701056.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:26Z","timestamp":1773612326000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625701056"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7940"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625701056","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"12 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author of this work declares that he has no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}