{"id":"https://openalex.org/W4408440168","doi":"https://doi.org/10.3103/s0146411624701074","title":"Development of Software and Hardware to Protect Technological Processes from Cyber Threats","display_name":"Development of Software and Hardware to Protect Technological Processes from Cyber Threats","publication_year":2024,"publication_date":"2024-12-01","ids":{"openalex":"https://openalex.org/W4408440168","doi":"https://doi.org/10.3103/s0146411624701074"},"language":"en","primary_location":{"id":"doi:10.3103/s0146411624701074","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411624701074","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116621920","display_name":"F. G. Pashaev","orcid":null},"institutions":[{"id":"https://openalex.org/I4210115115","display_name":"Ministry of Education of Azerbaijan Republic","ror":"https://ror.org/022arna15","country_code":"AZ","type":"government","lineage":["https://openalex.org/I4210115115"]}],"countries":["AZ"],"is_corresponding":true,"raw_author_name":"F. G. Pashaev","raw_affiliation_strings":["Institute of Control Systems, Ministry of Science and Education of the Republic of Azerbaijan, AZ1142, Baku, Republic of Azerbaijan"],"affiliations":[{"raw_affiliation_string":"Institute of Control Systems, Ministry of Science and Education of the Republic of Azerbaijan, AZ1142, Baku, Republic of Azerbaijan","institution_ids":["https://openalex.org/I4210115115"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116621921","display_name":"D. I. Zeinalov","orcid":null},"institutions":[{"id":"https://openalex.org/I71333263","display_name":"Nakhchivan State University","ror":"https://ror.org/02wne9d91","country_code":"AZ","type":"education","lineage":["https://openalex.org/I71333263"]}],"countries":["AZ"],"is_corresponding":false,"raw_author_name":"D. I. Zeinalov","raw_affiliation_strings":["Nakhchivan State University, AZ7012, Nakhchivan, Republic of Azerbaijan"],"affiliations":[{"raw_affiliation_string":"Nakhchivan State University, AZ7012, Nakhchivan, Republic of Azerbaijan","institution_ids":["https://openalex.org/I71333263"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5116621922","display_name":"G. T. Nadzhafov","orcid":null},"institutions":[{"id":"https://openalex.org/I71333263","display_name":"Nakhchivan State University","ror":"https://ror.org/02wne9d91","country_code":"AZ","type":"education","lineage":["https://openalex.org/I71333263"]},{"id":"https://openalex.org/I4210103841","display_name":"Nakhchivan University","ror":"https://ror.org/01dqrx648","country_code":"AZ","type":"education","lineage":["https://openalex.org/I4210103841"]}],"countries":["AZ"],"is_corresponding":false,"raw_author_name":"G. T. Nadzhafov","raw_affiliation_strings":["Nakhchivan University, AZ7000, Nakhchivan, Republic of Azerbaijan"],"affiliations":[{"raw_affiliation_string":"Nakhchivan University, AZ7000, Nakhchivan, Republic of Azerbaijan","institution_ids":["https://openalex.org/I4210103841","https://openalex.org/I71333263"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5116621920"],"corresponding_institution_ids":["https://openalex.org/I4210115115"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.4537275,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"58","issue":"8","first_page":"1396","last_page":"1405"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13181","display_name":"Economic and Technological Systems Analysis","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13120","display_name":"Nuclear Issues and Defense","score":0.963699996471405,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8652714490890503},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6181658506393433},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6147263050079346},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.43756037950515747},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.29437482357025146}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8652714490890503},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6181658506393433},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6147263050079346},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.43756037950515747},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.29437482357025146}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3103/s0146411624701074","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411624701074","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2130501758","https://openalex.org/W2331622252","https://openalex.org/W2619874920","https://openalex.org/W2747594285","https://openalex.org/W2802867866","https://openalex.org/W2897453488","https://openalex.org/W4251536867","https://openalex.org/W6813079621"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0,126,187,203],"rapid":[1],"development":[2],"of":[3,29,32,48,89,112,122,129,137,143,181],"technological":[4,33,171,217],"computer":[5,173,219],"networks":[6,19,225],"(TCNs)":[7],"and":[8,20,34,40,51,66,73,98,102,116,140,147,170,177,197,215,237],"SCADA":[9],"systems":[10,94],"has":[11,37,57],"inevitably":[12],"accelerated":[13],"the":[14,21,27,86,110,120,135,157,167,182,193,199,212,216,223,234],"integration":[15],"process":[16,92],"between":[17,166,211,222],"these":[18],"global":[22,168,213],"Internet.":[23,87],"As":[24],"a":[25,164,208,230],"result,":[26],"solution":[28],"many":[30],"problems":[31],"production":[35],"processes":[36],"been":[38,43],"simplified,":[39],"opportunities":[41],"have":[42],"created":[44,58,158,183],"for":[45,150],"remote":[46],"management":[47],"enterprise":[49],"personnel":[50],"operational":[52],"personnel.":[53],"However,":[54],"this":[55],"situation":[56],"new,":[59],"previously":[60],"nonexistent":[61],"threats":[62],"to":[63],"monitoring,":[64],"diagnostics,":[65],"control":[67,93,124],"systems.":[68,125],"Various":[69],"specialized":[70],"groups,":[71],"hackers,":[72],"sometimes":[74],"government":[75],"agencies":[76],"carry":[77],"out":[78],"targeted":[79],"attacks":[80,115],"on":[81,91,134],"specific":[82],"industrial":[83],"enterprises":[84],"via":[85],"Organizers":[88],"cyberattacks":[90],"improve":[95],"their":[96,104,113],"methods":[97,149],"tools":[99],"over":[100],"time":[101],"increase":[103],"professional":[105],"level.":[106],"They":[107],"carefully":[108],"study":[109],"objects":[111],"future":[114],"identify":[117],"vulnerabilities":[118],"in":[119,192,198],"software":[121,179,205],"object":[123],"developed":[127,204],"set":[128],"technical":[130,151],"means":[131,152],"is":[132,226],"based":[133],"use":[136],"STM32F4XX":[138,235],"controllers":[139],"LPT":[141,238],"ports":[142],"computers.":[144],"Connection":[145],"diagrams":[146],"installation":[148],"are":[153,185,190],"provided,":[154],"which,":[155],"as":[156,163,207],"exchange":[159],"protocols,":[160],"can":[161],"serve":[162],"bridge":[165,210],"Internet":[169,214],"corporate":[172,218],"networks.":[174],"Simple":[175],"algorithms":[176],"operating":[178],"fragments":[180,189],"protocols":[184],"presented.":[186],"program":[188],"given":[191],"C":[194],"programming":[195,201],"language":[196],"DELPHI":[200],"system.":[202],"acts":[206],"filtering":[209],"network.":[220],"Information":[221],"two":[224],"exchanged":[227],"by":[228],"using":[229,233],"nonstandard":[231],"protocol":[232],"controller":[236],"port.":[239]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
