Ensuring the Cybersecurity of the Functional Network of CII Facilities Using the Optimal Honeypot Node Deployment Strategy
Crossref DOI link: https://doi.org/10.3103/S0146411625701056
Published Online: 2026-02-24
Published Print: 2025-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Zavadskii, E. V.
Text and Data Mining valid from 2025-12-01
Version of Record valid from 2025-12-01
Article History
Received: 12 June 2025
Revised: 2 July 2025
Accepted: 5 July 2025
First Online: 24 February 2026
CONFLICT OF INTEREST
: The author of this work declares that he has no conflicts of interest.