Published June 29, 2023 | Version v1
Book Open

Models of socio-cyber-physical systems security

  • 1. National Technical University "Kharkiv Polytechnic Institute"
  • 2. National Aviation University
  • 3. Y. Fedkovych Chernivtsi National University
  • 4. Taras Shevchenko National University of Kyiv
  • 5. National Academy of Security Service of Ukraine
  • 6. National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"
  • 7. Borys Grinchenko Kyiv University
  • 8. State University of Telecommunications
  • 9. Ivan Kozhedub Kharkiv National Air Force University
  • 10. Lviv Polytechnic National University
  • 11. National Defence University of Ukraine named after Ivan Cherniakhovskyi
  • 12. Kharkiv National University of Radioelectronics

Description

The development of technologies and computing resources has not only expanded the range of digital services in all spheres of human activity, but also determined the range of targeted cyber attacks. Targeted attacks are aimed at destroying not only the business structure, but also its individual components that determine critical business processes. The continuity of such business processes is a critical component of any company, organization or enterprise of any form of ownership, which has a critical impact on making a profit or organizing production processes. The proposed concept of determining the security level of critical business processes is based on the need to use multiloop information security systems. This makes it possible to ensure the continuity of critical business processes through a timely objective assessment of the level of security and the timely formation of preventive measures. This approach is based on the proposed rules for determining the reach of a given security level, based on assessments of the integrity, availability and confidentiality of information arrays, as well as computer equipment for different points of the organization's business processes. The issues of applying situational management methods to ensure the safe functioning of objects of socio-cyberphysical systems, logical and transformational rules that form the foundation for building a situational type cybersecurity management system are considered. One of the main tasks of systems of this type is described – the task of replenishing the description of the situation. The use of pseudophysical logics, various types of pseudophysical logics, the method of their construction and their interconnection are proposed. Particular attention is paid to causal pseudophysical logic, as the least developed for the purposes of ensuring cybersecurity. The formation of smart technologies, as a rule, uses the wireless standards of communication channels IEEE 802.11X, IEEE 802.15.4, IEEE 802.16, which use only authentication protocols and privacy mechanisms that are formed on the basis of symmetric algorithms. In the conditions of the post-quantum period (the appearance of a full-scale quantum computer), the stability of such algorithms is questioned. Such systems, as a rule, are formed on the basis of the synthesis of socio-cyber-physical systems and cloud technologies, which simplifies the implementation of Advanced Persistent Threat attacks, both on the internal loop of control systems and on the external one.

The proposed creation of multi-circuit information protection systems allows for an objective assessment of the flow state of the system as a whole and the formation of preventive measures against cyber threats.

In the thied chapter, models of probable threats and information protection in public networks are proposed. The most general model of the formal description of the protection system is the model of the security system with full overlap, in which a complete list of protection objects and threats to information is determined, and means of ensuring security are determined from the point of view of their effectiveness and contribution to ensuring the security of the entire telecommunications system. It is also shown that the combination of four models (M1, M2, M3, M4) in various variants provides wide opportunities for modeling various known types of threats and their implementation. However, in connection with the continuity of the process of developing new and improving existing methods and means of implementing threats, it is necessary to use such approaches to ensuring information protection that allow detecting and preventing threats of unknown types and carrying out dynamic correction of protection behavior, adapting it to specific application conditions. The M5 basic model is described, which enables continuous refinement of threat classes and response measures, and continuous training of the adaptive component of the CSI, which, in turn, detects and prevents threats of unknown types. The M6 basic model is introduced with the aim of obtaining higher security due to the presence of a special module of internal diagnostics that diagnoses the entire protection system, decides on the correction of the SHI behavior algorithm, and makes it possible to achieve SHI fault tolerance; a special module that diagnoses the communication channel with subsequent changes in the level of protection, allows to achieve the adaptability of the SHI.

The fourth chapter is deal with the development of cryptographic primitives based on cellular automata. The definition of a cellular automaton is given and the elementary rules of intercellular interaction are described.

A number of generators of pseudorandom binary sequences have been developed based on a combination of elementary rules of intercellular interaction, as well as cell interaction according to a rule of our own development.

In the “cryptographic sponge” architecture, a cryptographic hashing function with a shuffling function based on cellular automata was developed and its statistical characteristics and avalanche effect were investigated.

A block cipher in the SP-network architecture is constructed, in which cellular automata are used to deploy the key, and the encryption process is based on elementary procedures of replacement and permutation. Substitution blocks are used from the well-known AES cipher, a description of a stream cipher is given, where a personal computer keyboard and mouse are used as the initial entropy. Random data received from the specified devices is processed by a proprietary hashing function based on a "cryptographic sponge". All developed cryptographic functions and primitives demonstrated good statistical characteristics and avalanche properties.

The fifth chapter proposes a methodology for analyzing the quality of the mechanism for validating the identified vulnerabilities of a corporate network, which is based on integral equations that take into account the quantitative characteristics of the vulnerability validation mechanism under study at a certain point in time. This technique allows you to build the laws of distribution of quality indicators of the vulnerability validation process and quantify the quality of the mechanism for validating detected vulnerabilities, which allows you to monitor and control the validation of identified vulnerabilities in real time during active security analysis. A method is proposed for constructing a fuzzy knowledge base for making decisions when validating vulnerabilities of software and hardware platforms with an active analysis of the security of a target corporate network based on the use of fuzzy logic, which makes it possible to provide reliable information about the quality of the mechanism for validating vulnerabilities indirectly. The constructed knowledge base allows you to form decisive decision-making rules for the implementation of a particular attacking action, which allows you to develop expert systems to automate the decision-making process when validating the identified vulnerabilities of target information systems and networks. An improved method of automatic active security analysis is proposed, which, based on the synthesis of the proposed models, techniques and methods, allows, in contrast to the existing ones, to abstract from the conditions of dynamic changes in the environment, i.e. constant development of information technologies, which leads to an increase in the number of vulnerabilities and corresponding attack vectors, as well as an increase in ready-to-use exploits of vulnerabilities and their availability, and take into account only the quality parameters of the vulnerability validation process itself.

Files

978-617-7319-72-5_.pdf

Files (2.6 MB)

Name Size Download all
md5:523ee929379e3baa76b0744a12e9613d
2.6 MB Preview Download

Additional details

References

  • Milov, O., Khvostenko, V., Natalia, V., Korol, O., Zviertseva, N. (2022). Situational Control of Cyber Security in Socio-Cyber-Physical Systems. 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). doi: https://doi.org/10.1109/hora55278.2022.9800049
  • Yevseiev, S., Ponomarenko, V., Ponomarenko, V., Rayevnyeva, O., Rayevnyeva, O. (2017). Assessment of functional efficiency of a corporate scientific­educational network based on the comprehensive indicators of quality of service. Eastern-European Journal of Enterprise Technologies, 6 (2 (90)), 4–15. doi: https://doi.org/10.15587/1729-4061.2017.118329
  • Androshchuk, А., Yevseiev, S., Melenchuk, V., Lemeshko, O., Lemeshko, V. (2020). Improvement of project risk assessment methods of implementation of automated information components of non-commercial organizational and technical systems. EUREKA: Physics and Engineering, 1, 48–55. doi: https://doi.org/10.21303/2461-4262.2020.001131
  • Pospelov, D. A. (2021). Situatuinal control: Theory and Practice. URSS, 288.
  • Li, T., Liu, J., Sun, H., Chen, X., Yin, L., Mao, X., Sun, J. (2021). Runtime Verification of Spatio-Temporal Specification Language. Mobile Networks and Applications, 26 (6), 2392–2406. doi: https://doi.org/10.1007/s11036-021-01779-5
  • Lange, R. T. (2019). Action Grammars: A Grammar Induction-Based Method for Learning Temporally-Extended Actions. Imperial College London.
  • Kempson, R., Cann, R., Gregoromichelaki, E., Chatzikyriakidis, S. (2017). Action-Based Grammar. Theoretical Linguistics, 43 (1-2), 141–167. doi: https://doi.org/10.1515/tl-2017-0012
  • Milov, O., Yevseiev, S., Vlasov, A., Herasimov, S., Dmitriiev, O., Kasianenko, M. et al. (2019). Development of scenario modeling of conflict tools in a security system based on formal grammars. Eastern-European Journal of Enterprise Technologies, 6 (9 (102)), 53–64. doi: https://doi.org/10.15587/1729-4061.2019.184274
  • Mehrabian, M., Khayatian, M., Shrivastava, A., Eidson, J. C., Derler, P., Andrade, H. A. et al. (2017). Timestamp Temporal Logic (TTL) for Testing the Timing of Cyber-Physical Systems. ACM Transactions on Embedded Computing Systems, 16 (5s), 1–20. doi: https://doi.org/10.1145/3126510
  • Yevseiev, S., Milov, O., Opirskyy, I., Dunaievska, O., Huk, O., Pogorelov, V. et al. (2022). Development of a concept for cybersecurity metrics classification. Eastern-European Journal of Enterprise Technologies, 4 (4 (118)), 6–18. doi: https://doi.org/10.15587/1729-4061.2022.263416
  • Abel, S., Xiao, L., Wang, H. (2018). Causal Modeling for Cybersecurity. 2018 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), 209–212. doi: https://doi.org/10.1109/socialsec.2018.8760379
  • Kondakci, S. (2010). A causal model for information security risk assessment. 2010 Sixth International Conference on Information Assurance and Security, 143–148. doi: https://doi.org/10.1109/isias.2010.5604039
  • Friedenberg, M., Halpern, J. Y. (2018). Combining the causal judgments of experts with possibly different focus areas. Available at: http://www.cs.cornell.edu/home/halpern/papers/focus.pdf
  • Halpern, J. Y. (2015). A modification of the Halpern-Pearl definition of causality. International Joint Conference on Artificial Intelligence, 3022–3033. Available at: https://www.ijcai.org/Proceedings/15/Papers/427.pdf
  • Fenz, S., Ekelhart, A. (2011). Verification, Validation, and Evaluation in Information Security Risk Management. IEEE Security & Privacy Magazine, 9 (2), 58–65. doi: https://doi.org/10.1109/msp.2010.117
  • IEC 31010:2019 (2019). Risk management – Risk assessment techniques. International Organization of Standardization (ISO), 264.
  • Shaikh, F. A., Siponen, M. (2023). Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers & Security, 124, 102974. doi: https://doi.org/10.1016/j.cose.2022.102974
  • Haag, S., Siponen, M., Liu, F. (2021). Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 52 (2), 25–67. doi: https://doi.org/10.1145/3462766.3462770
  • Li, Y., Xin, T., Siponen, M. (2022). Citizens' Cybersecurity Behavior: Some Major Challenges. IEEE Security & Privacy, 20 (1), 54–61. doi: https://doi.org/10.1109/msec.2021.3117371
  • Chen, S., Xiao, H., He, W., Mou, J., Siponen, M., Qiu, H., Xu, F. (2021). Determinants of Individual Knowledge Innovation Behavior. Journal of Organizational and End User Computing, 33 (6), 1–24. doi: https://doi.org/10.4018/joeuc.20211101.oa27
  • Yevseiev, S., Kuznietsov, O., Herasimov, S., Horielyshev, S., Karlov, A., Kovalov, I. et al. (2021). Development of an optimization method for measuring the Doppler frequency of a packet taking into account the fluctuations of the initial phases of its radio pulses. Eastern-European Journal of Enterprise Technologies, 2 (9 (110)), 6–15. doi: https://doi.org/10.15587/1729-4061.2021.229221
  • Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M., Hrytsyk, V., Milov, O. et al.; Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M. (Eds.) (2022). Modeling of security systems for critical infrastructure facilities. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 196. doi: http://doi.org/10.15587/978-617-7319-57-2
  • ISO/IEC 27003:2017 (2017). Information technology – Security techniques – Information security management systems – Guidance. Available at: https://www.iso.org/ru/standard/63417.html
  • ISO/IEC 27006:2015 (2015). Information technology – Security techniques – Requirements for bodies providing audit and certification of information security management systems. Available at: https://www.iso.org/standard/62313.html
  • ISO/IEC 27035-1:2023 (2023). Information technology – Information security incident management – Part 1: Principles and process. Available at: https://www.iso.org/ru/standard/78973.html
  • ISO/IEC 27035-2:2023 (2023). Information technology – Information security incident management – Part 2: Guidelines to plan and prepare for incident response. Available at: https://www.iso.org/ru/standard/78974.html
  • ISO/IEC 27035-3:2020 (2020). Information technology – Information security incident management – Part 3: Guidelines for ICT incident response operations. Available at: https://www.iso.org/ru/standard/74033.html
  • Lund, M. S., Solhaug, B., Stølen, K. (2010). Model-Driven Risk Analysis: The CORAS Approach. Springer Publishing Company, Incorporated, 400.
  • Matulevičius, R. (2017). Domain Model for Information Systems Security Risk Management. Fundamentals of Secure System Modelling. Springer International Publishing AG, 17–30. doi: https://doi.org/10.1007/978-3-319-61717-6_2
  • Innerhofer-Oberperfler, F., Mitterer, M., Hafner, M., Breu, R. (2010). Security Analysis of Service Oriented Systems: A Methodical Approach and Case Study. Web Services Security Development and Architecture. IGI Global, 33–56. doi: https://doi.org/10.4018/978-1-60566-950-2.ch002
  • Innerhofer-Oberperfler, F., Breu, R.; Moore, T., Pym, D., Ioannidis, C. (Eds.) (2010). Potential Rating Indicators for Cyberinsurance: An Exploratory Qualitative Study. Economics of Information Security and Privacy. Boston: Springer. doi: https://doi.org/10.1007/978-1-4419-6967-5_13
  • Alkubaisy, D., Piras, L., Al-Obeidallah, M. G., Cox, K., Mouratidis, H.; Ali, R., Kaindl, H., Maciaszek, L. A. (Eds.) (2022). A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design. Evaluation of Novel Approaches to Software Engineering. Cham: Springer, 67–87. doi: https://doi.org/10.1007/978-3-030-96648-5_4
  • Pullonen, P., Tom, J., Matulevičius, R., Toots, A. (2019). Privacy-enhanced BPMN: enabling data privacy analysis in business processes models. Software and Systems Modeling, 18 (6), 3235–3264. doi: https://doi.org/10.1007/s10270-019-00718-z
  • Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevicius, R. et al. (2021). Post-Quantum Era Privacy Protection for Intelligent Infrastructures. IEEE Access, 9, 36038–36077. doi: https://doi.org/10.1109/access.2021.3062201
  • Koeze, R. (2017). Designing a Rule-Based Cyber Risk Assessment Tool for Small to Medium Enterprises. Delft University of Technology. The TREsPASS Project. The TREsPASS Project.
  • Pohasii, S., Yevseiev, S., Zhuchenko, O., Milov, O., Lysechko, V., Kovalenko, O. et al. (2022). Development of crypto-code constructs based on LDPC codes. Eastern-European Journal of Enterprise Technologies, 2 (9 (116)), 44–59. doi: https://doi.org/10.15587/1729-4061.2022.254545
  • Shmatko, O., Balakireva, S., Vlasov, A., Zagorodna, N., Korol, O., Milov, O. et al. (2020). Development of methodological foundations for designing a classifier of threats to cyberphysical systems. Eastern-European Journal of Enterprise Technologies, 3 (9 (105)), 6–19. doi: https://doi.org/10.15587/1729-4061.2020.205702
  • Merz, H., Hansemann, T., Hübner, C. (2009). Building Automation: Communication systems with EIB/KNX, LON und BACnet. Berlin Heidelberg: Springer-Verlag, 293.
  • KNX Technical Manual 2CKA001473B8668. KNX Technical Manual. Busch-Presence detector KNX / Busch-Watchdog Sky KNX (2017). Busch-Jaeger Elektro GmbH, 198.
  • Technical documentation on KNX devices (2006). ABB.
  • KNX Handbook Version 1.1 Revision 1 (2004). Konnex Association.
  • ABB i-bus KNX KNX Security Panel GM/A 8.1 Product Manual (2016). Busch-Watchdog Sky KNX. Busch-Jaeger Elektro GmbH, 648.
  • Schilder, J., Reibel, T. (2016). ABB GPG Building Automation Webinar ABB i-bus® KNX Basics and Products. Busch-Watchdog Sky KNX. Busch-Jaeger Elektro GmbH, 86.
  • Manual for KNX Planning (2017). Siemens Switzerland Ltd, 100.
  • Security Technology KNX-Intrusion Alarm System L240 Installation, Commissioning, Operation / Busch-Watchdog Sky KNX (2010). Busch-Jaeger Elektro GmbH, 116.
  • Bartock, M., Cichonski, J., Souppaya, M., Smith, M., Witte, G., Scarfone, K. (2016). Guide for cybersecurity event recovery. doi: https://doi.org/10.6028/nist.sp.800-184
  • Security requirements for cryptographic modules (1994). Information Technology Laboratory. Available at: https://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
  • Cichonski, J., Franklin, J. M., Bartock, M. (2017). Guide to LTE security. doi: https://doi.org/10.6028/nist.sp.800-187
  • Kottapalli, N. (2011). Diameter and LTE Evolved Packet System. Corporate Headquarters, 10. Available at: http://go.radisys.com/rs/radisys/images/paper-lte-diameter-eps.pdf
  • Ventura, H. (2002). Diameter – Next generation's AAA protocol. Institutionen för Systemteknik, 66.
  • Vinay, K. S. B., Harihar, M. N. (2012). Diameter-Based Protocol in the IP Multimedia Subsystem. International Journal of Soft Computing and Engineering, 1 (6), 266–269.
  • Qanbari, S., Mahdizadeh, S., Rahimzadeh, R., Behinaein, N., & Dustdar, S. (2016). Diameter of Things (DoT): A Protocol for Real-Time Telemetry of IoT Applications. Lecture Notes in Computer Science. GECON, 207–222. doi: https://doi.org/10.1007/978-3-319-43177-2_14
  • Tschofenig, H. (2019). Diameter: new generation AAA protocol – design, practice, and applications. Hoboken: John Wiley & Sons, Ltd, 230. doi: https://doi.org/10.1002/9781118875889
  • Ugrozy bezopasnosti iadra paketnoi seti 4G (2017). Available at: https://www.ptsecurity.com/ru-ru/research/analytics/epc-2017/
  • Uiazvimosti protokola Diameter v setiakh 4G (2018). Available at: https://www.ptsecurity.com/ru-ru/research/analytics/diameter-2018/
  • Yevseiev, S., Tsyhanenko, O., Ivanchenko, S., Aleksiyev, V., Verheles, D., Volkov, S. et al. (2018). Practical implementation of the Niederreiter modified crypto­code system on truncated elliptic codes. Eastern-European Journal of Enterprise Technologies, 6 (4 (96)), 24–31. doi: https://doi.org/10.15587/1729-4061.2018.150903
  • Yevseiev, S., Korol, O., Kots, H. (2017). Construction of hybrid security systems based on the crypto-code structures and flawed codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (88)), 4–21. doi: https://doi.org/10.15587/1729-4061.2017.108461
  • Yevseiev, S., Kots, H., Liekariev, Y. (2016). Developing of multi-factor authentication method based on niederreiter-mceliece modified crypto-code system. Eastern-European Journal of Enterprise Technologies, 6 (4 (84)), 11–23. doi: https://doi.org/10.15587/1729-4061.2016.86175
  • Yevseiev, S., Rzayev, K., Korol, O., Imanova, Z. (2016). Development of mceliece modified asymmetric crypto-code system on elliptic truncated codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (82)), 18–26. doi: https://doi.org/10.15587/1729-4061.2016.75250
  • Pohasii, S., Yevseiev, S., Zhuchenko, O., Milov, O., Lysechko, V., Kovalenko, O. et al. (2022). Development of crypto-code constructs based on LDPC codes. Eastern-European Journal of Enterprise Technologies, 2 (9 (116)), 44–59. doi: https://doi.org/10.15587/1729-4061.2022.254545
  • Naim, M., Ali-Pacha, H., Ali-Pacha, A., Hadj-Said, N. (2021). Lengthening the period of a Linear Feedback Shift Register. Journal of Engineering Technology and Applied Sciences, 6 (1), 45–68. doi: https://doi.org/10.30931/jetas.778792
  • Khoroshko, V. O., Pavlov, I. M., Bobalo, Y. Ya., Dudykevich, V. B. et al. (2020). Design of complex information protection systems. Lviv: Lviv Polytechnic, 320.
  • Brailovskyi, M. M., Zybin, S. V., Piskun, I. V., Khoroshko, V. O., Khokhlacheva, Yu. E. (2021). Tekhnolohii zakhystu informatsii. Kyiv: Central Committee "Comprint", 296.
  • Popovsky, V. V., Persikov, A. V. (2006). Zakhyst informatsii v telekomunikatsiinykh systemakh. Kharkiv: SMIT.
  • Dudykevich, V. B., Khoroshko, V. O., Yaremchuk, Yu. E. (2018). Osnovy informatsiinoi bezpeky. Vinnytsia: VNTU, 315.
  • Efficiency Standards for Protecting ACS and Computers from Data Loss Due to EM Emissions and Pickup (1997). Moscow: MOP, 35.
  • Brailovsky, M. M., Zybin, S. V., Kobozeva, A. A., Khoroshko, V. O., Khokhlacheva, Yu. E. (2021). Analysis of cyber security of information systems. Kyiv: FOP Yamchynskyi O. V., 360.
  • Beloshapkin, V. K., Pustovit, S. M., Stepanov, V. D. (2005). Construction of a specialized model of the information system for the purpose of synthesizing a complex SHI. Protection of information, 3, 78–83.
  • Stallings, V. (2001). Cryptography and network protection, principles and practice. House Williams, 672.
  • Chumarin, I. G. (2001). Taina predpryiatyia: chto y kak zashchyshchat. Saint Petersburg: Ed. DNA, 159.
  • Stepanov, V. D., Khoroshko, V. O. (2003). Collection of sciences. Works Information protection of the Scientific Research Institute of GUR, 5, 12–19.
  • Khoroshko, V. O., Kryvoruchko, O. V., Brailovskyi, M. M., Kozyura, V. D., Desyatko, A. M. (2019). Protection of electronic communications systems. Kyiv. national trade and economy Univ, 164.
  • Domarev, V. V. (2004). Bezopasnost informatcionnykh tekhnologii. Sistemnii pokhod. Kyiv: TND "DS", 992.
  • Maksimov, Yu. A., Fillipovskaya, E. A. (1982). Algorithms for solving problems of nonlinear programming. Moscow: MIPhI, 342.
  • Petrov, A. A., Khoroshko, V. A. (2009). Evaluation of the effectiveness of the complex information protection system in public networks. Collection. Science works of KNU named after T. Shevchenko VIKNU, 21, 128–131.
  • Hayvoronsky, M. V., Novikov, O. M. (2009). Bezpeka informatsiino-komunikatsiinykh system. Kyiv: Ed. BHV group, 608.
  • Pichkur, V. V., Sobchuk, V. V. (2021). Mathematical Model and Control Design of a Functionally Stable Technological Process. Journal of Optimization, Differential Equations and Their Applications, 29 (1), 32. doi: https://doi.org/10.15421/142102
  • Sobchuk, V., Pichkur, V., Barabash, O., Laptiev, O., Kovalchuk, I., Zidan, A. (2020). Algorithm of Control of Functionally Stable Manufacturing Processes of Enterprises. 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, 206–210, doi: https://doi.org/10.1109/ATIT50783.2020.9349332
  • Sobchuk, V., Olimpiyeva, Y., Musienko, A., Sobchuk, A. (2021). Ensuring the properties of functional stability of manufacturing processes based on the application of neural networks. CEUR Workshop Proceedings, 2845, 106–116.
  • Maksymuk, O. V., Sobchuk, V. V., Salanda, I. P., Sachuk, Yu. V. (2020). A system of indicators and criteria for evaluation of the level of functional stability of information heterogenic networks. Mathematical Modeling and Computing, 7 (2), 285–292. doi: https://doi.org/10.23939/mmc2020.02.285
  • Barabash, O., Tverdenko, H., Sobchuk, V., Musienko, A., Lukova-Chuiko, N. (2020). The Assessment of the Quality of Functional Stability of the Automated Control System with Hierarchic Structure. 2020 IEEE 2nd International Conference on System Analysis & Intelligent Computing (SAIC). Kyiv: Igor Sikorsky Kyiv Polytechnic Institute, 158–161. doi: https://doi.org/10.1109/SAIC51296.2020.9239122
  • Sobchuk, V., Kapustyan, O., Pichkur, V., Kapustian, O. (2021). Design of Stable Periodic Regimes for one Class of Hybrid Planar Systems. II International Scientific Symposium "Intelligent Solutions". Kyiv, 89–100.
  • Kapustian, O. A., Kapustyan, O. V., Ryzhov, A., Sobchuk, V. (2022). Approximate Optimal Control for a Parabolic System with Perturbations in the Coefficients on the Half-Axis. Axioms, 11 (4), 175. doi: https://doi.org/10.3390/axioms11040175
  • Sobchuk, V. V. (2019) The method of creating a single information space at a production enterprise with a functionally stable production process. Control, navigation and communication systems, 6 (58), 84–91.
  • Sobchuk, V., Barabash, O., Musienko, A., Laptiev, O., Kozlovskyi, V., Shcheblanin, Y. (2022). Evaluation of Efficiency of Application of Functionally Sustainable Generalized Information System of the Enterprise. 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications. Ankara. doi: https://doi.org/10.1109/hora55278.2022.9799892
  • Sobchuk, V., Zamrii, I., Vlasyk, H., Tsvietkova, Y. (2021). Strategies for management of operation of production centers to provide functionally sustainable technological processes of production. 2021 IEEE 3 nd International Conference on Advanced Trends in Information Theory (ATIT). Kyiv, 61–66.
  • Sobchuk, V., Zamrii, I., Barabash, O., Musienko, A. (2021). Methodology for building a functionally stable intelligent information system of a manufacturing enterprise. Bulletin of Taras Shevchenko National University of Kyiv. Series: Physics and Mathematics, 4, 116–127. doi: https://doi.org/10.17721/1812-5409.2021/4.18
  • Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2
  • Vlasyk, H., Zamrii, I., Shkapa, V., Kalyniuk, A., Laptieva, T. (2021). The method of solving problems of optimal restoration of telecommunication signals. 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT). Proceedings, 71–75. doi: https://doi.org/10.1109/atit54053.2021.9678649
  • Svynchuk, O., Barabash, O., Nikodem, J., Kochan, R., Laptiev, O. (2021). Image Compression Using Fractal Functions. Fractal and Fractional, 5 (2), 31. doi: https://doi.org/10.3390/fractalfract5020031
  • Salanda, I. P., Barabash, O. V., Musienko, A. P. (2017). System of indicators and criteria for formalization of processes of ensuring local functional stability of extensive information networks. Systems of control, navigation and communication, 1 (41), 122–126.
  • Petrivskyi, V., Shevchenko, V., Yevseiev, S., Milov, O., Laptiev, O., Bychkov, O. et al. (2022). Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors. Eastern-European Journal of Enterprise Technologies, 1 (9 (115)), 15–23. doi: https://doi.org/10.15587/1729-4061.2022.252988
  • Lenkov, S., Zhyrov, G., Zaitsev, D., Tolok, I., Lenkov, E., Bondarenko, T. et al. (2017). Features of modeling failures of recoverable complex technical objects with a hierarchical constructive structure. Eastern-European Journal of Enterprise Technologies, 4 (4 (88)), 34–42. doi: https://doi.org/10.15587/1729-4061.2017.108395
  • Yevseiev, S., Rzayev, K., Laptiev, O., Hasanov, R., Milov, O., Asgarova, B. et al. (2022). Development of a hardware cryptosystem based on a random number generator with two types of entropy sources. Eastern-European Journal of Enterprise Technologies, 5 (9 (119)), 6–16. doi: https://doi.org/10.15587/1729-4061.2022.265774
  • Mashkov, V. A., Barabash, O. V. (1998) Self-checking and Self-diagnosis of Module Systems on the Principle of Walking Diagnostic Kernel. Engineering Simulation. Amsterdam: OPA, 15, 43–51.
  • Mashkov, V. A., Barabash, O. V. (1996) Self-Testing of Multimodule Systems Based on Optimal Check-Connection Structures. Engineering Simulation. Amsterdam: OPA, 13, 479–492.
  • Mashkov, V. A., Barabash, O. V. (1995). Self-checking of modular systems under random performance of elementary checks. Engineering Simulation. Amsterdam: OPA, 12 (3), 433–445.
  • Barabash, O. V., Dakhno, N. B., Shevchenko, H. V., Majsak, T. V. (2017). Dynamic Models of Decision Support Systems for Controlling UAV by Two-Step Variational-Gradient Method. Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD), 108–111. doi: https://doi.org/10.1109/apuavd.2017.8308787
  • Mukhin, V., Zavgorodnii, V., Barabash, O., Mykolaichuk, R., Kornaga, Y., Zavgorodnya, A., Statkevych, V. (2020). Method of Restoring Parameters of Information Objects in a Unified Information Space Based on Computer Networks. International Journal of Computer Network and Information Security, 12 (2), 11–21. doi: https://doi.org/10.5815/ijcnis.2020.02.02
  • Mukhin, V., Loutskii, H., Barabash, O., Kornaga, Y., Steshyn, V. (2015). Models for Analysis and Prognostication of the Indicators of the Distributed Computer Systems' Characteristics. International Review on Computers and Software (IRECOS), 10 (12), 1216–1224. doi: https://doi.org/10.15866/irecos.v10i12.8023
  • Laptiev, O., Shuklin, G., Savchenko, V., Barabash, O., Musienko, A., Haidur, H. (2019). The Method of Hidden Transmitters Detection based on the Differential Transformation Model. International Journal of Advanced Trends in Computer Science and Engineering, 8 (6), 2840–2846. doi: https://doi.org/10.30534/ijatcse/2019/26862019
  • Sobchuk, V., Barabash, O., Musienko, A., Svynchuk, O. (2021). Adaptive accumulation and diagnostic information systems of enterprises in energy and industry sectors. E3S Web of Conferences, 250, 08002. doi: https://doi.org/10.1051/e3sconf/202125008002
  • Kyrychok, R., Shuklin, G. (2020). The method of building a knowledge base for dicision-making when validating corporate networks vulnerabilities. Scientific Discussion, 1 (47), 7–11.
  • Kyrychok, R. V., Shuklin, G. V. (2020). Methodology for analysing the quality of the vulnerability validation mechanism in the corporate networks. Telecommunication and Information Technologies, 69 (2), 29–40. doi: https://doi.org/10.31673/2412-4338.2020.022930
  • Kyrychok, R. V. (2018). Test na pronyknennia yak imitatsiinyi pidkhid do analizu zakhyshchenosti korporatyvnykh informatsiinykh system. Suchasnyi zakhyst informatsii, 2 (34), 53–58.
  • Kyrychok, R. V., Skladannyi, P. M., Buryachok, V. L., Hulak, H. M., Kozachok, V. A. (2016). The problems of controlling the security of corporate networks and solutions. Naukovi zapysky Ukrainskoho naukovo-doslidnoho instytutu zviazku, 3, 48–61.
  • Yevseiev, S., Aleksiyev, V., Balakireva, S., Peleshok, Y., Milov, O., Petrov, O. et al. (2019). Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy. Eastern-European Journal of Enterprise Technologies, 3 (9 (99)), 49–63. doi: https://doi.org/10.15587/1729-4061.2019.169527
  • Barabash, O., Dakhno, N., Shevchenko, H., Sobchuk, V. (2019). Unmanned Aerial Vehicles Flight Trajectory Optimisation on the Basis of Variational Enequality Algorithm and Projection Method. Proceeding. Actual Problems of Unmanned Aerial Vehicles Developments. Kyiv, 136–139. doi: https://doi.org/10.1109/apuavd47061.2019.8943869
  • Asrorov, F., Sobchuk, V., Kurylko, О. (2019). Finding of bounded solutions to linear impulsive systems. Eastern-European Journal of Enterprise Technologies, 6 (4 (102)), 14–20. doi: https://doi.org/10.15587/1729-4061.2019.178635
  • Barabash, O. V., Musienko, A. P., Sobchuk, V. V., Lukova-Chuiko, N. V., Svynchuk, O. V.; Sadovnichiy, V. A., Zgurovsky, M. Z. (Eds.) (2020). Distribution of Values of Cantor Type Fractal Functions with Specified Restrictions. Contemporary Approaches and Methods in Fundamental Mathematics and Mechanics. Cham: Springer, 433–455. doi: https://doi.org/10.1007/978-3-030-50302-4_21
  • Samoilenko, A. M., Samoilenko, V. G., Sobchuk, V. V. (1999). On periodic solutions of the equation of a nonlinear oscillator with pulse influence. Ukrainian Mathematical Journal, 51 (6), 926–933. doi: https://doi.org/10.1007/bf02591979
  • Svynchuk, О., Barabash, A., Laptiev, S., Laptieva, T. (2021). Modification of query processing methods in distributed databases using fractal trees. Information Security And Information Technologies. Kharkiv – Odesa, 32–37.
  • Laptiev, O., Lukova-Chuiko, N., Laptiev, S., Laptieva, T., Savchenko, V., Yevseiev, S. (2021). Development of a method for detecting deviations in the nature of traffic from the elements of the communication network. Information Security And Information Technologies. Kharkiv – Odesa, 1–9.
  • Lukova-Chuiko, N., Herasymenko, O., Toliupa, S., Laptiev, S., Laptieva, T., Laptiev, O. (2021). The method detection of radio signals by estimating the parameters signals of eversible Gaussian propagation. 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT), 67–70. doi: https://doi.org/10.1109/atit54053.2021.9678856
  • Savchenko, V., Akhramovych, V., Dzyuba, T., Laptiev, S., Lukova-Chuiko, N., Laptieva, T. (2021). Methodology for Calculating Information Protection from Parameters of its Distribution in Social Networks. 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT), 99–105. doi: https://doi.org/10.1109/atit54053.2021.9678599
  • Sobchuk, A., Haidur, H., Laptiev, S., Laptieva, T., Asrorov, F., Perehuda, O. (2022). Modified Fourier transform for improving spectral analysis of radio signals. Мodern information, measurement and control systems: problems, applications and perspectives'2022. Antalya.
  • Laptiev, O., Tkachev, V., Maystrov, O., Krasikov, O., Open'ko, P., Khoroshko, V., Parkhuts, L. (2022). The method of spectral analysis of the determination of random digital signals. International Journal of Communication Networks and Information Security (IJCNIS), 13 (2), 271–277. doi: https://doi.org/10.17762/ijcnis.v13i2.5008
  • Tanasiuk, Yu. V., Melnychuk, Kh. V., Ostapov, S. E. (2017). Development and research of cryptographic hash functions on the basis of cellular automat. Systemy Obrobky Informatsii, 4 (150), 122–127. doi: https://doi.org/10.30748/soi.2017.150.25
  • Tanasyuk, Y., Perepelitsyn, A., Ostapov, S. (2018). Parameterized FPGA-bazed implementation of cryptographic hash functions using cellular automata. 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 225–228. doi: https://doi.org/10.1109/dessert.2018.8409133
  • Applebaum, B., Ishai, Y., Kushilevitz, E. (2010). Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature? Proceedings of the 1st Symposium on Innovations in Computer Science (ICS 10). Beijing. Available at: http://www.wisdom.weizmann.ac.il/~bennyap/pubs/CA.pdf
  • Ostapov, S., Val, O., Yanushevsky, S., Chyzhevsky, D.; Rostanski, M., Pikiewicz, P., Buchwald, P. (Eds.) (2015). Cryptography on the Base of Cellular Automata. Internet in the Information Society. Scientific Publishing University of Dabrowa Gornicza, 71–86.
  • Wolfram, S. (2002). A New Kind of Science. Wolfram Media, 1197.
  • Zhikharevich, V. V., Ostapov, S. E. (2009). Modelirovanie protcessov samoorganizatcii i evoliutcii sistem metodom nepreryvnykh asinkhronnykh kletochnykh avtomatov. Komp'iuting, 8 (3), 61–69.
  • Zhikharevich, V. V., Shumylyak, L. M. (2013). Use of continuous cellular automata for simulation of thermal conductivity in systems with first order phase transition. International Journal of Computing, 12 (2), 142–150. doi: https://doi.org/10.47839/ijc.12.2.595
  • Shumyliak, L. M., Zhykharevych, V. V., Ostapov, S. E. (2018). Application of the asynchronal cellular automata method in the heat conductivity problems investigation. Systemy Obrobky Informatsii, 1 (152), 74–79. doi: https://doi.org/10.30748/soi.2018.152.11
  • Hazdiuk, K., Zhikharevich, V., Ostapov, S. (2020). Simulating Self-Regeneration and Self-Replication Processes Using Movable Cellular Automata with a Mutual Equilibrium Neighborhood. Complex Systems, 29 (4), 741–757. doi: https://doi.org/10.25088/complexsystems.29.4.741
  • Zhykharevych, V. V., Matsiuk, N. O. (2016). Solution the routing problem by modified ant-cellular automaton algorithm. Visnyk ekonomichnoi nauky Ukrainy, 1, 49–54.
  • Clarridge, A., Salomaa, K. (2009). A Cryptosystem Based on the Composition of Reversible Cellular Automata. Language and Automata Theory and Applications, 314–325. doi: https://doi.org/10.1007/978-3-642-00982-2_27
  • Val, O. D., Zhikharevich, V. V., Ovchar, R. I., Ostapov, S. E. (2015). Development and Investigation of the Key Stream Generators on the Base of Cellular Automata. Radio Electronics, Computer Science, Control, 3 (34), 58–63. doi: https://doi.org/10.15588/1607-3274-2015-3-7
  • Rukhin, A., Sota, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S. et al. (2010). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Computer Resource Center, SP 800-22 Rev.1a, Available at: https://csrc.nist.gov/publications/detail/sp/800-22/rev-1a/final
  • Dworkin, M. J. (2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. doi: https://doi.org/10.6028/nist.fips.202