MODELS OF SOCIO-CYBER-PHYSICAL SYSTEMS SECURITY
Keywords:
cybersecurity, models of the threat, crypto-code constructions, simulation modelling, automation, radio engineering research, security measuresSynopsis
The development of technologies and computing resources has not only expanded the range of digital services in all spheres of human activity, but also determined the range of targeted cyber attacks. Targeted attacks are aimed at destroying not only the business structure, but also its individual components that determine critical business processes. The continuity of such business processes is a critical component of any company, organization or enterprise of any form of ownership, which has a critical impact on making a profit or organizing production processes. The proposed concept of determining the security level of critical business processes is based on the need to use multiloop information security systems. This makes it possible to ensure the continuity of critical business processes through a timely objective assessment of the level of security and the timely formation of preventive measures. This approach is based on the proposed rules for determining the reach of a given security level, based on assessments of the integrity, availability and confidentiality of information arrays, as well as computer equipment for different points of the organization's business processes. The issues of applying situational management methods to ensure the safe functioning of objects of socio-cyberphysical systems, logical and transformational rules that form the foundation for building a situational type cybersecurity management system are considered. One of the main tasks of systems of this type is described – the task of replenishing the description of the situation. The use of pseudophysical logics, various types of pseudophysical logics, the method of their construction and their interconnection are proposed. Particular attention is paid to causal pseudophysical logic, as the least developed for the purposes of ensuring cybersecurity. The formation of smart technologies, as a rule, uses the wireless standards of communication channels IEEE 802.11X, IEEE 802.15.4, IEEE 802.16, which use only authentication protocols and privacy mechanisms that are formed on the basis of symmetric algorithms. In the conditions of the post-quantum period (the appearance of a full-scale quantum computer), the stability of such algorithms is questioned. Such systems, as a rule, are formed on the basis of the synthesis of socio-cyber-physical systems and cloud technologies, which simplifies the implementation of Advanced Persistent Threat attacks, both on the internal loop of control systems and on the external one.
The proposed creation of multi-circuit information protection systems allows for an objective assessment of the flow state of the system as a whole and the formation of preventive measures against cyber threats.
In the thied chapter, models of probable threats and information protection in public networks are proposed. The most general model of the formal description of the protection system is the model of the security system with full overlap, in which a complete list of protection objects and threats to information is determined, and means of ensuring security are determined from the point of view of their effectiveness and contribution to ensuring the security of the entire telecommunications system. It is also shown that the combination of four models (M1, M2, M3, M4) in various variants provides wide opportunities for modeling various known types of threats and their implementation. However, in connection with the continuity of the process of developing new and improving existing methods and means of implementing threats, it is necessary to use such approaches to ensuring information protection that allow detecting and preventing threats of unknown types and carrying out dynamic correction of protection behavior, adapting it to specific application conditions. The M5 basic model is described, which enables continuous refinement of threat classes and response measures, and continuous training of the adaptive component of the CSI, which, in turn, detects and prevents threats of unknown types. The M6 basic model is introduced with the aim of obtaining higher security due to the presence of a special module of internal diagnostics that diagnoses the entire protection system, decides on the correction of the SHI behavior algorithm, and makes it possible to achieve SHI fault tolerance; a special module that diagnoses the communication channel with subsequent changes in the level of protection, allows to achieve the adaptability of the SHI.
The fourth chapter is deal with the development of cryptographic primitives based on cellular automata. The definition of a cellular automaton is given and the elementary rules of intercellular interaction are described.
A number of generators of pseudorandom binary sequences have been developed based on a combination of elementary rules of intercellular interaction, as well as cell interaction according to a rule of our own development.
In the “cryptographic sponge” architecture, a cryptographic hashing function with a shuffling function based on cellular automata was developed and its statistical characteristics and avalanche effect were investigated.
A block cipher in the SP-network architecture is constructed, in which cellular automata are used to deploy the key, and the encryption process is based on elementary procedures of replacement and permutation. Substitution blocks are used from the well-known AES cipher, a description of a stream cipher is given, where a personal computer keyboard and mouse are used as the initial entropy. Random data received from the specified devices is processed by a proprietary hashing function based on a "cryptographic sponge". All developed cryptographic functions and primitives demonstrated good statistical characteristics and avalanche properties.
The fifth chapter proposes a methodology for analyzing the quality of the mechanism for validating the identified vulnerabilities of a corporate network, which is based on integral equations that take into account the quantitative characteristics of the vulnerability validation mechanism under study at a certain point in time. This technique allows you to build the laws of distribution of quality indicators of the vulnerability validation process and quantify the quality of the mechanism for validating detected vulnerabilities, which allows you to monitor and control the validation of identified vulnerabilities in real time during active security analysis. A method is proposed for constructing a fuzzy knowledge base for making decisions when validating vulnerabilities of software and hardware platforms with an active analysis of the security of a target corporate network based on the use of fuzzy logic, which makes it possible to provide reliable information about the quality of the mechanism for validating vulnerabilities indirectly. The constructed knowledge base allows you to form decisive decision-making rules for the implementation of a particular attacking action, which allows you to develop expert systems to automate the decision-making process when validating the identified vulnerabilities of target information systems and networks. An improved method of automatic active security analysis is proposed, which, based on the synthesis of the proposed models, techniques and methods, allows, in contrast to the existing ones, to abstract from the conditions of dynamic changes in the environment, i.e. constant development of information technologies, which leads to an increase in the number of vulnerabilities and corresponding attack vectors, as well as an increase in ready-to-use exploits of vulnerabilities and their availability, and take into account only the quality parameters of the vulnerability validation process itself.
ISBN 978-617-7319-72-5 (on-line)
ISBN 978-617-7319-73-2 (print)
------------------------------------------------------------------------------------------------------------------
How to Cite: Yevseiev, S., Khokhlachova, Yu., Ostapov, S., Laptiev, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Khokhlachova, Yu., Ostapov, S., Laptiev, O. (Eds.) (2023). Models of socio-cyber-physical systems security. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 184. doi: http://doi.org/10.15587/978-617-7319-72-5
------------------------------------------------------------------------------------------------------------------
Indexing:
References
Milov, O., Khvostenko, V., Natalia, V., Korol, O., Zviertseva, N. (2022). Situational Control of Cyber Security in Socio-Cyber-Physical Systems. 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). doi: https://doi.org/10.1109/hora55278.2022.9800049
Yevseiev, S., Ponomarenko, V., Ponomarenko, V., Rayevnyeva, O., Rayevnyeva, O. (2017). Assessment of functional efficiency of a corporate scientificeducational network based on the comprehensive indicators of quality of service. Eastern-European Journal of Enterprise Technologies, 6 (2 (90)), 4–15. doi: https://doi.org/10.15587/1729-4061.2017.118329
Androshchuk, А., Yevseiev, S., Melenchuk, V., Lemeshko, O., Lemeshko, V. (2020). Improvement of project risk assessment methods of implementation of automated information components of non-commercial organizational and technical systems. EUREKA: Physics and Engineering, 1, 48–55. doi: https://doi.org/10.21303/2461-4262.2020.001131
Pospelov, D. A. (2021). Situatuinal control: Theory and Practice. URSS, 288.
Li, T., Liu, J., Sun, H., Chen, X., Yin, L., Mao, X., Sun, J. (2021). Runtime Verification of Spatio-Temporal Specification Language. Mobile Networks and Applications, 26 (6), 2392–2406. doi: https://doi.org/10.1007/s11036-021-01779-5
Lange, R. T. (2019). Action Grammars: A Grammar Induction-Based Method for Learning Temporally-Extended Actions. Imperial College London.
Kempson, R., Cann, R., Gregoromichelaki, E., Chatzikyriakidis, S. (2017). Action-Based Grammar. Theoretical Linguistics, 43 (1-2), 141–167. doi: https://doi.org/10.1515/tl-2017-0012
Milov, O., Yevseiev, S., Vlasov, A., Herasimov, S., Dmitriiev, O., Kasianenko, M. et al. (2019). Development of scenario modeling of conflict tools in a security system based on formal grammars. Eastern-European Journal of Enterprise Technologies, 6 (9 (102)), 53–64. doi: https://doi.org/10.15587/1729-4061.2019.184274
Mehrabian, M., Khayatian, M., Shrivastava, A., Eidson, J. C., Derler, P., Andrade, H. A. et al. (2017). Timestamp Temporal Logic (TTL) for Testing the Timing of Cyber-Physical Systems. ACM Transactions on Embedded Computing Systems, 16 (5s), 1–20. doi: https://doi.org/10.1145/3126510
Yevseiev, S., Milov, O., Opirskyy, I., Dunaievska, O., Huk, O., Pogorelov, V. et al. (2022). Development of a concept for cybersecurity metrics classification. Eastern-European Journal of Enterprise Technologies, 4 (4 (118)), 6–18. doi: https://doi.org/10.15587/1729-4061.2022.263416
Abel, S., Xiao, L., Wang, H. (2018). Causal Modeling for Cybersecurity. 2018 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), 209–212. doi: https://doi.org/10.1109/socialsec.2018.8760379
Kondakci, S. (2010). A causal model for information security risk assessment. 2010 Sixth International Conference on Information Assurance and Security, 143–148. doi: https://doi.org/10.1109/isias.2010.5604039
Friedenberg, M., Halpern, J. Y. (2018). Combining the causal judgments of experts with possibly different focus areas. Available at: http://www.cs.cornell.edu/home/halpern/papers/focus.pdf
Halpern, J. Y. (2015). A modification of the Halpern-Pearl definition of causality. International Joint Conference on Artificial Intelligence, 3022–3033. Available at: https://www.ijcai.org/Proceedings/15/Papers/427.pdf
Fenz, S., Ekelhart, A. (2011). Verification, Validation, and Evaluation in Information Security Risk Management. IEEE Security & Privacy Magazine, 9 (2), 58–65. doi: https://doi.org/10.1109/msp.2010.117
IEC 31010:2019 (2019). Risk management – Risk assessment techniques. International Organization of Standardization (ISO), 264.
Shaikh, F. A., Siponen, M. (2023). Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers & Security, 124, 102974. doi: https://doi.org/10.1016/j.cose.2022.102974
Haag, S., Siponen, M., Liu, F. (2021). Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 52 (2), 25–67. doi: https://doi.org/10.1145/3462766.3462770
Li, Y., Xin, T., Siponen, M. (2022). Citizens’ Cybersecurity Behavior: Some Major Challenges. IEEE Security & Privacy, 20 (1), 54–61. doi: https://doi.org/10.1109/msec.2021.3117371
Chen, S., Xiao, H., He, W., Mou, J., Siponen, M., Qiu, H., Xu, F. (2021). Determinants of Individual Knowledge Innovation Behavior. Journal of Organizational and End User Computing, 33 (6), 1–24. doi: https://doi.org/10.4018/joeuc.20211101.oa27
Yevseiev, S., Kuznietsov, O., Herasimov, S., Horielyshev, S., Karlov, A., Kovalov, I. et al. (2021). Development of an optimization method for measuring the Doppler frequency of a packet taking into account the fluctuations of the initial phases of its radio pulses. Eastern-European Journal of Enterprise Technologies, 2 (9 (110)), 6–15. doi: https://doi.org/10.15587/1729-4061.2021.229221
Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M., Hrytsyk, V., Milov, O. et al.; Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M. (Eds.) (2022). Modeling of security systems for critical infrastructure facilities. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 196. doi: http://doi.org/10.15587/978-617-7319-57-2
ISO/IEC 27003:2017 (2017). Information technology – Security techniques – Information security management systems – Guidance. Available at: https://www.iso.org/ru/standard/63417.html
ISO/IEC 27006:2015 (2015). Information technology – Security techniques – Requirements for bodies providing audit and certification of information security management systems. Available at: https://www.iso.org/standard/62313.html
ISO/IEC 27035-1:2023 (2023). Information technology – Information security incident management – Part 1: Principles and process. Available at: https://www.iso.org/ru/standard/78973.html
ISO/IEC 27035-2:2023 (2023). Information technology – Information security incident management – Part 2: Guidelines to plan and prepare for incident response. Available at: https://www.iso.org/ru/standard/78974.html
ISO/IEC 27035-3:2020 (2020). Information technology – Information security incident management – Part 3: Guidelines for ICT incident response operations. Available at: https://www.iso.org/ru/standard/74033.html
Lund, M. S., Solhaug, B., Stølen, K. (2010). Model-Driven Risk Analysis: The CORAS Approach. Springer Publishing Company, Incorporated, 400.
Matulevičius, R. (2017). Domain Model for Information Systems Security Risk Management. Fundamentals of Secure System Modelling. Springer International Publishing AG, 17–30. doi: https://doi.org/10.1007/978-3-319-61717-6_2
Innerhofer-Oberperfler, F., Mitterer, M., Hafner, M., Breu, R. (2010). Security Analysis of Service Oriented Systems: A Methodical Approach and Case Study. Web Services Security Development and Architecture. IGI Global, 33–56. doi: https://doi.org/10.4018/978-1-60566-950-2.ch002
Innerhofer-Oberperfler, F., Breu, R.; Moore, T., Pym, D., Ioannidis, C. (Eds.) (2010). Potential Rating Indicators for Cyberinsurance: An Exploratory Qualitative Study. Economics of Information Security and Privacy. Boston: Springer. doi: https://doi.org/10.1007/978-1-4419-6967-5_13
Alkubaisy, D., Piras, L., Al-Obeidallah, M. G., Cox, K., Mouratidis, H.; Ali, R., Kaindl, H., Maciaszek, L. A. (Eds.) (2022). A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design. Evaluation of Novel Approaches to Software Engineering. Cham: Springer, 67–87. doi: https://doi.org/10.1007/978-3-030-96648-5_4
Pullonen, P., Tom, J., Matulevičius, R., Toots, A. (2019). Privacy-enhanced BPMN: enabling data privacy analysis in business processes models. Software and Systems Modeling, 18 (6), 3235–3264. doi: https://doi.org/10.1007/s10270-019-00718-z
Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevicius, R. et al. (2021). Post-Quantum Era Privacy Protection for Intelligent Infrastructures. IEEE Access, 9, 36038–36077. doi: https://doi.org/10.1109/access.2021.3062201
Koeze, R. (2017). Designing a Rule-Based Cyber Risk Assessment Tool for Small to Medium Enterprises. Delft University of Technology. The TREsPASS Project. The TREsPASS Project.
Pohasii, S., Yevseiev, S., Zhuchenko, O., Milov, O., Lysechko, V., Kovalenko, O. et al. (2022). Development of crypto-code constructs based on LDPC codes. Eastern-European Journal of Enterprise Technologies, 2 (9 (116)), 44–59. doi: https://doi.org/10.15587/1729-4061.2022.254545
Shmatko, O., Balakireva, S., Vlasov, A., Zagorodna, N., Korol, O., Milov, O. et al. (2020). Development of methodological foundations for designing a classifier of threats to cyberphysical systems. Eastern-European Journal of Enterprise Technologies, 3 (9 (105)), 6–19. doi: https://doi.org/10.15587/1729-4061.2020.205702
Merz, H., Hansemann, T., Hübner, C. (2009). Building Automation: Communication systems with EIB/KNX, LON und BACnet. Berlin Heidelberg: Springer-Verlag, 293.
KNX Technical Manual 2CKA001473B8668. KNX Technical Manual. Busch-Presence detector KNX / Busch-Watchdog Sky KNX (2017). Busch-Jaeger Elektro GmbH, 198.
Technical documentation on KNX devices (2006). ABB.
KNX Handbook Version 1.1 Revision 1 (2004). Konnex Association.
ABB i-bus KNX KNX Security Panel GM/A 8.1 Product Manual (2016). Busch-Watchdog Sky KNX. Busch-Jaeger Elektro GmbH, 648.
Schilder, J., Reibel, T. (2016). ABB GPG Building Automation Webinar ABB i-bus® KNX Basics and Products. Busch-Watchdog Sky KNX. Busch-Jaeger Elektro GmbH, 86.
Manual for KNX Planning (2017). Siemens Switzerland Ltd, 100.
Security Technology KNX-Intrusion Alarm System L240 Installation, Commissioning, Operation / Busch-Watchdog Sky KNX (2010). Busch-Jaeger Elektro GmbH, 116.
Bartock, M., Cichonski, J., Souppaya, M., Smith, M., Witte, G., Scarfone, K. (2016). Guide for cybersecurity event recovery. doi: https://doi.org/10.6028/nist.sp.800-184
Security requirements for cryptographic modules (1994). Information Technology Laboratory. Available at: https://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
Cichonski, J., Franklin, J. M., Bartock, M. (2017). Guide to LTE security. doi: https://doi.org/10.6028/nist.sp.800-187
Kottapalli, N. (2011). Diameter and LTE Evolved Packet System. Corporate Headquarters, 10. Available at: http://go.radisys.com/rs/radisys/images/paper-lte-diameter-eps.pdf
Ventura, H. (2002). Diameter – Next generation’s AAA protocol. Institutionen för Systemteknik, 66.
Vinay, K. S. B., Harihar, M. N. (2012). Diameter-Based Protocol in the IP Multimedia Subsystem. International Journal of Soft Computing and Engineering, 1 (6), 266–269.
Qanbari, S., Mahdizadeh, S., Rahimzadeh, R., Behinaein, N., & Dustdar, S. (2016). Diameter of Things (DoT): A Protocol for Real-Time Telemetry of IoT Applications. Lecture Notes in Computer Science. GECON, 207–222. doi: https://doi.org/10.1007/978-3-319-43177-2_14
Tschofenig, H. (2019). Diameter: new generation AAA protocol – design, practice, and applications. Hoboken: John Wiley & Sons, Ltd, 230. doi: https://doi.org/10.1002/9781118875889
Ugrozy bezopasnosti iadra paketnoi seti 4G (2017). Available at: https://www.ptsecurity.com/ru-ru/research/analytics/epc-2017/
Uiazvimosti protokola Diameter v setiakh 4G (2018). Available at: https://www.ptsecurity.com/ru-ru/research/analytics/diameter-2018/
Yevseiev, S., Tsyhanenko, O., Ivanchenko, S., Aleksiyev, V., Verheles, D., Volkov, S. et al. (2018). Practical implementation of the Niederreiter modified cryptocode system on truncated elliptic codes. Eastern-European Journal of Enterprise Technologies, 6 (4 (96)), 24–31. doi: https://doi.org/10.15587/1729-4061.2018.150903
Yevseiev, S., Korol, O., Kots, H. (2017). Construction of hybrid security systems based on the crypto-code structures and flawed codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (88)), 4–21. doi: https://doi.org/10.15587/1729-4061.2017.108461
Yevseiev, S., Kots, H., Liekariev, Y. (2016). Developing of multi-factor authentication method based on niederreiter-mceliece modified crypto-code system. Eastern-European Journal of Enterprise Technologies, 6 (4 (84)), 11–23. doi: https://doi.org/10.15587/1729-4061.2016.86175
Yevseiev, S., Rzayev, K., Korol, O., Imanova, Z. (2016). Development of mceliece modified asymmetric crypto-code system on elliptic truncated codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (82)), 18–26. doi: https://doi.org/10.15587/1729-4061.2016.75250
Pohasii, S., Yevseiev, S., Zhuchenko, O., Milov, O., Lysechko, V., Kovalenko, O. et al. (2022). Development of crypto-code constructs based on LDPC codes. Eastern-European Journal of Enterprise Technologies, 2 (9 (116)), 44–59. doi: https://doi.org/10.15587/1729-4061.2022.254545
Naim, M., Ali-Pacha, H., Ali-Pacha, A., Hadj-Said, N. (2021). Lengthening the period of a Linear Feedback Shift Register. Journal of Engineering Technology and Applied Sciences, 6 (1), 45–68. doi: https://doi.org/10.30931/jetas.778792
Khoroshko, V. O., Pavlov, I. M., Bobalo, Y. Ya., Dudykevich, V. B. et al. (2020). Design of complex information protection systems. Lviv: Lviv Polytechnic, 320.
Brailovskyi, M. M., Zybin, S. V., Piskun, I. V., Khoroshko, V. O., Khokhlacheva, Yu. E. (2021). Tekhnolohii zakhystu informatsii. Kyiv: Central Committee "Comprint", 296.
Popovsky, V. V., Persikov, A. V. (2006). Zakhyst informatsii v telekomunikatsiinykh systemakh. Kharkiv: SMIT.
Dudykevich, V. B., Khoroshko, V. O., Yaremchuk, Yu. E. (2018). Osnovy informatsiinoi bezpeky. Vinnytsia: VNTU, 315.
Efficiency Standards for Protecting ACS and Computers from Data Loss Due to EM Emissions and Pickup (1997). Moscow: MOP, 35.
Brailovsky, M. M., Zybin, S. V., Kobozeva, A. A., Khoroshko, V. O., Khokhlacheva, Yu. E. (2021). Analysis of cyber security of information systems. Kyiv: FOP Yamchynskyi O. V., 360.
Beloshapkin, V. K., Pustovit, S. M., Stepanov, V. D. (2005). Construction of a specialized model of the information system for the purpose of synthesizing a complex SHI. Protection of information, 3, 78–83.
Stallings, V. (2001). Cryptography and network protection, principles and practice. House Williams, 672.
Chumarin, I. G. (2001). Taina predpryiatyia: chto y kak zashchyshchat. Saint Petersburg: Ed. DNA, 159.
Stepanov, V. D., Khoroshko, V. O. (2003). Collection of sciences. Works Information protection of the Scientific Research Institute of GUR, 5, 12–19.
Khoroshko, V. O., Kryvoruchko, O. V., Brailovskyi, M. M., Kozyura, V. D., Desyatko, A. M. (2019). Protection of electronic communications systems. Kyiv. national trade and economy Univ, 164.
Domarev, V. V. (2004). Bezopasnost informatcionnykh tekhnologii. Sistemnii pokhod. Kyiv: TND "DS", 992.
Maksimov, Yu. A., Fillipovskaya, E. A. (1982). Algorithms for solving problems of nonlinear programming. Moscow: MIPhI, 342.
Petrov, A. A., Khoroshko, V. A. (2009). Evaluation of the effectiveness of the complex information protection system in public networks. Collection. Science works of KNU named after T. Shevchenko VIKNU, 21, 128–131.
Hayvoronsky, M. V., Novikov, O. M. (2009). Bezpeka informatsiino-komunikatsiinykh system. Kyiv: Ed. BHV group, 608.
Pichkur, V. V., Sobchuk, V. V. (2021). Mathematical Model and Control Design of a Functionally Stable Technological Process. Journal of Optimization, Differential Equations and Their Applications, 29 (1), 32. doi: https://doi.org/10.15421/142102
Sobchuk, V., Pichkur, V., Barabash, O., Laptiev, O., Kovalchuk, I., Zidan, A. (2020). Algorithm of Control of Functionally Stable Manufacturing Processes of Enterprises. 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, 206–210, doi: https://doi.org/10.1109/ATIT50783.2020.9349332
Sobchuk, V., Olimpiyeva, Y., Musienko, A., Sobchuk, A. (2021). Ensuring the properties of functional stability of manufacturing processes based on the application of neural networks. CEUR Workshop Proceedings, 2845, 106–116.
Maksymuk, O. V., Sobchuk, V. V., Salanda, I. P., Sachuk, Yu. V. (2020). A system of indicators and criteria for evaluation of the level of functional stability of information heterogenic networks. Mathematical Modeling and Computing, 7 (2), 285–292. doi: https://doi.org/10.23939/mmc2020.02.285
Barabash, O., Tverdenko, H., Sobchuk, V., Musienko, A., Lukova-Chuiko, N. (2020). The Assessment of the Quality of Functional Stability of the Automated Control System with Hierarchic Structure. 2020 IEEE 2nd International Conference on System Analysis & Intelligent Computing (SAIC). Kyiv: Igor Sikorsky Kyiv Polytechnic Institute, 158–161. doi: https://doi.org/10.1109/SAIC51296.2020.9239122
Sobchuk, V., Kapustyan, O., Pichkur, V., Kapustian, O. (2021). Design of Stable Periodic Regimes for one Class of Hybrid Planar Systems. II International Scientific Symposium “Intelligent Solutions”. Kyiv, 89–100.
Kapustian, O. A., Kapustyan, O. V., Ryzhov, A., Sobchuk, V. (2022). Approximate Optimal Control for a Parabolic System with Perturbations in the Coefficients on the Half-Axis. Axioms, 11 (4), 175. doi: https://doi.org/10.3390/axioms11040175
Sobchuk, V. V. (2019) The method of creating a single information space at a production enterprise with a functionally stable production process. Control, navigation and communication systems, 6 (58), 84–91.
Sobchuk, V., Barabash, O., Musienko, A., Laptiev, O., Kozlovskyi, V., Shcheblanin, Y. (2022). Evaluation of Efficiency of Application of Functionally Sustainable Generalized Information System of the Enterprise. 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications. Ankara. doi: https://doi.org/10.1109/hora55278.2022.9799892
Sobchuk, V., Zamrii, I., Vlasyk, H., Tsvietkova, Y. (2021). Strategies for management of operation of production centers to provide functionally sustainable technological processes of production. 2021 IEEE 3 nd International Conference on Advanced Trends in Information Theory (ATIT). Kyiv, 61–66.
Sobchuk, V., Zamrii, I., Barabash, O., Musienko, A. (2021). Methodology for building a functionally stable intelligent information system of a manufacturing enterprise. Bulletin of Taras Shevchenko National University of Kyiv. Series: Physics and Mathematics, 4, 116–127. doi: https://doi.org/10.17721/1812-5409.2021/4.18
Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2
Vlasyk, H., Zamrii, I., Shkapa, V., Kalyniuk, A., Laptieva, T. (2021). The method of solving problems of optimal restoration of telecommunication signals. 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT). Proceedings, 71–75. doi: https://doi.org/10.1109/atit54053.2021.9678649
Svynchuk, O., Barabash, O., Nikodem, J., Kochan, R., Laptiev, O. (2021). Image Compression Using Fractal Functions. Fractal and Fractional, 5 (2), 31. doi: https://doi.org/10.3390/fractalfract5020031
Salanda, I. P., Barabash, O. V., Musienko, A. P. (2017). System of indicators and criteria for formalization of processes of ensuring local functional stability of extensive information networks. Systems of control, navigation and communication, 1 (41), 122–126.
Petrivskyi, V., Shevchenko, V., Yevseiev, S., Milov, O., Laptiev, O., Bychkov, O. et al. (2022). Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors. Eastern-European Journal of Enterprise Technologies, 1 (9 (115)), 15–23. doi: https://doi.org/10.15587/1729-4061.2022.252988
Lenkov, S., Zhyrov, G., Zaitsev, D., Tolok, I., Lenkov, E., Bondarenko, T. et al. (2017). Features of modeling failures of recoverable complex technical objects with a hierarchical constructive structure. Eastern-European Journal of Enterprise Technologies, 4 (4 (88)), 34–42. doi: https://doi.org/10.15587/1729-4061.2017.108395
Yevseiev, S., Rzayev, K., Laptiev, O., Hasanov, R., Milov, O., Asgarova, B. et al. (2022). Development of a hardware cryptosystem based on a random number generator with two types of entropy sources. Eastern-European Journal of Enterprise Technologies, 5 (9 (119)), 6–16. doi: https://doi.org/10.15587/1729-4061.2022.265774
Mashkov, V. A., Barabash, O. V. (1998) Self-checking and Self-diagnosis of Module Systems on the Principle of Walking Diagnostic Kernel. Engineering Simulation. Amsterdam: OPA, 15, 43–51.
Mashkov, V. A., Barabash, O. V. (1996) Self-Testing of Multimodule Systems Based on Optimal Check-Connection Structures. Engineering Simulation. Amsterdam: OPA, 13, 479–492.
Mashkov, V. A., Barabash, O. V. (1995). Self-checking of modular systems under random performance of elementary checks. Engineering Simulation. Amsterdam: OPA, 12 (3), 433–445.
Barabash, O. V., Dakhno, N. B., Shevchenko, H. V., Majsak, T. V. (2017). Dynamic Models of Decision Support Systems for Controlling UAV by Two-Step Variational-Gradient Method. Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD), 108–111. doi: https://doi.org/10.1109/apuavd.2017.8308787
Mukhin, V., Zavgorodnii, V., Barabash, O., Mykolaichuk, R., Kornaga, Y., Zavgorodnya, A., Statkevych, V. (2020). Method of Restoring Parameters of Information Objects in a Unified Information Space Based on Computer Networks. International Journal of Computer Network and Information Security, 12 (2), 11–21. doi: https://doi.org/10.5815/ijcnis.2020.02.02
Mukhin, V., Loutskii, H., Barabash, O., Kornaga, Y., Steshyn, V. (2015). Models for Analysis and Prognostication of the Indicators of the Distributed Computer Systems’ Characteristics. International Review on Computers and Software (IRECOS), 10 (12), 1216–1224. doi: https://doi.org/10.15866/irecos.v10i12.8023
Laptiev, O., Shuklin, G., Savchenko, V., Barabash, O., Musienko, A., Haidur, H. (2019). The Method of Hidden Transmitters Detection based on the Differential Transformation Model. International Journal of Advanced Trends in Computer Science and Engineering, 8 (6), 2840–2846. doi: https://doi.org/10.30534/ijatcse/2019/26862019
Sobchuk, V., Barabash, O., Musienko, A., Svynchuk, O. (2021). Adaptive accumulation and diagnostic information systems of enterprises in energy and industry sectors. E3S Web of Conferences, 250, 08002. doi: https://doi.org/10.1051/e3sconf/202125008002
Kyrychok, R., Shuklin, G. (2020). The method of building a knowledge base for dicision-making when validating corporate networks vulnerabilities. Scientific Discussion, 1 (47), 7–11.
Kyrychok, R. V., Shuklin, G. V. (2020). Methodology for analysing the quality of the vulnerability validation mechanism in the corporate networks. Telecommunication and Information Technologies, 69 (2), 29–40. doi: https://doi.org/10.31673/2412-4338.2020.022930
Kyrychok, R. V. (2018). Test na pronyknennia yak imitatsiinyi pidkhid do analizu zakhyshchenosti korporatyvnykh informatsiinykh system. Suchasnyi zakhyst informatsii, 2 (34), 53–58.
Kyrychok, R. V., Skladannyi, P. M., Buryachok, V. L., Hulak, H. M., Kozachok, V. A. (2016). The problems of controlling the security of corporate networks and solutions. Naukovi zapysky Ukrainskoho naukovo-doslidnoho instytutu zviazku, 3, 48–61.
Yevseiev, S., Aleksiyev, V., Balakireva, S., Peleshok, Y., Milov, O., Petrov, O. et al. (2019). Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy. Eastern-European Journal of Enterprise Technologies, 3 (9 (99)), 49–63. doi: https://doi.org/10.15587/1729-4061.2019.169527
Barabash, O., Dakhno, N., Shevchenko, H., Sobchuk, V. (2019). Unmanned Aerial Vehicles Flight Trajectory Optimisation on the Basis of Variational Enequality Algorithm and Projection Method. Proceeding. Actual Problems of Unmanned Aerial Vehicles Developments. Kyiv, 136–139. doi: https://doi.org/10.1109/apuavd47061.2019.8943869
Asrorov, F., Sobchuk, V., Kurylko, О. (2019). Finding of bounded solutions to linear impulsive systems. Eastern-European Journal of Enterprise Technologies, 6 (4 (102)), 14–20. doi: https://doi.org/10.15587/1729-4061.2019.178635
Barabash, O. V., Musienko, A. P., Sobchuk, V. V., Lukova-Chuiko, N. V., Svynchuk, O. V.; Sadovnichiy, V. A., Zgurovsky, M. Z. (Eds.) (2020). Distribution of Values of Cantor Type Fractal Functions with Specified Restrictions. Contemporary Approaches and Methods in Fundamental Mathematics and Mechanics. Cham: Springer, 433–455. doi: https://doi.org/10.1007/978-3-030-50302-4_21
Samoilenko, A. M., Samoilenko, V. G., Sobchuk, V. V. (1999). On periodic solutions of the equation of a nonlinear oscillator with pulse influence. Ukrainian Mathematical Journal, 51 (6), 926–933. doi: https://doi.org/10.1007/bf02591979
Svynchuk, О., Barabash, A., Laptiev, S., Laptieva, T. (2021). Modification of query processing methods in distributed databases using fractal trees. Information Security And Information Technologies. Kharkiv – Odesa, 32–37.
Laptiev, O., Lukova-Chuiko, N., Laptiev, S., Laptieva, T., Savchenko, V., Yevseiev, S. (2021). Development of a method for detecting deviations in the nature of traffic from the elements of the communication network. Information Security And Information Technologies. Kharkiv – Odesa, 1–9.
Lukova-Chuiko, N., Herasymenko, O., Toliupa, S., Laptiev, S., Laptieva, T., Laptiev, O. (2021). The method detection of radio signals by estimating the parameters signals of eversible Gaussian propagation. 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT), 67–70. doi: https://doi.org/10.1109/atit54053.2021.9678856
Savchenko, V., Akhramovych, V., Dzyuba, T., Laptiev, S., Lukova-Chuiko, N., Laptieva, T. (2021). Methodology for Calculating Information Protection from Parameters of its Distribution in Social Networks. 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT), 99–105. doi: https://doi.org/10.1109/atit54053.2021.9678599
Sobchuk, A., Haidur, H., Laptiev, S., Laptieva, T., Asrorov, F., Perehuda, O. (2022). Modified Fourier transform for improving spectral analysis of radio signals. Мodern information, measurement and control systems: problems, applications and perspectives’2022. Antalya.
Laptiev, O., Tkachev, V., Maystrov, O., Krasikov, O., Open’ko, P., Khoroshko, V., Parkhuts, L. (2022). The method of spectral analysis of the determination of random digital signals. International Journal of Communication Networks and Information Security (IJCNIS), 13 (2), 271–277. doi: https://doi.org/10.17762/ijcnis.v13i2.5008
Tanasiuk, Yu. V., Melnychuk, Kh. V., Ostapov, S. E. (2017). Development and research of cryptographic hash functions on the basis of cellular automat. Systemy Obrobky Informatsii, 4 (150), 122–127. doi: https://doi.org/10.30748/soi.2017.150.25
Tanasyuk, Y., Perepelitsyn, A., Ostapov, S. (2018). Parameterized FPGA-bazed implementation of cryptographic hash functions using cellular automata. 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 225–228. doi: https://doi.org/10.1109/dessert.2018.8409133
Applebaum, B., Ishai, Y., Kushilevitz, E. (2010). Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature? Proceedings of the 1st Symposium on Innovations in Computer Science (ICS 10). Beijing. Available at: http://www.wisdom.weizmann.ac.il/~bennyap/pubs/CA.pdf
Ostapov, S., Val, O., Yanushevsky, S., Chyzhevsky, D.; Rostanski, M., Pikiewicz, P., Buchwald, P. (Eds.) (2015). Cryptography on the Base of Cellular Automata. Internet in the Information Society. Scientific Publishing University of Dabrowa Gornicza, 71–86.
Wolfram, S. (2002). A New Kind of Science. Wolfram Media, 1197.
Zhikharevich, V. V., Ostapov, S. E. (2009). Modelirovanie protcessov samoorganizatcii i evoliutcii sistem metodom nepreryvnykh asinkhronnykh kletochnykh avtomatov. Komp’iuting, 8 (3), 61–69.
Zhikharevich, V. V., Shumylyak, L. M. (2013). Use of continuous cellular automata for simulation of thermal conductivity in systems with first order phase transition. International Journal of Computing, 12 (2), 142–150. doi: https://doi.org/10.47839/ijc.12.2.595
Shumyliak, L. M., Zhykharevych, V. V., Ostapov, S. E. (2018). Application of the asynchronal cellular automata method in the heat conductivity problems investigation. Systemy Obrobky Informatsii, 1 (152), 74–79. doi: https://doi.org/10.30748/soi.2018.152.11
Hazdiuk, K., Zhikharevich, V., Ostapov, S. (2020). Simulating Self-Regeneration and Self-Replication Processes Using Movable Cellular Automata with a Mutual Equilibrium Neighborhood. Complex Systems, 29 (4), 741–757. doi: https://doi.org/10.25088/complexsystems.29.4.741
Zhykharevych, V. V., Matsiuk, N. O. (2016). Solution the routing problem by modified ant-cellular automaton algorithm. Visnyk ekonomichnoi nauky Ukrainy, 1, 49–54.
Clarridge, A., Salomaa, K. (2009). A Cryptosystem Based on the Composition of Reversible Cellular Automata. Language and Automata Theory and Applications, 314–325. doi: https://doi.org/10.1007/978-3-642-00982-2_27
Val, O. D., Zhikharevich, V. V., Ovchar, R. I., Ostapov, S. E. (2015). Development and Investigation of the Key Stream Generators on the Base of Cellular Automata. Radio Electronics, Computer Science, Control, 3 (34), 58–63. doi: https://doi.org/10.15588/1607-3274-2015-3-7
Rukhin, A., Sota, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S. et al. (2010). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Computer Resource Center, SP 800-22 Rev.1a, Available at: https://csrc.nist.gov/publications/detail/sp/800-22/rev-1a/final
Dworkin, M. J. (2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. doi: https://doi.org/10.6028/nist.fips.202