MODELS OF SOCIO-CYBER-PHYSICAL SYSTEMS SECURITY

Authors

Serhii Yevseiev, National Technical University “Kharkiv Polytechnic Institute”; Yuliia Khokhlachova, National Aviation University; Serhii Ostapov, Y. Fedkovych Chernivtsi National University; Oleksandr Laptiev, Taras Shevchenko National University of Kyiv; Olha Korol, National Technical University “Kharkiv Polytechnic Institute”; Stanislav Milevskyi, National Technical University “Kharkiv Polytechnic Institute”; Oleksandr Milov, National Technical University “Kharkiv Polytechnic Institute”; Serhii Pohasii, National Technical University “Kharkiv Polytechnic Institute”; Yevgen Melenti, National Academy of Security Service of Ukraine; Vitalii Hrebeniuk, National Academy of Security Service of Ukraine; Alla Havrylova, National Technical University “Kharkiv Polytechnic Institute”; Serhii Herasуmov, National Technical University “Kharkiv Polytechnic Institute”; Roman Korolev, National Technical University “Kharkiv Polytechnic Institute”; Oleg Barabash, National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"; Valentyn Sobchuk, Taras Shevchenko National University of Kyiv; Roman Kyrychok, Borys Grinchenko Kyiv University; German Shuklin, State University of Telecommunications; Volodymyr Akhramovych, State University of Telecommunications; Vitalii Savchenko, State University of Telecommunications; Sergii Golovashych, National Technical University “Kharkiv Polytechnic Institute”; Oleksandr Lezik, Ivan Kozhedub Kharkiv National Air Force University; Ivan Opirskyy, Lviv Polytechnic National University; Oleksandr Voitko, National Defence University of Ukraine named after Ivan Cherniakhovskyi; Kseniia Yerhidzei, National Defence University of Ukraine named after Ivan Cherniakhovskyi; Serhii Mykus, National Defence University of Ukraine named after Ivan Cherniakhovskyi ; Yurii Pribyliev, National Defence University of Ukraine named after Ivan Cherniakhovskyi; Oleksandr Prokopenko, National Defence University of Ukraine named after Ivan Cherniakhovskyi; Andrii Vlasov, Kharkiv National University of Radioelectronics; Nataliia Dzheniuk, National Technical University “Kharkiv Polytechnic Institute”; Maksym Tolkachov, National Technical University “Kharkiv Polytechnic Institute”

Keywords:

cybersecurity, models of the threat, crypto-code constructions, simulation modelling, automation, radio engineering research, security measures

Synopsis

The development of technologies and computing resources has not only expanded the range of digital services in all spheres of human activity, but also determined the range of targeted cyber attacks. Targeted attacks are aimed at destroying not only the business structure, but also its individual components that determine critical business processes. The continuity of such business processes is a critical component of any company, organization or enterprise of any form of ownership, which has a critical impact on making a profit or organizing production processes. The proposed concept of determining the security level of critical business processes is based on the need to use multiloop information security systems. This makes it possible to ensure the continuity of critical business processes through a timely objective assessment of the level of security and the timely formation of preventive measures. This approach is based on the proposed rules for determining the reach of a given security level, based on assessments of the integrity, availability and confidentiality of information arrays, as well as computer equipment for different points of the organization's business processes. The issues of applying situational management methods to ensure the safe functioning of objects of socio-cyberphysical systems, logical and transformational rules that form the foundation for building a situational type cybersecurity management system are considered. One of the main tasks of systems of this type is described – the task of replenishing the description of the situation. The use of pseudophysical logics, various types of pseudophysical logics, the method of their construction and their interconnection are proposed. Particular attention is paid to causal pseudophysical logic, as the least developed for the purposes of ensuring cybersecurity. The formation of smart technologies, as a rule, uses the wireless standards of communication channels IEEE 802.11X, IEEE 802.15.4, IEEE 802.16, which use only authentication protocols and privacy mechanisms that are formed on the basis of symmetric algorithms. In the conditions of the post-quantum period (the appearance of a full-scale quantum computer), the stability of such algorithms is questioned. Such systems, as a rule, are formed on the basis of the synthesis of socio-cyber-physical systems and cloud technologies, which simplifies the implementation of Advanced Persistent Threat attacks, both on the internal loop of control systems and on the external one.

The proposed creation of multi-circuit information protection systems allows for an objective assessment of the flow state of the system as a whole and the formation of preventive measures against cyber threats.

In the thied chapter, models of probable threats and information protection in public networks are proposed. The most general model of the formal description of the protection system is the model of the security system with full overlap, in which a complete list of protection objects and threats to information is determined, and means of ensuring security are determined from the point of view of their effectiveness and contribution to ensuring the security of the entire telecommunications system. It is also shown that the combination of four models (M1, M2, M3, M4) in various variants provides wide opportunities for modeling various known types of threats and their implementation. However, in connection with the continuity of the process of developing new and improving existing methods and means of implementing threats, it is necessary to use such approaches to ensuring information protection that allow detecting and preventing threats of unknown types and carrying out dynamic correction of protection behavior, adapting it to specific application conditions. The M5 basic model is described, which enables continuous refinement of threat classes and response measures, and continuous training of the adaptive component of the CSI, which, in turn, detects and prevents threats of unknown types. The M6 basic model is introduced with the aim of obtaining higher security due to the presence of a special module of internal diagnostics that diagnoses the entire protection system, decides on the correction of the SHI behavior algorithm, and makes it possible to achieve SHI fault tolerance; a special module that diagnoses the communication channel with subsequent changes in the level of protection, allows to achieve the adaptability of the SHI.

The fourth chapter is deal with the development of cryptographic primitives based on cellular automata. The definition of a cellular automaton is given and the elementary rules of intercellular interaction are described.

A number of generators of pseudorandom binary sequences have been developed based on a combination of elementary rules of intercellular interaction, as well as cell interaction according to a rule of our own development.

In the “cryptographic sponge” architecture, a cryptographic hashing function with a shuffling function based on cellular automata was developed and its statistical characteristics and avalanche effect were investigated.

A block cipher in the SP-network architecture is constructed, in which cellular automata are used to deploy the key, and the encryption process is based on elementary procedures of replacement and permutation. Substitution blocks are used from the well-known AES cipher, a description of a stream cipher is given, where a personal computer keyboard and mouse are used as the initial entropy. Random data received from the specified devices is processed by a proprietary hashing function based on a "cryptographic sponge". All developed cryptographic functions and primitives demonstrated good statistical characteristics and avalanche properties.

The fifth chapter proposes a methodology for analyzing the quality of the mechanism for validating the identified vulnerabilities of a corporate network, which is based on integral equations that take into account the quantitative characteristics of the vulnerability validation mechanism under study at a certain point in time. This technique allows you to build the laws of distribution of quality indicators of the vulnerability validation process and quantify the quality of the mechanism for validating detected vulnerabilities, which allows you to monitor and control the validation of identified vulnerabilities in real time during active security analysis. A method is proposed for constructing a fuzzy knowledge base for making decisions when validating vulnerabilities of software and hardware platforms with an active analysis of the security of a target corporate network based on the use of fuzzy logic, which makes it possible to provide reliable information about the quality of the mechanism for validating vulnerabilities indirectly. The constructed knowledge base allows you to form decisive decision-making rules for the implementation of a particular attacking action, which allows you to develop expert systems to automate the decision-making process when validating the identified vulnerabilities of target information systems and networks. An improved method of automatic active security analysis is proposed, which, based on the synthesis of the proposed models, techniques and methods, allows, in contrast to the existing ones, to abstract from the conditions of dynamic changes in the environment, i.e. constant development of information technologies, which leads to an increase in the number of vulnerabilities and corresponding attack vectors, as well as an increase in ready-to-use exploits of vulnerabilities and their availability, and take into account only the quality parameters of the vulnerability validation process itself.

ISBN 978-617-7319-72-5 (on-line)
ISBN 978-617-7319-73-2 (print)

------------------------------------------------------------------------------------------------------------------

How to Cite: Yevseiev, S., Khokhlachova, Yu., Ostapov, S., Laptiev, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Khokhlachova, Yu., Ostapov, S., Laptiev, O. (Eds.) (2023). Models of socio-cyber-physical systems security. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 184. doi: http://doi.org/10.15587/978-617-7319-72-5

------------------------------------------------------------------------------------------------------------------

Indexing:

b1.jpg imgonline-com-ua-Resize-8lhbZm409l.jpg engpaper Zenodo451.png openaire45.png

Author Biographies

Serhii Yevseiev, National Technical University “Kharkiv Polytechnic Institute”

Doctor of Technical Science, Professor, Head of Department
Department of Cyber Security
ID ORCID   https://orcid.org/0000-0003-1647-6444
Corresponding author:
Mail to serhii.yevseiev@gmail.com

Yuliia Khokhlachova, National Aviation University

PhD, Associate Professor
Department of Security of Information Technologies
ID ORCID   https://orcid.org/0000-0002-1883-8704

Serhii Ostapov, Y. Fedkovych Chernivtsi National University

Doctor of Physical and Mathematical Sciences, Professor, Head of Department
Department of Computer Systems Software
ID ORCID   https://orcid.org/0000-0002-4139-4152

Oleksandr Laptiev, Taras Shevchenko National University of Kyiv

Doctor of Technical Science, Senior Researcher
Department of Cyber Security and Information Protection
ID ORCID   https://orcid.org/0000-0002-4194-402X

Olha Korol, National Technical University “Kharkiv Polytechnic Institute”

PhD, Associate Professor
Department of Cyber Security
ID ORCID   https://orcid.org/0000-0002-8733-9984

Stanislav Milevskyi, National Technical University “Kharkiv Polytechnic Institute”

PhD, Associate Professor
Department of Cyber Security
ID ORCID   https://orcid.org/0000-0001-5087-7036

Oleksandr Milov, National Technical University “Kharkiv Polytechnic Institute”

Doctor of Technical Science, Professor
Department of Cyber Security
ID ORCID   https://orcid.org/0000-0001-6135-2120

Serhii Pohasii, National Technical University “Kharkiv Polytechnic Institute”

PhD, Associate Professor
Department of Cyber Security
ID ORCID   https://orcid.org/0000-0002-4540-3693

Yevgen Melenti, National Academy of Security Service of Ukraine

PhD, Associate Professor
Special Department No. 5
ID ORCID   https://orcid.org/0000-0003-2955-2469

Vitalii Hrebeniuk, National Academy of Security Service of Ukraine

First Vice-Rector, Doctor of Science in Law, Senior Reseacher
ID ORCID   https://orcid.org/0000-0002-5169-8694

Alla Havrylova, National Technical University “Kharkiv Polytechnic Institute”

Senior Lecturer
Department of Cyber Security
ID ORCID   https://orcid.org/0000-0002-2015-8927

Serhii Herasуmov, National Technical University “Kharkiv Polytechnic Institute”

Doctor of Technical Sciences, Professor
Department of Cyber Security
ID ORCID   https://orcid.org/0000-0003-1810-0387

Roman Korolev, National Technical University “Kharkiv Polytechnic Institute”

PhD
Department of Cyber Security
ID ORCID   https://orcid.org/0000-0002-7948-5914

Oleg Barabash, National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"

Doctor of Technical Sciences, Professor
Department of Automation of Designing of Energy Processes and Systems
ID ORCID   https://orcid.org/0000-0003-1715-0761

Valentyn Sobchuk, Taras Shevchenko National University of Kyiv

Doctor of Physical and Mathematical Sciences, Professor
Department of Integral and Differential Equations
ID ORCID   https://orcid.org/0000-0002-4002-8206

Roman Kyrychok, Borys Grinchenko Kyiv University

PhD
Department of Information and Cyber Security named after Professor Volodymyr Вuriachok
ID ORCID   https://orcid.org/0000-0002-9919-9691

German Shuklin, State University of Telecommunications

PhD, Associate Professor, Head of Department
Department of Information and Cybersecurity Systems
ID ORCID   https://orcid.org/0000-0003-2507-384X

Volodymyr Akhramovych, State University of Telecommunications

Doctor of Technical Sciences, Senior Researcher, Professor
Department of Information and Cybersecurity Systems
ID ORCID   https://orcid.org/0000-0002-6174-5300

Vitalii Savchenko, State University of Telecommunications

Doctor of Technical Sciences, Professor, Director of Institute
Educational and Scientific Institute of Information Protection
ID ORCID   https://orcid.org/0000-0002-3014-131X

Sergii Golovashych, National Technical University “Kharkiv Polytechnic Institute”

PhD, Associate Professor
Department of Software Engineering and Management Intelligent Technologies
ID ORCID   https://orcid.org/0009-0004-2468-1952

Oleksandr Lezik, Ivan Kozhedub Kharkiv National Air Force University

PhD, Associate Professor
Department of Air Defense Forces Tactics of the Land Forces
ID ORCID   https://orcid.org/0000-0002-7186-6683

Ivan Opirskyy, Lviv Polytechnic National University

Doctor of Technical Science, Professor
Department of Information Security
ID ORCID   https://orcid.org/0000-0002-8461-8996

Oleksandr Voitko, National Defence University of Ukraine named after Ivan Cherniakhovskyi

PhD, Head of Center
Educational and Scientific Center of Strategic Communications in the Field of Ensuring National Security and Defense
Institute of Troops (Forces) and Information Technologies
ID ORCID   https://orcid.org/0000-0002-4610-4476

Kseniia Yerhidzei, National Defence University of Ukraine named after Ivan Cherniakhovskyi

PhD
Educational and Scientific Center of Strategic Communications in the field of Ensuring National Security and Defense
Institute of Troops (Forces) and Information Technologies
ID ORCID   https://orcid.org/0000-0003-4634-133X

Serhii Mykus, National Defence University of Ukraine named after Ivan Cherniakhovskyi

Doctor of Technical Science, Professor
Institute of Information and Communication Technologies and Cyber Defense
ID ORCID   https://orcid.org/0000-0002-7103-4166

Yurii Pribyliev, National Defence University of Ukraine named after Ivan Cherniakhovskyi

Doctor of Technical Science, Professor
Department of Information Technologies Employment and Information Security
ID ORCID   https://orcid.org/0000-0003-1941-3561

Oleksandr Prokopenko, National Defence University of Ukraine named after Ivan Cherniakhovskyi

PhD
Laboratory Detection and Forecasting of Information Threats
Educational and Scientific Center of Strategic Communications in the Field of Ensuring National Security and Defense
ID ORCID   https://orcid.org/0000-0002-5482-0317

Andrii Vlasov, Kharkiv National University of Radioelectronics

PhD, Associate Professor
Department of Information Technology Security
ID ORCID   https://orcid.org/0000-0001-6080-237X

Nataliia Dzheniuk, National Technical University “Kharkiv Polytechnic Institute”

Associate Professor
Department of Information Systems
ID ORCID   https://orcid.org/0000-0003-0758-7935

Maksym Tolkachov, National Technical University “Kharkiv Polytechnic Institute”

Associate Professor
Department of Information Systems
ID ORCID   https://orcid.org/0000-0001-7853-5855

References

Milov, O., Khvostenko, V., Natalia, V., Korol, O., Zviertseva, N. (2022). Situational Control of Cyber Security in Socio-Cyber-Physical Systems. 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). doi: https://doi.org/10.1109/hora55278.2022.9800049

Yevseiev, S., Ponomarenko, V., Ponomarenko, V., Rayevnyeva, O., Rayevnyeva, O. (2017). Assessment of functional efficiency of a corporate scientific­educational network based on the comprehensive indicators of quality of service. Eastern-European Journal of Enterprise Technologies, 6 (2 (90)), 4–15. doi: https://doi.org/10.15587/1729-4061.2017.118329

Androshchuk, А., Yevseiev, S., Melenchuk, V., Lemeshko, O., Lemeshko, V. (2020). Improvement of project risk assessment methods of implementation of automated information components of non-commercial organizational and technical systems. EUREKA: Physics and Engineering, 1, 48–55. doi: https://doi.org/10.21303/2461-4262.2020.001131

Pospelov, D. A. (2021). Situatuinal control: Theory and Practice. URSS, 288.

Li, T., Liu, J., Sun, H., Chen, X., Yin, L., Mao, X., Sun, J. (2021). Runtime Verification of Spatio-Temporal Specification Language. Mobile Networks and Applications, 26 (6), 2392–2406. doi: https://doi.org/10.1007/s11036-021-01779-5

Lange, R. T. (2019). Action Grammars: A Grammar Induction-Based Method for Learning Temporally-Extended Actions. Imperial College London.

Kempson, R., Cann, R., Gregoromichelaki, E., Chatzikyriakidis, S. (2017). Action-Based Grammar. Theoretical Linguistics, 43 (1-2), 141–167. doi: https://doi.org/10.1515/tl-2017-0012

Milov, O., Yevseiev, S., Vlasov, A., Herasimov, S., Dmitriiev, O., Kasianenko, M. et al. (2019). Development of scenario modeling of conflict tools in a security system based on formal grammars. Eastern-European Journal of Enterprise Technologies, 6 (9 (102)), 53–64. doi: https://doi.org/10.15587/1729-4061.2019.184274

Mehrabian, M., Khayatian, M., Shrivastava, A., Eidson, J. C., Derler, P., Andrade, H. A. et al. (2017). Timestamp Temporal Logic (TTL) for Testing the Timing of Cyber-Physical Systems. ACM Transactions on Embedded Computing Systems, 16 (5s), 1–20. doi: https://doi.org/10.1145/3126510

Yevseiev, S., Milov, O., Opirskyy, I., Dunaievska, O., Huk, O., Pogorelov, V. et al. (2022). Development of a concept for cybersecurity metrics classification. Eastern-European Journal of Enterprise Technologies, 4 (4 (118)), 6–18. doi: https://doi.org/10.15587/1729-4061.2022.263416

Abel, S., Xiao, L., Wang, H. (2018). Causal Modeling for Cybersecurity. 2018 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), 209–212. doi: https://doi.org/10.1109/socialsec.2018.8760379

Kondakci, S. (2010). A causal model for information security risk assessment. 2010 Sixth International Conference on Information Assurance and Security, 143–148. doi: https://doi.org/10.1109/isias.2010.5604039

Friedenberg, M., Halpern, J. Y. (2018). Combining the causal judgments of experts with possibly different focus areas. Available at: http://www.cs.cornell.edu/home/halpern/papers/focus.pdf

Halpern, J. Y. (2015). A modification of the Halpern-Pearl definition of causality. International Joint Conference on Artificial Intelligence, 3022–3033. Available at: https://www.ijcai.org/Proceedings/15/Papers/427.pdf

Fenz, S., Ekelhart, A. (2011). Verification, Validation, and Evaluation in Information Security Risk Management. IEEE Security & Privacy Magazine, 9 (2), 58–65. doi: https://doi.org/10.1109/msp.2010.117

IEC 31010:2019 (2019). Risk management – Risk assessment techniques. International Organization of Standardization (ISO), 264.

Shaikh, F. A., Siponen, M. (2023). Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers & Security, 124, 102974. doi: https://doi.org/10.1016/j.cose.2022.102974

Haag, S., Siponen, M., Liu, F. (2021). Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 52 (2), 25–67. doi: https://doi.org/10.1145/3462766.3462770

Li, Y., Xin, T., Siponen, M. (2022). Citizens’ Cybersecurity Behavior: Some Major Challenges. IEEE Security & Privacy, 20 (1), 54–61. doi: https://doi.org/10.1109/msec.2021.3117371

Chen, S., Xiao, H., He, W., Mou, J., Siponen, M., Qiu, H., Xu, F. (2021). Determinants of Individual Knowledge Innovation Behavior. Journal of Organizational and End User Computing, 33 (6), 1–24. doi: https://doi.org/10.4018/joeuc.20211101.oa27

Yevseiev, S., Kuznietsov, O., Herasimov, S., Horielyshev, S., Karlov, A., Kovalov, I. et al. (2021). Development of an optimization method for measuring the Doppler frequency of a packet taking into account the fluctuations of the initial phases of its radio pulses. Eastern-European Journal of Enterprise Technologies, 2 (9 (110)), 6–15. doi: https://doi.org/10.15587/1729-4061.2021.229221

Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M., Hrytsyk, V., Milov, O. et al.; Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M. (Eds.) (2022). Modeling of security systems for critical infrastructure facilities. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 196. doi: http://doi.org/10.15587/978-617-7319-57-2

ISO/IEC 27003:2017 (2017). Information technology – Security techniques – Information security management systems – Guidance. Available at: https://www.iso.org/ru/standard/63417.html

ISO/IEC 27006:2015 (2015). Information technology – Security techniques – Requirements for bodies providing audit and certification of information security management systems. Available at: https://www.iso.org/standard/62313.html

ISO/IEC 27035-1:2023 (2023). Information technology – Information security incident management – Part 1: Principles and process. Available at: https://www.iso.org/ru/standard/78973.html

ISO/IEC 27035-2:2023 (2023). Information technology – Information security incident management – Part 2: Guidelines to plan and prepare for incident response. Available at: https://www.iso.org/ru/standard/78974.html

ISO/IEC 27035-3:2020 (2020). Information technology – Information security incident management – Part 3: Guidelines for ICT incident response operations. Available at: https://www.iso.org/ru/standard/74033.html

Lund, M. S., Solhaug, B., Stølen, K. (2010). Model-Driven Risk Analysis: The CORAS Approach. Springer Publishing Company, Incorporated, 400.

Matulevičius, R. (2017). Domain Model for Information Systems Security Risk Management. Fundamentals of Secure System Modelling. Springer International Publishing AG, 17–30. doi: https://doi.org/10.1007/978-3-319-61717-6_2

Innerhofer-Oberperfler, F., Mitterer, M., Hafner, M., Breu, R. (2010). Security Analysis of Service Oriented Systems: A Methodical Approach and Case Study. Web Services Security Development and Architecture. IGI Global, 33–56. doi: https://doi.org/10.4018/978-1-60566-950-2.ch002

Innerhofer-Oberperfler, F., Breu, R.; Moore, T., Pym, D., Ioannidis, C. (Eds.) (2010). Potential Rating Indicators for Cyberinsurance: An Exploratory Qualitative Study. Economics of Information Security and Privacy. Boston: Springer. doi: https://doi.org/10.1007/978-1-4419-6967-5_13

Alkubaisy, D., Piras, L., Al-Obeidallah, M. G., Cox, K., Mouratidis, H.; Ali, R., Kaindl, H., Maciaszek, L. A. (Eds.) (2022). A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design. Evaluation of Novel Approaches to Software Engineering. Cham: Springer, 67–87. doi: https://doi.org/10.1007/978-3-030-96648-5_4

Pullonen, P., Tom, J., Matulevičius, R., Toots, A. (2019). Privacy-enhanced BPMN: enabling data privacy analysis in business processes models. Software and Systems Modeling, 18 (6), 3235–3264. doi: https://doi.org/10.1007/s10270-019-00718-z

Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevicius, R. et al. (2021). Post-Quantum Era Privacy Protection for Intelligent Infrastructures. IEEE Access, 9, 36038–36077. doi: https://doi.org/10.1109/access.2021.3062201

Koeze, R. (2017). Designing a Rule-Based Cyber Risk Assessment Tool for Small to Medium Enterprises. Delft University of Technology. The TREsPASS Project. The TREsPASS Project.

Pohasii, S., Yevseiev, S., Zhuchenko, O., Milov, O., Lysechko, V., Kovalenko, O. et al. (2022). Development of crypto-code constructs based on LDPC codes. Eastern-European Journal of Enterprise Technologies, 2 (9 (116)), 44–59. doi: https://doi.org/10.15587/1729-4061.2022.254545

Shmatko, O., Balakireva, S., Vlasov, A., Zagorodna, N., Korol, O., Milov, O. et al. (2020). Development of methodological foundations for designing a classifier of threats to cyberphysical systems. Eastern-European Journal of Enterprise Technologies, 3 (9 (105)), 6–19. doi: https://doi.org/10.15587/1729-4061.2020.205702

Merz, H., Hansemann, T., Hübner, C. (2009). Building Automation: Communication systems with EIB/KNX, LON und BACnet. Berlin Heidelberg: Springer-Verlag, 293.

KNX Technical Manual 2CKA001473B8668. KNX Technical Manual. Busch-Presence detector KNX / Busch-Watchdog Sky KNX (2017). Busch-Jaeger Elektro GmbH, 198.

Technical documentation on KNX devices (2006). ABB.

KNX Handbook Version 1.1 Revision 1 (2004). Konnex Association.

ABB i-bus KNX KNX Security Panel GM/A 8.1 Product Manual (2016). Busch-Watchdog Sky KNX. Busch-Jaeger Elektro GmbH, 648.

Schilder, J., Reibel, T. (2016). ABB GPG Building Automation Webinar ABB i-bus® KNX Basics and Products. Busch-Watchdog Sky KNX. Busch-Jaeger Elektro GmbH, 86.

Manual for KNX Planning (2017). Siemens Switzerland Ltd, 100.

Security Technology KNX-Intrusion Alarm System L240 Installation, Commissioning, Operation / Busch-Watchdog Sky KNX (2010). Busch-Jaeger Elektro GmbH, 116.

Bartock, M., Cichonski, J., Souppaya, M., Smith, M., Witte, G., Scarfone, K. (2016). Guide for cybersecurity event recovery. doi: https://doi.org/10.6028/nist.sp.800-184

Security requirements for cryptographic modules (1994). Information Technology Laboratory. Available at: https://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf

Cichonski, J., Franklin, J. M., Bartock, M. (2017). Guide to LTE security. doi: https://doi.org/10.6028/nist.sp.800-187

Kottapalli, N. (2011). Diameter and LTE Evolved Packet System. Corporate Headquarters, 10. Available at: http://go.radisys.com/rs/radisys/images/paper-lte-diameter-eps.pdf

Ventura, H. (2002). Diameter – Next generation’s AAA protocol. Institutionen för Systemteknik, 66.

Vinay, K. S. B., Harihar, M. N. (2012). Diameter-Based Protocol in the IP Multimedia Subsystem. International Journal of Soft Computing and Engineering, 1 (6), 266–269.

Qanbari, S., Mahdizadeh, S., Rahimzadeh, R., Behinaein, N., & Dustdar, S. (2016). Diameter of Things (DoT): A Protocol for Real-Time Telemetry of IoT Applications. Lecture Notes in Computer Science. GECON, 207–222. doi: https://doi.org/10.1007/978-3-319-43177-2_14

Tschofenig, H. (2019). Diameter: new generation AAA protocol – design, practice, and applications. Hoboken: John Wiley & Sons, Ltd, 230. doi: https://doi.org/10.1002/9781118875889

Ugrozy bezopasnosti iadra paketnoi seti 4G (2017). Available at: https://www.ptsecurity.com/ru-ru/research/analytics/epc-2017/

Uiazvimosti protokola Diameter v setiakh 4G (2018). Available at: https://www.ptsecurity.com/ru-ru/research/analytics/diameter-2018/

Yevseiev, S., Tsyhanenko, O., Ivanchenko, S., Aleksiyev, V., Verheles, D., Volkov, S. et al. (2018). Practical implementation of the Niederreiter modified crypto­code system on truncated elliptic codes. Eastern-European Journal of Enterprise Technologies, 6 (4 (96)), 24–31. doi: https://doi.org/10.15587/1729-4061.2018.150903

Yevseiev, S., Korol, O., Kots, H. (2017). Construction of hybrid security systems based on the crypto-code structures and flawed codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (88)), 4–21. doi: https://doi.org/10.15587/1729-4061.2017.108461

Yevseiev, S., Kots, H., Liekariev, Y. (2016). Developing of multi-factor authentication method based on niederreiter-mceliece modified crypto-code system. Eastern-European Journal of Enterprise Technologies, 6 (4 (84)), 11–23. doi: https://doi.org/10.15587/1729-4061.2016.86175

Yevseiev, S., Rzayev, K., Korol, O., Imanova, Z. (2016). Development of mceliece modified asymmetric crypto-code system on elliptic truncated codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (82)), 18–26. doi: https://doi.org/10.15587/1729-4061.2016.75250

Pohasii, S., Yevseiev, S., Zhuchenko, O., Milov, O., Lysechko, V., Kovalenko, O. et al. (2022). Development of crypto-code constructs based on LDPC codes. Eastern-European Journal of Enterprise Technologies, 2 (9 (116)), 44–59. doi: https://doi.org/10.15587/1729-4061.2022.254545

Naim, M., Ali-Pacha, H., Ali-Pacha, A., Hadj-Said, N. (2021). Lengthening the period of a Linear Feedback Shift Register. Journal of Engineering Technology and Applied Sciences, 6 (1), 45–68. doi: https://doi.org/10.30931/jetas.778792

Khoroshko, V. O., Pavlov, I. M., Bobalo, Y. Ya., Dudykevich, V. B. et al. (2020). Design of complex information protection systems. Lviv: Lviv Polytechnic, 320.

Brailovskyi, M. M., Zybin, S. V., Piskun, I. V., Khoroshko, V. O., Khokhlacheva, Yu. E. (2021). Tekhnolohii zakhystu informatsii. Kyiv: Central Committee "Comprint", 296.

Popovsky, V. V., Persikov, A. V. (2006). Zakhyst informatsii v telekomunikatsiinykh systemakh. Kharkiv: SMIT.

Dudykevich, V. B., Khoroshko, V. O., Yaremchuk, Yu. E. (2018). Osnovy informatsiinoi bezpeky. Vinnytsia: VNTU, 315.

Efficiency Standards for Protecting ACS and Computers from Data Loss Due to EM Emissions and Pickup (1997). Moscow: MOP, 35.

Brailovsky, M. M., Zybin, S. V., Kobozeva, A. A., Khoroshko, V. O., Khokhlacheva, Yu. E. (2021). Analysis of cyber security of information systems. Kyiv: FOP Yamchynskyi O. V., 360.

Beloshapkin, V. K., Pustovit, S. M., Stepanov, V. D. (2005). Construction of a specialized model of the information system for the purpose of synthesizing a complex SHI. Protection of information, 3, 78–83.

Stallings, V. (2001). Cryptography and network protection, principles and practice. House Williams, 672.

Chumarin, I. G. (2001). Taina predpryiatyia: chto y kak zashchyshchat. Saint Petersburg: Ed. DNA, 159.

Stepanov, V. D., Khoroshko, V. O. (2003). Collection of sciences. Works Information protection of the Scientific Research Institute of GUR, 5, 12–19.

Khoroshko, V. O., Kryvoruchko, O. V., Brailovskyi, M. M., Kozyura, V. D., Desyatko, A. M. (2019). Protection of electronic communications systems. Kyiv. national trade and economy Univ, 164.

Domarev, V. V. (2004). Bezopasnost informatcionnykh tekhnologii. Sistemnii pokhod. Kyiv: TND "DS", 992.

Maksimov, Yu. A., Fillipovskaya, E. A. (1982). Algorithms for solving problems of nonlinear programming. Moscow: MIPhI, 342.

Petrov, A. A., Khoroshko, V. A. (2009). Evaluation of the effectiveness of the complex information protection system in public networks. Collection. Science works of KNU named after T. Shevchenko VIKNU, 21, 128–131.

Hayvoronsky, M. V., Novikov, O. M. (2009). Bezpeka informatsiino-komunikatsiinykh system. Kyiv: Ed. BHV group, 608.

Pichkur, V. V., Sobchuk, V. V. (2021). Mathematical Model and Control Design of a Functionally Stable Technological Process. Journal of Optimization, Differential Equations and Their Applications, 29 (1), 32. doi: https://doi.org/10.15421/142102

Sobchuk, V., Pichkur, V., Barabash, O., Laptiev, O., Kovalchuk, I., Zidan, A. (2020). Algorithm of Control of Functionally Stable Manufacturing Processes of Enterprises. 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, 206–210, doi: https://doi.org/10.1109/ATIT50783.2020.9349332

Sobchuk, V., Olimpiyeva, Y., Musienko, A., Sobchuk, A. (2021). Ensuring the properties of functional stability of manufacturing processes based on the application of neural networks. CEUR Workshop Proceedings, 2845, 106–116.

Maksymuk, O. V., Sobchuk, V. V., Salanda, I. P., Sachuk, Yu. V. (2020). A system of indicators and criteria for evaluation of the level of functional stability of information heterogenic networks. Mathematical Modeling and Computing, 7 (2), 285–292. doi: https://doi.org/10.23939/mmc2020.02.285

Barabash, O., Tverdenko, H., Sobchuk, V., Musienko, A., Lukova-Chuiko, N. (2020). The Assessment of the Quality of Functional Stability of the Automated Control System with Hierarchic Structure. 2020 IEEE 2nd International Conference on System Analysis & Intelligent Computing (SAIC). Kyiv: Igor Sikorsky Kyiv Polytechnic Institute, 158–161. doi: https://doi.org/10.1109/SAIC51296.2020.9239122

Sobchuk, V., Kapustyan, O., Pichkur, V., Kapustian, O. (2021). Design of Stable Periodic Regimes for one Class of Hybrid Planar Systems. II International Scientific Symposium “Intelligent Solutions”. Kyiv, 89–100.

Kapustian, O. A., Kapustyan, O. V., Ryzhov, A., Sobchuk, V. (2022). Approximate Optimal Control for a Parabolic System with Perturbations in the Coefficients on the Half-Axis. Axioms, 11 (4), 175. doi: https://doi.org/10.3390/axioms11040175

Sobchuk, V. V. (2019) The method of creating a single information space at a production enterprise with a functionally stable production process. Control, navigation and communication systems, 6 (58), 84–91.

Sobchuk, V., Barabash, O., Musienko, A., Laptiev, O., Kozlovskyi, V., Shcheblanin, Y. (2022). Evaluation of Efficiency of Application of Functionally Sustainable Generalized Information System of the Enterprise. 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications. Ankara. doi: https://doi.org/10.1109/hora55278.2022.9799892

Sobchuk, V., Zamrii, I., Vlasyk, H., Tsvietkova, Y. (2021). Strategies for management of operation of production centers to provide functionally sustainable technological processes of production. 2021 IEEE 3 nd International Conference on Advanced Trends in Information Theory (ATIT). Kyiv, 61–66.

Sobchuk, V., Zamrii, I., Barabash, O., Musienko, A. (2021). Methodology for building a functionally stable intelligent information system of a manufacturing enterprise. Bulletin of Taras Shevchenko National University of Kyiv. Series: Physics and Mathematics, 4, 116–127. doi: https://doi.org/10.17721/1812-5409.2021/4.18

Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: http://doi.org/10.15587/978-617-7319-31-2

Vlasyk, H., Zamrii, I., Shkapa, V., Kalyniuk, A., Laptieva, T. (2021). The method of solving problems of optimal restoration of telecommunication signals. 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT). Proceedings, 71–75. doi: https://doi.org/10.1109/atit54053.2021.9678649

Svynchuk, O., Barabash, O., Nikodem, J., Kochan, R., Laptiev, O. (2021). Image Compression Using Fractal Functions. Fractal and Fractional, 5 (2), 31. doi: https://doi.org/10.3390/fractalfract5020031

Salanda, I. P., Barabash, O. V., Musienko, A. P. (2017). System of indicators and criteria for formalization of processes of ensuring local functional stability of extensive information networks. Systems of control, navigation and communication, 1 (41), 122–126.

Petrivskyi, V., Shevchenko, V., Yevseiev, S., Milov, O., Laptiev, O., Bychkov, O. et al. (2022). Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors. Eastern-European Journal of Enterprise Technologies, 1 (9 (115)), 15–23. doi: https://doi.org/10.15587/1729-4061.2022.252988

Lenkov, S., Zhyrov, G., Zaitsev, D., Tolok, I., Lenkov, E., Bondarenko, T. et al. (2017). Features of modeling failures of recoverable complex technical objects with a hierarchical constructive structure. Eastern-European Journal of Enterprise Technologies, 4 (4 (88)), 34–42. doi: https://doi.org/10.15587/1729-4061.2017.108395

Yevseiev, S., Rzayev, K., Laptiev, O., Hasanov, R., Milov, O., Asgarova, B. et al. (2022). Development of a hardware cryptosystem based on a random number generator with two types of entropy sources. Eastern-European Journal of Enterprise Technologies, 5 (9 (119)), 6–16. doi: https://doi.org/10.15587/1729-4061.2022.265774

Mashkov, V. A., Barabash, O. V. (1998) Self-checking and Self-diagnosis of Module Systems on the Principle of Walking Diagnostic Kernel. Engineering Simulation. Amsterdam: OPA, 15, 43–51.

Mashkov, V. A., Barabash, O. V. (1996) Self-Testing of Multimodule Systems Based on Optimal Check-Connection Structures. Engineering Simulation. Amsterdam: OPA, 13, 479–492.

Mashkov, V. A., Barabash, O. V. (1995). Self-checking of modular systems under random performance of elementary checks. Engineering Simulation. Amsterdam: OPA, 12 (3), 433–445.

Barabash, O. V., Dakhno, N. B., Shevchenko, H. V., Majsak, T. V. (2017). Dynamic Models of Decision Support Systems for Controlling UAV by Two-Step Variational-Gradient Method. Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD), 108–111. doi: https://doi.org/10.1109/apuavd.2017.8308787

Mukhin, V., Zavgorodnii, V., Barabash, O., Mykolaichuk, R., Kornaga, Y., Zavgorodnya, A., Statkevych, V. (2020). Method of Restoring Parameters of Information Objects in a Unified Information Space Based on Computer Networks. International Journal of Computer Network and Information Security, 12 (2), 11–21. doi: https://doi.org/10.5815/ijcnis.2020.02.02

Mukhin, V., Loutskii, H., Barabash, O., Kornaga, Y., Steshyn, V. (2015). Models for Analysis and Prognostication of the Indicators of the Distributed Computer Systems’ Characteristics. International Review on Computers and Software (IRECOS), 10 (12), 1216–1224. doi: https://doi.org/10.15866/irecos.v10i12.8023

Laptiev, O., Shuklin, G., Savchenko, V., Barabash, O., Musienko, A., Haidur, H. (2019). The Method of Hidden Transmitters Detection based on the Differential Transformation Model. International Journal of Advanced Trends in Computer Science and Engineering, 8 (6), 2840–2846. doi: https://doi.org/10.30534/ijatcse/2019/26862019

Sobchuk, V., Barabash, O., Musienko, A., Svynchuk, O. (2021). Adaptive accumulation and diagnostic information systems of enterprises in energy and industry sectors. E3S Web of Conferences, 250, 08002. doi: https://doi.org/10.1051/e3sconf/202125008002

Kyrychok, R., Shuklin, G. (2020). The method of building a knowledge base for dicision-making when validating corporate networks vulnerabilities. Scientific Discussion, 1 (47), 7–11.

Kyrychok, R. V., Shuklin, G. V. (2020). Methodology for analysing the quality of the vulnerability validation mechanism in the corporate networks. Telecommunication and Information Technologies, 69 (2), 29–40. doi: https://doi.org/10.31673/2412-4338.2020.022930

Kyrychok, R. V. (2018). Test na pronyknennia yak imitatsiinyi pidkhid do analizu zakhyshchenosti korporatyvnykh informatsiinykh system. Suchasnyi zakhyst informatsii, 2 (34), 53–58.

Kyrychok, R. V., Skladannyi, P. M., Buryachok, V. L., Hulak, H. M., Kozachok, V. A. (2016). The problems of controlling the security of corporate networks and solutions. Naukovi zapysky Ukrainskoho naukovo-doslidnoho instytutu zviazku, 3, 48–61.

Yevseiev, S., Aleksiyev, V., Balakireva, S., Peleshok, Y., Milov, O., Petrov, O. et al. (2019). Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy. Eastern-European Journal of Enterprise Technologies, 3 (9 (99)), 49–63. doi: https://doi.org/10.15587/1729-4061.2019.169527

Barabash, O., Dakhno, N., Shevchenko, H., Sobchuk, V. (2019). Unmanned Aerial Vehicles Flight Trajectory Optimisation on the Basis of Variational Enequality Algorithm and Projection Method. Proceeding. Actual Problems of Unmanned Aerial Vehicles Developments. Kyiv, 136–139. doi: https://doi.org/10.1109/apuavd47061.2019.8943869

Asrorov, F., Sobchuk, V., Kurylko, О. (2019). Finding of bounded solutions to linear impulsive systems. Eastern-European Journal of Enterprise Technologies, 6 (4 (102)), 14–20. doi: https://doi.org/10.15587/1729-4061.2019.178635

Barabash, O. V., Musienko, A. P., Sobchuk, V. V., Lukova-Chuiko, N. V., Svynchuk, O. V.; Sadovnichiy, V. A., Zgurovsky, M. Z. (Eds.) (2020). Distribution of Values of Cantor Type Fractal Functions with Specified Restrictions. Contemporary Approaches and Methods in Fundamental Mathematics and Mechanics. Cham: Springer, 433–455. doi: https://doi.org/10.1007/978-3-030-50302-4_21

Samoilenko, A. M., Samoilenko, V. G., Sobchuk, V. V. (1999). On periodic solutions of the equation of a nonlinear oscillator with pulse influence. Ukrainian Mathematical Journal, 51 (6), 926–933. doi: https://doi.org/10.1007/bf02591979

Svynchuk, О., Barabash, A., Laptiev, S., Laptieva, T. (2021). Modification of query processing methods in distributed databases using fractal trees. Information Security And Information Technologies. Kharkiv – Odesa, 32–37.

Laptiev, O., Lukova-Chuiko, N., Laptiev, S., Laptieva, T., Savchenko, V., Yevseiev, S. (2021). Development of a method for detecting deviations in the nature of traffic from the elements of the communication network. Information Security And Information Technologies. Kharkiv – Odesa, 1–9.

Lukova-Chuiko, N., Herasymenko, O., Toliupa, S., Laptiev, S., Laptieva, T., Laptiev, O. (2021). The method detection of radio signals by estimating the parameters signals of eversible Gaussian propagation. 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT), 67–70. doi: https://doi.org/10.1109/atit54053.2021.9678856

Savchenko, V., Akhramovych, V., Dzyuba, T., Laptiev, S., Lukova-Chuiko, N., Laptieva, T. (2021). Methodology for Calculating Information Protection from Parameters of its Distribution in Social Networks. 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT), 99–105. doi: https://doi.org/10.1109/atit54053.2021.9678599

Sobchuk, A., Haidur, H., Laptiev, S., Laptieva, T., Asrorov, F., Perehuda, O. (2022). Modified Fourier transform for improving spectral analysis of radio signals. Мodern information, measurement and control systems: problems, applications and perspectives’2022. Antalya.

Laptiev, O., Tkachev, V., Maystrov, O., Krasikov, O., Open’ko, P., Khoroshko, V., Parkhuts, L. (2022). The method of spectral analysis of the determination of random digital signals. International Journal of Communication Networks and Information Security (IJCNIS), 13 (2), 271–277. doi: https://doi.org/10.17762/ijcnis.v13i2.5008

Tanasiuk, Yu. V., Melnychuk, Kh. V., Ostapov, S. E. (2017). Development and research of cryptographic hash functions on the basis of cellular automat. Systemy Obrobky Informatsii, 4 (150), 122–127. doi: https://doi.org/10.30748/soi.2017.150.25

Tanasyuk, Y., Perepelitsyn, A., Ostapov, S. (2018). Parameterized FPGA-bazed implementation of cryptographic hash functions using cellular automata. 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 225–228. doi: https://doi.org/10.1109/dessert.2018.8409133

Applebaum, B., Ishai, Y., Kushilevitz, E. (2010). Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature? Proceedings of the 1st Symposium on Innovations in Computer Science (ICS 10). Beijing. Available at: http://www.wisdom.weizmann.ac.il/~bennyap/pubs/CA.pdf

Ostapov, S., Val, O., Yanushevsky, S., Chyzhevsky, D.; Rostanski, M., Pikiewicz, P., Buchwald, P. (Eds.) (2015). Cryptography on the Base of Cellular Automata. Internet in the Information Society. Scientific Publishing University of Dabrowa Gornicza, 71–86.

Wolfram, S. (2002). A New Kind of Science. Wolfram Media, 1197.

Zhikharevich, V. V., Ostapov, S. E. (2009). Modelirovanie protcessov samoorganizatcii i evoliutcii sistem metodom nepreryvnykh asinkhronnykh kletochnykh avtomatov. Komp’iuting, 8 (3), 61–69.

Zhikharevich, V. V., Shumylyak, L. M. (2013). Use of continuous cellular automata for simulation of thermal conductivity in systems with first order phase transition. International Journal of Computing, 12 (2), 142–150. doi: https://doi.org/10.47839/ijc.12.2.595

Shumyliak, L. M., Zhykharevych, V. V., Ostapov, S. E. (2018). Application of the asynchronal cellular automata method in the heat conductivity problems investigation. Systemy Obrobky Informatsii, 1 (152), 74–79. doi: https://doi.org/10.30748/soi.2018.152.11

Hazdiuk, K., Zhikharevich, V., Ostapov, S. (2020). Simulating Self-Regeneration and Self-Replication Processes Using Movable Cellular Automata with a Mutual Equilibrium Neighborhood. Complex Systems, 29 (4), 741–757. doi: https://doi.org/10.25088/complexsystems.29.4.741

Zhykharevych, V. V., Matsiuk, N. O. (2016). Solution the routing problem by modified ant-cellular automaton algorithm. Visnyk ekonomichnoi nauky Ukrainy, 1, 49–54.

Clarridge, A., Salomaa, K. (2009). A Cryptosystem Based on the Composition of Reversible Cellular Automata. Language and Automata Theory and Applications, 314–325. doi: https://doi.org/10.1007/978-3-642-00982-2_27

Val, O. D., Zhikharevich, V. V., Ovchar, R. I., Ostapov, S. E. (2015). Development and Investigation of the Key Stream Generators on the Base of Cellular Automata. Radio Electronics, Computer Science, Control, 3 (34), 58–63. doi: https://doi.org/10.15588/1607-3274-2015-3-7

Rukhin, A., Sota, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S. et al. (2010). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Computer Resource Center, SP 800-22 Rev.1a, Available at: https://csrc.nist.gov/publications/detail/sp/800-22/rev-1a/final

Dworkin, M. J. (2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. doi: https://doi.org/10.6028/nist.fips.202

Downloads

Published

June 29, 2023

How to Cite

Yevseiev, S., Khokhlachova, Y., Ostapov, S., Laptiev, O., Korol, O., Milevskyi, S., Milov, O., Pohasii, S., Melenti, Y., Hrebeniuk, V., Havrylova, A., Herasуmov S., Korolev, R., Barabash, O., Sobchuk, V., Kyrychok, R., Shuklin, G., Akhramovych, V., Savchenko, V., Golovashych, S., Lezik, O., Opirskyy, I., Voitko, O., Yerhidzei, K., Mykus, S., Pribyliev, Y., Prokopenko, O., Vlasov, A., Dzheniuk, N., & Tolkachov, M. (2023). MODELS OF SOCIO-CYBER-PHYSICAL SYSTEMS SECURITY. Kharkiv: TECHNOLOGY CENTER PC. https://doi.org/10.15587/978-617-7319-72-5