<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Automated Software Vulnerability Testing Using In-Depth Training Methods</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>V. N. Karazin Kharkiv National University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svobody sq.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine kuznetsov@karazin.ua</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>alex.shapoval@protonmail.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>kirillfilippsky@gmail.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>suvenick</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@gmail.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>mariia.popova</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@gmail.com</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Sumy State University</institution>
          ,
          <addr-line>Rymskogo-Korsakova st., 2, Sumy, 40007</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>The article provides a view on modern technologies, which are used for automatic software vulnerability testing in critically important systems. Features of fuzzing realization (which is based on making many inputs with different mutated data) are also studied. As a result, testing algorithm picks input data that is more likely to cause a fail or incorrect work of software product. Deep learning algorithms are used to decrease the computational complexity of testing process. The use of simple fuzzer and Deep Reinforcement Learning algorithm shows that the amount of mutations necessary to find vulnerabilities decreases by 30%.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Fuzzing</kwd>
        <kwd>Testing</kwd>
        <kwd>Reinforcement Learning</kwd>
        <kwd>Q-Learning</kwd>
        <kwd>Software Security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The development of modern computer technology leads to the emergence of new
high-quality information services and their implementation in all spheres of human
activity [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1-5</xref>
        ]. The development of the IT-industry has led to the construction of
global computer networks, extensive data warehouses, automated control systems,
including critical infrastructures, Smart Grid and much more [
        <xref ref-type="bibr" rid="ref6 ref7">6-8</xref>
        ].
      </p>
      <p>In the age of the Internet and global implementation of information technologies,
information security is more important for critical infrastructures [9, 10]. Complex
solution for problems related to informational security is connected with solving
different objectives in cryptography [11-14], computations optimization, technical and
physical security as well as many others [10, 15-17].</p>
      <p>
        This paper focuses on the problem of automated software vulnerability scanning
[
        <xref ref-type="bibr" rid="ref8">18-22</xref>
        ]. As practice shows, computer programs are the most exposed fragment of
modern IT infrastructure. Failure or configuration errors and undeclared operations
can lead to disastrous consequences. Development and research of methods and tools
for automated software vulnerability scanning is extremely important and relevant
task.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Known Fuzzers and Their Analysis</title>
      <p>
        Barton Miller, who is a professor at the University of Wisconsin, Madison, was the
first to introduce the term “fuzzing” together with his students in 1989 [
        <xref ref-type="bibr" rid="ref9">23</xref>
        ].
Henceforward, the development of automated testing continued and the creators of fuzzing
used this method to search for vulnerabilities in software using different operating
systems including UNIX, Windows and Mac OS [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">23-26</xref>
        ]. Today fuzzing is most
commonly used in Software Quality Assurance. It is also one of the key steps of
Microsoft Security Development Lifecycle (SDL). Software experts from Microsoft
consider that deliberate input of wrong or random data is a sufficient and non-costly
way to detect potential errors before product release [
        <xref ref-type="bibr" rid="ref8">18-22</xref>
        ].
      </p>
      <p>
        Fuzzing testing has several advantages among which [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">23-26</xref>
        ]:
 high speed (usually much higher than manual code review);
 no need to involve human work;
 fuzzer does not need to be controlled, while human capabilities are finite;
 scalability, i.e. if there is a need to find more vulnerabilities, the only thing needed
is more fuzzers.
      </p>
      <p>
        However, fuzzing has several disadvantages. For example, when fuzzing is used,
it is very difficult to discover deep errors, such as business logic errors etc. [
        <xref ref-type="bibr" rid="ref13">27</xref>
        ]. It is
relevant to conduct comparative analysis of different fuzzing methods and
experimental researches using the most common software products as an example.
      </p>
      <p>
        This work presents the results of analysis and comparative research of automated
vulnerability search technologies. Particularly, the following common fuzzing utilities
are reviewed [
        <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17 ref18">28-32</xref>
        ]: American Fuzzy Lop, MiniFuzz, and Peach. Experimental
researches are conducted for such everyday software products as Google Chrome;
Notepad++; Winamp; Microsoft Paint.
      </p>
      <p>
        American Fuzzy Lop (AFL) is an open-source fuzzer, which was developed by
Polish computer security expert Michał Zalewski [
        <xref ref-type="bibr" rid="ref15 ref16">29, 30</xref>
        ]. The program uses genetic
algorithms to automatically look for test cases. This fuzzer’s main goal is to cause
unexpected behavior of target programs by changing or shifting input channel bytes.
      </p>
      <p>
        MiniFuzz was developed by Microsoft. This fuzzer is intended for simple and
routine usage [
        <xref ref-type="bibr" rid="ref17">31</xref>
        ]. Its operating principle is forming data beforehand, then passing them
to the target and catching errors. This utility belongs to dumb fuzzers category which
conduct fuzzing randomly.
      </p>
      <p>
        Peach is more advanced tool for “intellectual” fuzzing developed by Michael
Eddington [
        <xref ref-type="bibr" rid="ref18">32</xref>
        ]. It supports not only mutation mode but also fuzz-file generation. Since
program needs to know the structure of target files, specialized XML-documents are
used as input. Peach can fuzz applications, servers, network protocols, drivers,
internal protocols, devices, systems and so on.
      </p>
      <p>During experimental research of automated vulnerability search effectiveness
MiniFuzz was used. Fuzzing process was conducted for several common desktop
applications, including Google Chrome; Notepad++; Winamp; Microsoft Paint.</p>
      <p>For Google Chrome testing several dozens of different html-files were selected.
Aggressiveness (how much of input data is mutated) was alternately set to 5%, 15%,
25%, 35%. Testing results for this case are shown in Table 1. As can be seen from the
table, fuzzing testing can help in discovering “File Not Found” type errors.
Apparently, higher aggressiveness leads to more errors of this type.</p>
      <p>
        Conducted tests show that the majority of common applications are secured and
cannot be crashed using primitive fuzzing. In the case of Google Chrome, for
example, it is not a surprise, because software engineers and testing professionals at Google
use much more complex fuzzing during the development cycle of their products [
        <xref ref-type="bibr" rid="ref14">28</xref>
        ].
The same goes for Microsoft.
      </p>
      <p>Thus, the analysis of different fuzzers in the area of automated testing shows that
this approach to software vulnerability search can vary depending on the goal, tester’s
skills, data format and other factors. Some applications have privilege separation
system, which depends on user level. Using fuzzer as a tool for automated vulnerability
search, it is possible to find errors in software products, which let attacker gain full or
partial control over the system. Some low-lever errors are very similar to each other
so it is possible to use the same logic to find vulnerabilities in more applications.</p>
      <p>Relying on conducted experimental research for selective testing it can be said that
fuzzing is quite promising method of automated vulnerabilities search. We were able
to find errors even in reliable and tested applications, like Google Chrome and
Microsoft Paint, as we managed to discover random input data, which would cause errors.
However, these are not critical for application functioning and/or operating system,
their handling is correct that, apparently, is stipulated behavior for such kind of
corrupted input data.</p>
      <p>
        It is worth mentioning that fuzzing has some limitations when it comes to practical
use and have not gained wide popularity for automated vulnerability testing yet.
However, considering the fact big companies, such as Google and Microsoft are using
fuzzing as a part of their methodology and vigorously work on its development, it can
be safely said that fuzzing has quite strong potential [
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18">29-32</xref>
        ].
      </p>
      <p>
        The most promising direction of future development of automated vulnerability
search methods is fuzzing intellectualization [
        <xref ref-type="bibr" rid="ref8">18-22</xref>
        ]. This is about using deep
learning methods to improve computational procedures for automated vulnerability search.
It is believed that such approach can significantly improve the process of selecting
input data, which will cause failure or errors in the target application.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Intellectual Fuzzing Algorithm</title>
      <p>
        Fuzzing is a method of software and security vulnerabilities testing which is
conducted by making multiple tests using mutated input data [21]. Repeated testing is
performed with random mutation, and usually testing time is far from optimal. This
article considers the problem of intellectual fuzzing and tries to find a solution [
        <xref ref-type="bibr" rid="ref8">22</xref>
        ].
The main goal is to develop a technology that can be guided and will make decisions
based on the experience it gained during testing. The solution to this question lies in
machine learning and reinforcement learning based on the deep Q-learning algorithm
[
        <xref ref-type="bibr" rid="ref19">33</xref>
        ]. It uses maximum possible rewards, which are defined during development
process by analyzing program source data and available rewards. This allows to apply
optimal input data mutations. Thus, agent gets an opportunity to learn to formulate an
optimal action policy for obtaining maximum reward. In this paper, we propose an
algorithm and a computer model of the in-depth training as well as research of
automated vulnerabilities testing effectiveness in comparison with the random mutation
test. During testing, the "black box" method is used. It means that the available
information represents only results of the program's work and the input data that it needs to
perform [21].
      </p>
      <p>
        During research, we realized there is a serious problem with randomized fuzzing: if
it works with randomly generated input data, the time will not be optimal, since the
process is performed blindfold. There may be a lot of testing rounds resulting in huge
amounts of mutations that do not provide any progress. The process of fuzzing is an
execution of a task cycle in certain defined program, where input is a sequence that
was changed by some mutation. The ideal solution to solve such problem is
machinelearning technology called reinforcement learning. The best example of using this
algorithm is the AlphaGO developed by Google DeepMind in 2015. It becomes the
world's first program to win the game of "Go" with a top-ranked professional Lee
Sedol [
        <xref ref-type="bibr" rid="ref20">34</xref>
        ].
      </p>
      <p>As a combination of fuzzing and reinforcement training, a system capable of
changing the rules for selecting specific mutation was created. It sends mutated data
to input and, depending on the program’s source data, generates a reward in order to
rely on its own experience and select optimal mutations for particular case upon
further testing. Thus, the amount of mutations does not contribute to the testing process
significantly reduces. This makes testing process faster. Schematic diagram of the
developed system is shown in Fig. 1. Testing process begins by defining the original
non-mutated input data. Its format depends on fuzzing kind. Packages are submitted
to the program's input channel and the response of the program is determined using
special debugging software. From obtained data (this may be the program execution
time, code coverage, code completion, etc.) system’s State is formed. It will be
preprocessed and presented to the Deep Q-learning model’s input. The system then
decides what Action should be taken next.</p>
      <p>
        At the same time, depending on the selected action and the obtained program state,
system forms the Reward for the algorithm. Using this reward, algorithm understands
assigned task and determines optimal behavior for its implementation. In addition,
algorithm remembers which actions brought it to the maximum reward (finding a
mistake or a program failure, etc.) and, in the following testing rounds, decides what
action should be taken based on its already gained experience. To calculate the next
step, the previous inputs are mutated according to the action that was selected.
Program input receives new mutated data. This procedure is repeated until the algorithm
reaches its goal. Developed model uses Markov decision-making process – deep
Qlearning [
        <xref ref-type="bibr" rid="ref21">35</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>Reinforcement Learning</title>
      <p>
        This section provides necessary data about the algorithm of reinforcement training.
Reinforcement learning is a computational approach to understanding and automating
targeted learning and decision making. It stands out among other machine learning
algorithms by the fact that agent learns directly by interacting with the environment
without referring to examples [
        <xref ref-type="bibr" rid="ref21">35</xref>
        ]. This algorithm is primarily aimed to solve
problems that arise during interaction with the environment to achieve long-term action. It
uses formal structure of Markov decision-making process [
        <xref ref-type="bibr" rid="ref21">35</xref>
        ], defining the
interaction between agent and environment in terms of states, actions and rewards. These
features include understanding of causes and effects, as well as presence of clear
goals. The notion of value and function of value is the main features of reinforcement
training methods.
      </p>
      <p>As noted earlier, the interaction between agent and environment can be described
using Markov decision-making process M  (S, A, P) , where S – a set of system’s
states, A – action’s set, P – transition probabilities set. For each state-action
pair (s, a)  S  A , P is a set of probabilities P(s ' s, a) , where s′ corresponds to the
next system’s state. Agent considers possible system states for the selected action,
where each transition has its own reward r(s, a) , and studies the optimal behavior for
maximizing the reward.</p>
      <p>During the learning process, the main goal is to maximize the finite amount of
rewards:</p>
      <p>
R   t rt1 ,</p>
      <p>t0
where   (0,1) – discount rate, which determines the remuneration priority over time.
Action at at state st is determined by the policy of action at (st ) . Policy 
attaches considered possible states to action, which in turn determines agent’s behavior.
Expected cumulative reward for the policy-maker  is defined as:</p>
      <p>  
Q  s, a  E  t rt1  s0  s, a0  a .</p>
      <p>
         t0 
The problem of finding the optimal value Q (s, a) can be reduced to the procedure of
function approximation. To achieve this Q (s, a) needs to be updated after each
iteration of receiving the award [
        <xref ref-type="bibr" rid="ref22">36</xref>
        ]. It is defined as
      </p>
      <p>Q(st , at )  Q(st , at )   ,
where  – learning rate. The entire procedure can be stated in the following
sequence: agent gets the status st , takes action</p>
      <p>at  arg max(Q(st , a)) ,
which defines the reward rt , and causes the system to go to the state st 1 .</p>
      <p>After receiving a reward rt and state st 1 , agent determines the best possible
effect</p>
      <p>at  1  arg max(Q(s, a)) .</p>
      <p>Then it updates the value Q(st , at ) . To approximate the function Q(st , at ) , deep
neural networks are used (it defines the name of deep Q-learning), which in turn aim
to minimize the loss function:</p>
      <p>L  (r   max(Q(st  1, at ))  Q(st , at )2 .
5</p>
    </sec>
    <sec id="sec-5">
      <title>Simulation Results</title>
      <p>To conduct an experiment simple fuzzer was used. Its main function is to implement
input data selection for automated software vulnerability search. Software launch
process was simulated and special logic tests were developed. The program could
return an error code when certain data is received to compare fuzzing with and
without artificial intelligence. Possible states of the system are presented in the form of
data generated after the completion of the program. This data is transmitted by neural
network, which consists of one input layer, two hidden layers with 50 neurons each
and activation functions (Rectified Linear Unit): f (x)  max(0, x) .</p>
      <p>The output of the neural network has 45 elements, representing the number of
possible mutations. Complete scheme of neural network for function
approximation Q(st , at ) is shown in Fig. 2.</p>
      <p>Let f   be noisy target function: a stochastic scalar function is differentiated
relatively to the parameter . The expected cost of this feature, E  f   relatives
to must be minimized. Using f1   ,, fT   the implementation of a stochastic
function in the next steps 1,,T is denoted. Stochasticity can be based on the
estimation of random subsets (mini-groups) of data points or noise of a function. At
gt   ft   the gradient is denoted – the vector of partial derivatives ft relatively
to θ, which is estimated by time t.</p>
      <p>The algorithm updates exponential moving average values of the gradient ( mt ) and
the square of the gradient ( vt ), where hyper parameters 1,  2  0,1 control the
exponential velocity of decomposition for these moving averages. The most moving
averages are the estimations of the first moment (mean value) and the second moment
(uncentered dispersion) of the gradient. However, these moving averages are
initialized as zero vectors, which lead to the estimation of moments moving in zero
direction, especially in the initial time steps and when expansion rates are small (for
example, the value  s close to 1). The good news is this bias initialization can be easily
prevented by getting bug fixes mbt and vbt .</p>
      <p>The algorithm itself has the following form:</p>
      <p>Required input data:
  : Learning speed
 1,  2 [0,1) : Exponential decay rates for moment estimates (standard settings

1  0.9,  2  0.999 )
f ( ) : Stochastic function with parameter 
  0 : Vector of initial parameters
 Algorithm:
 m0  0 (Initialize the first moment vector);
 v0  0 (Initialize the second moment vector);
 t  0 (Initialize the time);
 while  t not converged:
o t  t  1 ;
o g0   ft  t 1 (Take the gradient relative to the stochastic function
during t );
o mt 1 mt 1  1  1  gt (Update rejected first moment);
o vt   2 vt 1  1   2  g2t (Update the second estimation for a rejection);
o
m t 
b</p>
      <p>(Calculate the corrected bias estimation of the first moment);
(Calculate the corrected bias estimation of the second
mombt (Update parameters);
vbt
 return  t (Calculated parameters).</p>
      <p>Input mutations were selected based on the standard list: increasing and decreasing
line length, integer insertion, adding special characters (for example, "%s", which
may also cause errors). In sum, 45 functions were created and placed in a dictionary
for further use.</p>
      <p>
        The system receives an award if execution time was greater than the previous or if
there were errors occurred during testing. When an error occurs, the algorithm
finishes its work. While forming this type of award, there was a problem when algorithm
already found one error and started calling it repeatedly to get maximum reward. To
avoid this problem, two constants must be set:   (0,1) – discount rate and   (0,1)
– intelligence speed. The first constant was already being mentioned before. The
second one determines how the algorithm is capable in terms of discovering new
solutions. Random action will be chosen with probability ε, and the most profitable action
will be selected with probability 1 – ε. The hypothesis is a scientific assumption that
made to explain any phenomenon and requires testing on theoretical basis in order to
become a reliable scientific theory [
        <xref ref-type="bibr" rid="ref23">37</xref>
        ]. Statistical hypothesis is any assertion
(assumption) concerning the type or distribution parameters of a certain feature of the
objects being studied [
        <xref ref-type="bibr" rid="ref23">37</xref>
        ].
      </p>
      <p>The following sequence of actions was necessary to test the hypotheses:
1. Make calculations of certain statistics, the distribution of which is known.
2. Find the P-value for the calculated results.
3. Make appropriate conclusions depending on the significance criterion and P-value.</p>
      <p>
        A special test for identifying an error was developed. The hypothesis of the
experiment is Q-learning fuzzing works faster than randomized one. The discount rate is
set at 0.9, and the exploration speed is equal to 0.5. The latter parameter decreases
0.99 times after each era. The Student's t-test was used [
        <xref ref-type="bibr" rid="ref24">38</xref>
        ] to test the hypothesis.
      </p>
      <p>
        Student's t-test – the general name for the class of methods for statistical criteria
testing. It is based on comparison with the Student’s distribution. The most common
application of the criteria is related to checking the equality of mean values in two
samples [
        <xref ref-type="bibr" rid="ref24">38</xref>
        ]. To use this criterion, some conditions must be met: the initial data must
have normal distribution and dispersion must be equal.
      </p>
      <p>The first group contains the results of testing using developed algorithm, while the
second one presents the results of random mutations. Testing was performed in the
following sequence: generate 15 experiments, and record the amount of mutations
necessary to find an error at the end of each. The results of the experiments are shown
in Table 3.</p>
      <p>The results of Student’s t-test calculation: t  12.40 . The number of degrees of
freedom:</p>
      <p>Considering significance criteria</p>
      <p>v  2n  2  2 15  2  28
  0.01 and P  value  2.763 ,
while t  P  value , the hypothesis is valid.</p>
      <p>The result is statistically significant for a given criterion, if the probability of
accidental occurrence of the same or extreme result is less than the given level (0.01)
under the condition of loyalty of the null hypothesis.</p>
      <p>The testing time of developed algorithm is better than the time of random
mutations testing considering the fact the algorithm did not learn before. On average,
developed algorithm finds an error after 2076 mutations, whereas random testing needs
2832 mutations. Represented algorithm finds error 30% faster.</p>
      <p>This result proves the direction of research was chosen right. Particularly, it shows
that the main problem of fuzzing (large amount of mutations) can be solved using
artificial intelligence methods. Actually, if input data is changed directionally
depending on previous results, it can speed up mutation process and receive results (which
are finding the vulnerability in certain software product) after less amount of
mutations.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>Due to conducted research, one of promising automated software testing methods in
critically important systems was analyzed. Fuzzing bases on multiple input of
different (mutated) data to find parameters, which will cause failure or incorrect
functioning of software. Repeated testing is usually carried using randomized mutations and
the time of testing is very high in the most cases. This article researches the problem
of intellectual fuzzing – the technology, which uses previous testing experience to
make choices, related to mutation, and reduce testing time.</p>
      <p>Deep Reinforcement Learning algorithm was used to implement intellectual
fuzzing. With the use of simple fuzzing app, it becomes possible to prove that testing time
decreases by 30%. This result was received because fuzzer used previous experience
to adjust mutations.</p>
      <p>
        This research may continue in other spheres. For example, Intrusion Detection and
Prevention Systems [
        <xref ref-type="bibr" rid="ref25 ref26 ref27 ref28">39-42</xref>
        ] are also can be built using some elements of artificial
intelligence. Critically important information systems in different spheres, including
banking, industrial facilities management and Smart Grids are especially interesting
for further research [
        <xref ref-type="bibr" rid="ref29 ref30 ref31 ref32 ref33 ref34 ref35 ref36">43-50</xref>
        ].
Grids (SmartGridComm), Aalborg, 2018, pp. 1–6. (2018)
doi:10.1109/SmartGridComm.2018.8587420
8. Hariri, M.E., Youssef, T., Habib, H.F., Mohammed, O.: A Network-in-the-Loop
Framework to Analyze Cyber and Physical Information Flow in Smart Grids. In: 2018 IEEE
Innovative Smart Grid Technologies - Asia (ISGT Asia), Singapore, 2018, pp. 646–651
(2018)
9. Sokolov, S.S., Glebov, N.B., Antonova, E.N., Nyrkov, A.P.: The Safety Assessment of
Critical Infrastructure Control System. In: 2018 IEEE International Conference "Quality
Management, Transport and Information Security, Information Technologies"
(IT&amp;QM&amp;IS), St. Petersburg, 2018, pp. 154–157. (2018)
doi:10.1109/itmqis.2018.8524948
10. Krasnobayev, V., Kuznetsov, A., Koshman, S., Moroz, S.: Improved Method of
Determining the Alternative Set of Numbers in Residue Number System. In: Recent Developments
in Data Science and Intelligent Analysis of Information. ICDSIAI 2018. Advances in
Intelligent Systems and Computing, Springer, Cham, 2019, vol. 836, pp. 319–328. (2019)
doi:10.1007/978-3-319-97885-7_31
11. Cybersecurity for Smart Grid Systems (25 June 2018).
https://www.nist.gov/programsprojects/cybersecurity-smart-grid-systems
12. Andrushkevych, A., Gorbenko, Y., Kuznetsov, O., Oliynykov, R., Rodinko, M.: A
Prospective Lightweight Block Cipher for Green IT Engineering. In: Green IT Engineering:
Social, Business and Industrial Applications. Studies in Systems, Decision and Control,
Springer, Cham, 2019, vol, 171, pp. 95–112. (2019) doi:10.1007/978-3-030-00253-4_5
13. Ferguson, N., Schneier, B.: Practical Cryptography. John Wiley &amp; Sons (2003)
14. Kuznetsov, O., Potii, O., Perepelitsyn, A., Ivanenko, D., Poluyanenko, N.: Lightweight
Stream Ciphers for Green IT Engineering. In: Green IT Engineering: Social, Business and
Industrial Applications. Studies in Systems, Decision and Control, Springer, Cham, 2019,
vol. 171, pp. 113–137. (2019) doi: 10.1007/978-3-030-00253-4_6
15. Yinghua, H., Yanchun, M., Dongfang, Z.: The Multi-join Query Optimization for Smart
Grid Data. In: 2015 8th International Conference on Intelligent Computation Technology
and Automation (ICICTA), Nanchang, 2015, pp. 1004–1007. (2015)
doi:10.1109/ICICTA.2015.255
16. Du, Z.: Intelligence Computation and Evolutionary Computation. Springer-Verlag Berlin
      </p>
      <p>Heidelberg (2013)
17. Tong, C., Gao, Y., Tong, M., Li, J., Wang, Q., Chen, K.: Application of lightning detection
in Smart Grid dynamic protection. In: 2012 International Conference on Lightning
Protection (ICLP), Vienna, 2012, pp. 1–13. (2012) doi:10.1109/ICLP.2012.6344209
18. Choi, S.Y., Lee, H.Y.: Toward Automated Scanning for Code Injection Vulnerabilities in
HTML5-Based Mobile Apps. In: 2016 International Conference on Software Security and
Assurance (ICSSA), St. Polten, 2016, pp. 24–24. (2016) doi:10.1109/ICSSA.2016.11
19. Peng, H., Shoshitaishvili, Y., Payer, M.: T-Fuzz: Fuzzing by Program Transformation.</p>
      <p>In: 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2018, pp.
697–710. (2018) doi:10.1109/SP.2018.00056
20. Zhao, J., Pang, L.: Automated Fuzz Generators for High-Coverage Tests Based on
Program Branch Predications. In: 2018 IEEE Third International Conference on Data Science
in Cyberspace (DSC), Guangzhou, 2018, pp. 514–520. (2018)
doi:10.1109/DSC.2018.00082
21. Sutton, M., Greene, A., Amini, P.: Fuzzing: Brute Force Vulnerability Discovery. 1st ed.</p>
      <p>Boston, MA, USA: Addison-Wesley Professional (2007)
http://bxi.es/ReversingExploiting/Fuzzing%20Brute%20Force%20Vulnerability%20Discovery.pdf</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bitner</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zeithaml</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gremler</surname>
            ,
            <given-names>D.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maglio</surname>
            ,
            <given-names>P.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kieliszewski</surname>
            ,
            <given-names>C.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spohrer</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          :
          <article-title>Technology's Impact on the Gaps Model of Service Quality" in Handbook of Service Science - Service Science: Research and Innovation in the Service Economy</article-title>
          ,
          <string-name>
            <surname>US</surname>
          </string-name>
          , Boston, MA: Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Brocke</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thurnher</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Winkler</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Improving IT-Service Business Processes by Integrating Mobility: The Role of User Participation-Results from Five Case Studies</article-title>
          . In: International Conference on eLearning e
          <article-title>-Business Learning e-Business Enterprise Information Systems and e-Government (EEE</article-title>
          <year>2008</year>
          )
          <article-title>(</article-title>
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Budzik</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hammond</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Watson: Anticipating and Contextualizing Information Needs</article-title>
          .
          <source>In: Proc. of the 62 Annual Meeting of the American Society for Inform. Science</source>
          ,
          <year>1999</year>
          , vol.
          <volume>36</volume>
          , pp.
          <fpage>727</fpage>
          -
          <lpage>740</lpage>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. World Manufacturing Production
          <year>2012</year>
          . United Nations Industrial Development Organization,
          <year>2013</year>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <source>Structural Change in the World Economy. United Nations Industrial Development Organization</source>
          ,
          <year>2009</year>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bush</surname>
            ,
            <given-names>S.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goel</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Simard</surname>
          </string-name>
          , G.:
          <article-title>IEEE Vision for Smart Grid Communications: 2030 and Beyond</article-title>
          .
          <source>In: IEEE Vision for Smart Grid Communications: 2030 and Beyond</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>1492</fpage>
          -
          <lpage>1499</lpage>
          . (
          <year>2014</year>
          ) doi:10.1109/IEEESTD.
          <year>2013</year>
          .6690098
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Albarakati</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moussa</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Debbabi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Youssef</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agba</surname>
            ,
            <given-names>B.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kassouf</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>OpenStack-Based Evaluation Framework for Smart Grid Cyber Security</article-title>
          . In: 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          22.
          <string-name>
            <surname>Böttinger</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Godefroid</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          : Deep Reinforcement Fuzzing.
          <source>Submitted on 14 Jan</source>
          <year>2018</year>
          . (
          <year>2018</year>
          ) https://arxiv.org/abs/
          <year>1801</year>
          .04589
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          23.
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>B.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fredriksen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barton</surname>
            ,
            <given-names>B.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>An Empirical Study of the Reliability of UNIX Utilities (</article-title>
          <year>1989</year>
          ) ftp://ftp.cs.wisc.edu/paradyn/technical_papers/fuzz.pdf
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          24.
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>B.P.</given-names>
          </string-name>
          :
          <article-title>Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities</article-title>
          and
          <article-title>Services (</article-title>
          <year>1995</year>
          ) ftp://ftp.cs.wisc.edu/paradyn/technical_papers/fuzz-revisited.pdf
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          25.
          <string-name>
            <surname>Forrester</surname>
            ,
            <given-names>J.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>B.P.:</given-names>
          </string-name>
          <article-title>An Empirical Study of the Robustness of Windows NT Applications Using Random Testing</article-title>
          . Computer Sciences Department University of Wisconsin Madison, WI
          <volume>53706</volume>
          -
          <fpage>1685</fpage>
          (
          <year>2000</year>
          ) ftp://ftp.cs.wisc.edu/paradyn/technical_papers/fuzznt.pdf
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          26.
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>B.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cooksey</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moore</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>An Empirical Study of the Robustness of MacOS Applications Using Random Testing</article-title>
          . Computer Sciences Department University of Wisconsin Madison, WI
          <volume>53706</volume>
          -
          <fpage>1685</fpage>
          (
          <year>2006</year>
          ) ftp://ftp.cs.wisc.edu/paradyn/technical_papers/Fuzz-MacOS.pdf
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          27.
          <string-name>
            <surname>René</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <source>The Art of Fuzzing</source>
          (
          <year>2017</year>
          ) https://www.sec-consult.com/wpcontent/uploads/files/vulnlab/the_art_of_fuzzing_slides.pdf
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          28.
          <string-name>
            <surname>Guided</surname>
          </string-name>
          in
          <article-title>-process fuzzing of Chrome components</article-title>
          . Google Security Blog. https://security.googleblog.com/
          <year>2016</year>
          /08/guided-in
          <article-title>-process-fuzzing-of-chrome</article-title>
          .html
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          29.
          <article-title>American fuzzy lop</article-title>
          . http://lcamtuf.coredump.cx/afl/
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          30.
          <string-name>
            <surname>Böck</surname>
          </string-name>
          , H.:
          <article-title>How Heartbleed could've been found (</article-title>
          <year>2015</year>
          ) https://blog.hboeck.de/archives/868-
          <string-name>
            <surname>How-</surname>
          </string-name>
          Heartbleed-
          <article-title>couldve-been-found</article-title>
          .html
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          31.
          <string-name>
            <surname>Dallman</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pulikkathara</surname>
          </string-name>
          , G.:
          <article-title>MiniFuzz File Fuzzer Overview (</article-title>
          <year>2011</year>
          ) https://msdn.microsoft.com/en-us/biztalk/gg675011
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          32.
          <article-title>Peach Fuzzer Community Edition</article-title>
          . http://www.peach.tech/resources/peachcommunity/
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          33.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Deep Reinforcement Learning: An Overview</article-title>
          .
          <source>Submitted on 25 Jan</source>
          <year>2017</year>
          (
          <year>v1</year>
          ),
          <source>last revised 26 Nov</source>
          <year>2018</year>
          (this version,
          <source>v6)</source>
          (
          <year>2018</year>
          ) https://arxiv.org/abs/1701.07274
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>34. AlphaGo Games. https://deepmind.com/research/alphago/match-archive/alphago-gamesenglish/</mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          35.
          <string-name>
            <surname>Sutton</surname>
            ,
            <given-names>R.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barto</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          :
          <article-title>Reinforcement learning: An introduction</article-title>
          . MIT press Cambridg (
          <year>1998</year>
          ) http://incompleteideas.net/book/bookdraft2017nov5.pdf
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          36.
          <string-name>
            <surname>Kingma</surname>
            ,
            <given-names>D.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ba</surname>
          </string-name>
          , J.:
          <article-title>Adam: A Method for Stochastic Optimization”</article-title>
          .
          <source>Submitted on 22 Dec</source>
          <year>2014</year>
          (
          <year>v1</year>
          ),
          <source>last revised 30 Jan</source>
          <year>2017</year>
          (this version,
          <source>v9)</source>
          (
          <year>2017</year>
          ) https://arxiv.org/abs/1412.6980
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          37.
          <article-title>Statistical hypotheses and their verification (in Ukrainian)</article-title>
          . http://stat.org.ua/statclasses/hypotheses-testing/
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          38.
          <article-title>t-criterion for Student (in Ukrainian)</article-title>
          . http://fpo.bsmu.edu.ua/static/t-kryteriy-styudenta
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          39.
          <string-name>
            <surname>Muller</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Risk Monitoring and Intrusion Detection for Industrial Control Systems</article-title>
          . Docteur de l'Université du Luxembourg en Informatique, University of Luxembourg, Luxembourg (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          40.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smirnov</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Danilenko</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berezovsky</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>The statistical analysis of a network traffic for the intrusion detection and prevention systems</article-title>
          .
          <source>Telecommunications and Radio Engineering</source>
          ,
          <year>2015</year>
          , vol.
          <volume>74</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>61</fpage>
          -
          <lpage>78</lpage>
          . (
          <year>2015</year>
          ) doi: 10.1615/TelecomRadEng.v74.
          <year>i1</year>
          .
          <fpage>60</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          41.
          <string-name>
            <surname>Jahan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Habiba</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>An analysis of smart grid communication infrastructure &amp; cyber security in smart grid</article-title>
          .
          <source>In: 2015 International Conference on Advances in Electrical Engineering (ICAEE)</source>
          , Dhaka,
          <year>2015</year>
          , pp.
          <fpage>190</fpage>
          -
          <lpage>193</lpage>
          . (
          <year>2015</year>
          ) doi:10.1109/ICAEE.
          <year>2015</year>
          .7506828
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          42.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , Zhang, T.:
          <article-title>Smart grid information security - a research on standards</article-title>
          .
          <source>In: 2011 International Conference on Advanced Power System Automation and Protection</source>
          , Beijing,
          <year>2011</year>
          , pp.
          <fpage>1188</fpage>
          -
          <lpage>1194</lpage>
          . (
          <year>2011</year>
          ) doi:10.1109/APAP.
          <year>2011</year>
          .6180558
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          43.
          <string-name>
            <surname>Rassomakhin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shlokin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Belozertsev</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serhiienko</surname>
          </string-name>
          , R.:
          <article-title>Mathematical Model for the Probabilistic Minutia Distribution in Biometric Fingerprint Images</article-title>
          .
          <source>In: 2018 IEEE Second International Conference on Data Stream Mining &amp; Processing (DSMP)</source>
          , Lviv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>514</fpage>
          -
          <lpage>518</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/DSMP.
          <year>2018</year>
          .8478496
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          44.
          <string-name>
            <surname>Borkar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Donode</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumari</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS)</article-title>
          .
          <source>In: 2017 International Conference on Inventive Computing and Informatics (ICICI)</source>
          , Coimbatore,
          <year>2017</year>
          , pp.
          <fpage>949</fpage>
          -
          <lpage>953</lpage>
          . (
          <year>2017</year>
          ) doi:10.1109/ICICI.
          <year>2017</year>
          .8365277
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          45.
          <string-name>
            <surname>Moskovchenko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pastukhov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prokopenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kropyvnytskyi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Heuristic Methods of Hill Climbing of Cryptographic Boolean Functions</article-title>
          . In: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2018</year>
          .8632017
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          46.
          <string-name>
            <surname>Lei</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Butler-Purry</surname>
            ,
            <given-names>K.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Security and Reliability Perspectives in Cyber-Physical Smart Grids</article-title>
          . In: 2018 IEEE
          <string-name>
            <given-names>Innovative</given-names>
            <surname>Smart Grid Technologies - Asia (ISGT Asia)</surname>
          </string-name>
          , Singapore,
          <year>2018</year>
          , pp.
          <fpage>42</fpage>
          -
          <lpage>47</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/ISGT-Asia.
          <year>2018</year>
          .8467794
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          47.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prokopovych-Tkachenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kurinniy</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shoiko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Periodic Properties of Cryptographically Strong Pseudorandom Sequences</article-title>
          . In: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , Kharkiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>129</fpage>
          -
          <lpage>134</lpage>
          . (
          <year>2018</year>
          ) doi:10.1109/INFOCOMMST.
          <year>2018</year>
          .8632021
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          48.
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Conceptual fundamentals of a theory of mathematical interpretation</article-title>
          .
          <source>Int. J. Computing Science and Mathematics</source>
          ,
          <year>2015</year>
          , vol.
          <volume>6</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>107</fpage>
          -
          <lpage>121</lpage>
          . (
          <year>2015</year>
          ) doi:10.1504/IJCSM.
          <year>2015</year>
          .069459
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          49.
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Indicative-geometric method for estimation of any business entity</article-title>
          .
          <source>Int. J. Data Analysis Techniques and Strategies</source>
          ,
          <year>2016</year>
          , vol.
          <volume>8</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>87</fpage>
          -
          <lpage>107</lpage>
          . (
          <year>2016</year>
          ) doi: 10.1504/IJDATS.
          <year>2016</year>
          .077486
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          50.
          <string-name>
            <surname>Kovtun</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kavun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zyma</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Co-Z Divisor Addition</surname>
          </string-name>
          <article-title>Formulae in Homogeneous Representation in Jacobian of Genus 2 Hyperelliptic Curves over Binary Fields</article-title>
          .
          <source>International Journal Biomedical Soft Computing and Human Sciences</source>
          ,
          <year>2012</year>
          , vol.
          <volume>17</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>37</fpage>
          -
          <lpage>43</lpage>
          . (
          <year>2012</year>
          ) doi:10.24466/ijbschs.17.2_
          <fpage>37</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>