<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Automated Software Vulnerability Testing Using In-Depth Training Methods</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<affiliation key="aff0">
								<orgName type="department">V. N</orgName>
								<orgName type="institution">Karazin Kharkiv National University</orgName>
								<address>
									<addrLine>Svobody sq., 4</addrLine>
									<postCode>61022</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">Sumy State University</orgName>
								<address>
									<addrLine>Rymskogo-Korsakova st., 2</addrLine>
									<postCode>40007</postCode>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Automated Software Vulnerability Testing Using In-Depth Training Methods</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">8027A1444C1A6112185DD579B4C20F85</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T08:30+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Fuzzing</term>
					<term>Testing</term>
					<term>Reinforcement Learning</term>
					<term>Q-Learning</term>
					<term>Software Security</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article provides a view on modern technologies, which are used for automatic software vulnerability testing in critically important systems. Features of fuzzing realization (which is based on making many inputs with different mutated data) are also studied. As a result, testing algorithm picks input data that is more likely to cause a fail or incorrect work of software product. Deep learning algorithms are used to decrease the computational complexity of testing process. The use of simple fuzzer and Deep Reinforcement Learning algorithm shows that the amount of mutations necessary to find vulnerabilities decreases by 30%.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The development of modern computer technology leads to the emergence of new high-quality information services and their implementation in all spheres of human activity <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref>. The development of the IT-industry has led to the construction of global computer networks, extensive data warehouses, automated control systems, including critical infrastructures, Smart Grid and much more <ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref>.</p><p>In the age of the Internet and global implementation of information technologies, information security is more important for critical infrastructures <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10]</ref>. Complex solution for problems related to informational security is connected with solving different objectives in cryptography <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref>, computations optimization, technical and physical security as well as many others <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref>.</p><p>This paper focuses on the problem of automated software vulnerability scanning <ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref>. As practice shows, computer programs are the most exposed fragment of During experimental research of automated vulnerability search effectiveness MiniFuzz was used. Fuzzing process was conducted for several common desktop applications, including Google Chrome; Notepad++; Winamp; Microsoft Paint.</p><p>For Google Chrome testing several dozens of different html-files were selected. Aggressiveness (how much of input data is mutated) was alternately set to 5%, 15%, 25%, 35%. Testing results for this case are shown in Table <ref type="table">1</ref>. As can be seen from the table, fuzzing testing can help in discovering "File Not Found" type errors. Apparently, higher aggressiveness leads to more errors of this type.</p><p>Table <ref type="table">1</ref>. Expected value of "File Not Found" error and confidence interval (for significance level α = 0,01 sample size N = 1000)</p><p>Aggressiveness Level Error 5% 15% 25% 35% "File Not Found" 0,239±8,2310 -4 0,269±2,610 -4 0,295±3,4910 -4 0,320±8,2810 -4   After several hours of fuzzing for Notepad++ no errors occurred even with 100% aggressiveness. This shows high level of stability and security of this application. Testing of Winamp led to similar results.</p><p>To test Microsoft Paint images of different formats and sizes were selected. Testing results are shown in Table <ref type="table" target="#tab_0">2</ref>. As it can be seen from the results, selective testing with fuzzing revealed errors "File Not Found" and "Wrong Format". Frequency of these are almost similar and increase with higher aggressiveness. 0,13±2,610 -4 0,15±2,5810 -4 0,18±2,6410 -4 0,22±1,5810 -4 "Wrong Format" 0,09±2,9610 -4 0,16±3,7710 -4 0,2±3,5810 -4 0,23±4,5710 -4   Conducted tests show that the majority of common applications are secured and cannot be crashed using primitive fuzzing. In the case of Google Chrome, for example, it is not a surprise, because software engineers and testing professionals at Google use much more complex fuzzing during the development cycle of their products <ref type="bibr" target="#b27">[28]</ref>. The same goes for Microsoft.</p><p>Thus, the analysis of different fuzzers in the area of automated testing shows that this approach to software vulnerability search can vary depending on the goal, tester's skills, data format and other factors. Some applications have privilege separation system, which depends on user level. Using fuzzer as a tool for automated vulnerability search, it is possible to find errors in software products, which let attacker gain full or partial control over the system. Some low-lever errors are very similar to each other so it is possible to use the same logic to find vulnerabilities in more applications.</p><p>Relying on conducted experimental research for selective testing it can be said that fuzzing is quite promising method of automated vulnerabilities search. We were able to find errors even in reliable and tested applications, like Google Chrome and Microsoft Paint, as we managed to discover random input data, which would cause errors. However, these are not critical for application functioning and/or operating system, their handling is correct that, apparently, is stipulated behavior for such kind of corrupted input data.</p><p>It is worth mentioning that fuzzing has some limitations when it comes to practical use and have not gained wide popularity for automated vulnerability testing yet. However, considering the fact big companies, such as Google and Microsoft are using fuzzing as a part of their methodology and vigorously work on its development, it can be safely said that fuzzing has quite strong potential <ref type="bibr" target="#b28">[29]</ref><ref type="bibr" target="#b29">[30]</ref><ref type="bibr" target="#b30">[31]</ref><ref type="bibr" target="#b31">[32]</ref>.</p><p>The most promising direction of future development of automated vulnerability search methods is fuzzing intellectualization <ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref>. This is about using deep learning methods to improve computational procedures for automated vulnerability search. It is believed that such approach can significantly improve the process of selecting input data, which will cause failure or errors in the target application.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Intellectual Fuzzing Algorithm</head><p>Fuzzing is a method of software and security vulnerabilities testing which is conducted by making multiple tests using mutated input data <ref type="bibr" target="#b20">[21]</ref>. Repeated testing is performed with random mutation, and usually testing time is far from optimal. This article considers the problem of intellectual fuzzing and tries to find a solution <ref type="bibr" target="#b21">[22]</ref>.</p><p>The main goal is to develop a technology that can be guided and will make decisions based on the experience it gained during testing. The solution to this question lies in machine learning and reinforcement learning based on the deep Q-learning algorithm <ref type="bibr" target="#b32">[33]</ref>. It uses maximum possible rewards, which are defined during development process by analyzing program source data and available rewards. This allows to apply optimal input data mutations. Thus, agent gets an opportunity to learn to formulate an optimal action policy for obtaining maximum reward. In this paper, we propose an algorithm and a computer model of the in-depth training as well as research of automated vulnerabilities testing effectiveness in comparison with the random mutation test. During testing, the "black box" method is used. It means that the available information represents only results of the program's work and the input data that it needs to perform <ref type="bibr" target="#b20">[21]</ref>.</p><p>During research, we realized there is a serious problem with randomized fuzzing: if it works with randomly generated input data, the time will not be optimal, since the process is performed blindfold. There may be a lot of testing rounds resulting in huge amounts of mutations that do not provide any progress. The process of fuzzing is an execution of a task cycle in certain defined program, where input is a sequence that was changed by some mutation. The ideal solution to solve such problem is machine-learning technology called reinforcement learning. The best example of using this algorithm is the AlphaGO developed by Google DeepMind in 2015. It becomes the world's first program to win the game of "Go" with a top-ranked professional Lee Sedol <ref type="bibr" target="#b33">[34]</ref>.</p><p>As a combination of fuzzing and reinforcement training, a system capable of changing the rules for selecting specific mutation was created. It sends mutated data to input and, depending on the program's source data, generates a reward in order to rely on its own experience and select optimal mutations for particular case upon further testing. Thus, the amount of mutations does not contribute to the testing process significantly reduces. This makes testing process faster. Schematic diagram of the developed system is shown in Fig. <ref type="figure">1</ref>. Testing process begins by defining the original non-mutated input data. Its format depends on fuzzing kind. Packages are submitted to the program's input channel and the response of the program is determined using special debugging software. From obtained data (this may be the program execution time, code coverage, code completion, etc.) system's State is formed. It will be preprocessed and presented to the Deep Q-learning model's input. The system then decides what Action should be taken next.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 1. Simplified diagram of the intellectual fuzzing algorithm</head><p>At the same time, depending on the selected action and the obtained program state, system forms the Reward for the algorithm. Using this reward, algorithm understands assigned task and determines optimal behavior for its implementation. In addition, algorithm remembers which actions brought it to the maximum reward (finding a mistake or a program failure, etc.) and, in the following testing rounds, decides what action should be taken based on its already gained experience. To calculate the next step, the previous inputs are mutated according to the action that was selected. Program input receives new mutated data. This procedure is repeated until the algorithm reaches its goal. Developed model uses Markov decision-making process -deep Qlearning <ref type="bibr" target="#b34">[35]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Reinforcement Learning</head><p>This section provides necessary data about the algorithm of reinforcement training. Reinforcement learning is a computational approach to understanding and automating targeted learning and decision making. It stands out among other machine learning algorithms by the fact that agent learns directly by interacting with the environment without referring to examples <ref type="bibr" target="#b34">[35]</ref>. This algorithm is primarily aimed to solve problems that arise during interaction with the environment to achieve long-term action. It uses formal structure of Markov decision-making process <ref type="bibr" target="#b34">[35]</ref>, defining the interaction between agent and environment in terms of states, actions and rewards. These features include understanding of causes and effects, as well as presence of clear goals. The notion of value and function of value is the main features of reinforcement training methods.</p><p>As noted earlier, the interaction between agent and environment can be described using Markov decision-making process ( , , ) M S A P </p><p>, where S -a set of system's states, A -action's set, P -transition probabilities set. For each state-action pair ( , ) s a S A   , P is a set of probabilities ( ' , ) P s s a  , where s′ corresponds to the next system's state. Agent considers possible system states for the selected action, where each transition has its own reward ( , ) r s a , and studies the optimal behavior for maximizing the reward.</p><p>During the learning process, the main goal is to maximize the finite amount of rewards:</p><formula xml:id="formula_0">1 0 t t t R r      </formula><p>, where (0,1)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head> </head><p>-discount rate, which determines the remuneration priority over time.</p><p>Action t a at state t s is determined by the policy of action ( ) t t a s   . Policy  attaches considered possible states to action, which in turn determines agent's behavior.</p><p>Expected cumulative reward for the policy-maker  is defined as:</p><formula xml:id="formula_1">  1 0 0 0 , , t t t Q s a E r s s a a                 .</formula><p>The problem of finding the optimal value ( , ) Q s a  can be reduced to the procedure of function approximation. To achieve this ( , ) Q s a  needs to be updated after each iteration of receiving the award <ref type="bibr" target="#b35">[36]</ref>. It is defined as </p><formula xml:id="formula_2">( , )<label>( ,</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Simulation Results</head><p>To conduct an experiment simple fuzzer was used. Its main function is to implement input data selection for automated software vulnerability search. Software launch process was simulated and special logic tests were developed. The program could return an error code when certain data is received to compare fuzzing with and without artificial intelligence. Possible states of the system are presented in the form of data generated after the completion of the program. This data is transmitted by neural network, which consists of one input layer, two hidden layers with 50 neurons each and activation functions (Rectified Linear Unit): ( ) max(0, ) f x x  . The output of the neural network has 45 elements, representing the number of possible mutations. Complete scheme of neural network for function approximation ( , )</p><formula xml:id="formula_3">t t</formula><p>Q s a is shown in Fig. <ref type="figure" target="#fig_0">2</ref>.  the gradient is denoted -the vector of partial derivatives t f relatively to θ, which is estimated by time t.</p><p>The algorithm updates exponential moving average values of the gradient ( t m ) and the square of the gradient ( t v ), where hyper parameters</p><formula xml:id="formula_4">  1 2 , 0,1   </formula><p>control the exponential velocity of decomposition for these moving averages. The most moving averages are the estimations of the first moment (mean value) and the second moment (uncentered dispersion) of the gradient. However, these moving averages are initialized as zero vectors, which lead to the estimation of moments moving in zero direction, especially in the initial time steps and when expansion rates are small (for example, the value s  close to 1). The good news is this bias initialization can be easily prevented by getting bug fixes bt m and bt v . The algorithm itself has the following form: Required input data:</p><formula xml:id="formula_5">  : Learning speed  1 2 , [<label>0,1)</label></formula><p>   : Exponential decay rates for moment estimates (standard settings </p><formula xml:id="formula_6">o 1 t t   ; o   0 1 t t g f  </formula><p>   (Take the gradient relative to the stochastic function dur- Input mutations were selected based on the standard list: increasing and decreasing line length, integer insertion, adding special characters (for example, "%s", which may also cause errors). In sum, 45 functions were created and placed in a dictionary for further use.</p><formula xml:id="formula_7">ing t ); o   1 1 1 1 t t t m m g       (Update rejected first moment); o   2 2 2 1 1 t t t v v g       (Update</formula><p>The system receives an award if execution time was greater than the previous or if there were errors occurred during testing. When an error occurs, the algorithm finishes its work. While forming this type of award, there was a problem when algorithm already found one error and started calling it repeatedly to get maximum reward. To avoid this problem, two constants must be set: (</p><p>-discount rate and (0,1)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head> </head><p>-intelligence speed. The first constant was already being mentioned before. The second one determines how the algorithm is capable in terms of discovering new solutions. Random action will be chosen with probability ε, and the most profitable action will be selected with probability 1 -ε. The hypothesis is a scientific assumption that made to explain any phenomenon and requires testing on theoretical basis in order to become a reliable scientific theory <ref type="bibr" target="#b36">[37]</ref>. Statistical hypothesis is any assertion (assumption) concerning the type or distribution parameters of a certain feature of the objects being studied <ref type="bibr" target="#b36">[37]</ref>.</p><p>The following sequence of actions was necessary to test the hypotheses:</p><p>1. Make calculations of certain statistics, the distribution of which is known.</p><p>2. Find the P-value for the calculated results.</p><p>3. Make appropriate conclusions depending on the significance criterion and P-value.</p><p>A special test for identifying an error was developed. The hypothesis of the experiment is Q-learning fuzzing works faster than randomized one. The discount rate is set at 0.9, and the exploration speed is equal to 0.5. The latter parameter decreases 0.99 times after each era. The Student's t-test was used <ref type="bibr" target="#b37">[38]</ref> to test the hypothesis.</p><p>Student's t-test -the general name for the class of methods for statistical criteria testing. It is based on comparison with the Student's distribution. The most common application of the criteria is related to checking the equality of mean values in two samples <ref type="bibr" target="#b37">[38]</ref>. To use this criterion, some conditions must be met: the initial data must have normal distribution and dispersion must be equal.</p><p>The first group contains the results of testing using developed algorithm, while the second one presents the results of random mutations. Testing was performed in the following sequence: generate 15 experiments, and record the amount of mutations necessary to find an error at the end of each. The results of the experiments are shown in Table <ref type="table" target="#tab_4">3</ref> The result is statistically significant for a given criterion, if the probability of accidental occurrence of the same or extreme result is less than the given level (0.01) under the condition of loyalty of the null hypothesis. The testing time of developed algorithm is better than the time of random mutations testing considering the fact the algorithm did not learn before. On average, developed algorithm finds an error after 2076 mutations, whereas random testing needs 2832 mutations. Represented algorithm finds error 30% faster.</p><p>This result proves the direction of research was chosen right. Particularly, it shows that the main problem of fuzzing (large amount of mutations) can be solved using artificial intelligence methods. Actually, if input data is changed directionally depending on previous results, it can speed up mutation process and receive results (which are finding the vulnerability in certain software product) after less amount of mutations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusions</head><p>Due to conducted research, one of promising automated software testing methods in critically important systems was analyzed. Fuzzing bases on multiple input of different (mutated) data to find parameters, which will cause failure or incorrect functioning of software. Repeated testing is usually carried using randomized mutations and the time of testing is very high in the most cases. This article researches the problem of intellectual fuzzing -the technology, which uses previous testing experience to make choices, related to mutation, and reduce testing time.</p><p>Deep Reinforcement Learning algorithm was used to implement intellectual fuzzing. With the use of simple fuzzing app, it becomes possible to prove that testing time decreases by 30%. This result was received because fuzzer used previous experience to adjust mutations.</p><p>This research may continue in other spheres. For example, Intrusion Detection and Prevention Systems <ref type="bibr" target="#b38">[39]</ref><ref type="bibr" target="#b39">[40]</ref><ref type="bibr" target="#b40">[41]</ref><ref type="bibr" target="#b41">[42]</ref> are also can be built using some elements of artificial intelligence. Critically important information systems in different spheres, including banking, industrial facilities management and Smart Grids are especially interesting for further research <ref type="bibr" target="#b42">[43]</ref><ref type="bibr" target="#b43">[44]</ref><ref type="bibr" target="#b44">[45]</ref><ref type="bibr" target="#b45">[46]</ref><ref type="bibr" target="#b46">[47]</ref><ref type="bibr" target="#b47">[48]</ref><ref type="bibr" target="#b48">[49]</ref><ref type="bibr" target="#b49">[50]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Neural network scheme Network training is performed using Adam optimization algorithm [36]</figDesc><graphic coords="7,179.88,478.32,246.84,147.72" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>Initialize the first moment vector);  0 0 v  (Initialize the second moment vector);  0 t  (Initialize the time);  while t  not converged:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 2 .</head><label>2</label><figDesc>Expected value for errors and confidence interval (for significance level α = 0,01 sample size N = 1000)</figDesc><table><row><cell>Error</cell><cell>5%</cell><cell>Aggressiveness Level 15% 25%</cell><cell>35%</cell></row><row><cell>"File Not</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Found"</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>)</figDesc><table><row><cell cols="9">which defines the reward t r , and causes the system to go to the state</cell><cell>1 s  . t</cell></row><row><cell cols="5">After receiving a reward t r and state</cell><cell cols="4">1 s  , agent determines the best possible ef-t</cell></row><row><cell>fect</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>t a</cell><cell cols="8">1 arg max( ( , )) Qsa  </cell><cell>.</cell></row><row><cell cols="9">Then it updates the value ( , ) t t Q s a . To approximate the function ( , ) t t Q s a , deep</cell></row><row><cell cols="9">neural networks are used (it defines the name of deep Q-learning), which in turn aim</cell></row><row><cell>to minimize the loss function:</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">( L r    </cell><cell cols="5">max( ( Qs t</cell><cell></cell><cell>1 , )) t a</cell><cell></cell><cell>( , ) t t Qs a</cell><cell>2</cell><cell>.</cell></row><row><cell cols="4">t Q s a t</cell><cell cols="2"></cell><cell cols="3">t Q s a t</cell><cell>  ,</cell></row><row><cell cols="9">where  -learning rate. The entire procedure can be stated in the following se-</cell></row><row><cell cols="8">quence: agent gets the status t s , takes action</cell></row><row><cell cols="2">t a</cell><cell></cell><cell cols="6">arg max( ( , )) t Qs a</cell><cell>,</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>the second estimation for a rejection);</figDesc><table><row><cell>o</cell><cell>t yb</cell><cell cols="2">1   y t </cell><cell>t</cell><cell cols="2">2</cell><cell>(Calculate the corrected bias estimation of the second mo-</cell></row><row><cell></cell><cell cols="3">ment);</cell><cell></cell><cell></cell></row><row><cell>o</cell><cell cols="6">1    t   t</cell><cell></cell><cell>t t mb vb</cell><cell>(Update parameters);</cell></row><row><cell cols="3">end while</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="7"> return t  (Calculated parameters).</cell></row><row><cell>o</cell><cell cols="2">b m t</cell><cell cols="3">1   m t </cell><cell>1 t</cell><cell>(Calculate the corrected bias estimation of the first moment);</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 3 .</head><label>3</label><figDesc>Experimental Results</figDesc><table><row><cell>№</cell><cell cols="2">Deep Q-learning model Random selection of muta-</cell></row><row><cell></cell><cell></cell><cell>tions</cell></row><row><cell>1</cell><cell>3671</cell><cell>3686</cell></row><row><cell>2</cell><cell>1191</cell><cell>1897</cell></row><row><cell>3</cell><cell>1879</cell><cell>3164</cell></row><row><cell>4</cell><cell>1640</cell><cell>3233</cell></row><row><cell>5</cell><cell>1966</cell><cell>10446</cell></row><row><cell>6</cell><cell>1585</cell><cell>5358</cell></row><row><cell>7</cell><cell>1135</cell><cell>1134</cell></row><row><cell>8</cell><cell>4877</cell><cell>752</cell></row><row><cell>9</cell><cell>2465</cell><cell>2157</cell></row><row><cell>10</cell><cell>3266</cell><cell>3684</cell></row><row><cell>11</cell><cell>1895</cell><cell>2026</cell></row><row><cell>12</cell><cell>2093</cell><cell>2993</cell></row><row><cell>13</cell><cell>1150</cell><cell>295</cell></row><row><cell>14</cell><cell>1181</cell><cell>3381</cell></row><row><cell>15</cell><cell>1153</cell><cell>358</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Technology&apos;s Impact on the Gaps Model of Service Quality</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Bitner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Zeithaml</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">D</forename><surname>Gremler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">P</forename><surname>Maglio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A</forename><surname>Kieliszewski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Spohrer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Service Science -Service Science: Research and Innovation in the Service Economy</title>
				<meeting><address><addrLine>US; Boston, MA</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Improving IT-Service Business Processes by Integrating Mobility: The Role of User Participation-Results from Five Case Studies</title>
		<author>
			<persName><forename type="first">J</forename><surname>Brocke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Thurnher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Winkler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on eLearning e-Business Learning e-Business Enterprise Information Systems and e-Government</title>
				<meeting><address><addrLine>EEE</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008. 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Watson: Anticipating and Contextualizing Information Needs</title>
		<author>
			<persName><forename type="first">J</forename><surname>Budzik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Hammond</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 62 Annual Meeting of the American Society for Inform. Science</title>
				<meeting>of the 62 Annual Meeting of the American Society for Inform. Science</meeting>
		<imprint>
			<date type="published" when="1999">1999. 1999</date>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="727" to="740" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m">World Manufacturing Production</title>
				<imprint>
			<publisher>United Nations Industrial Development Organization</publisher>
			<date type="published" when="2012">2012. 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m">Structural Change in the World Economy</title>
				<imprint>
			<publisher>United Nations Industrial Development Organization</publisher>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">IEEE Vision for Smart Grid Communications: 2030 and Beyond</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">F</forename><surname>Bush</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Goel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Simard</surname></persName>
		</author>
		<idno type="DOI">10.1109/IEEESTD.2013.6690098</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE Vision for Smart Grid Communications: 2030 and Beyond</title>
				<imprint>
			<date type="published" when="2014">2014. 2014</date>
			<biblScope unit="page" from="1492" to="1499" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Open-Stack-Based Evaluation Framework for Smart Grid Cyber Security</title>
		<author>
			<persName><forename type="first">A</forename><surname>Albarakati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Moussa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Debbabi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Youssef</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">L</forename><surname>Agba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kassouf</surname></persName>
		</author>
		<idno type="DOI">10.1109/SmartGridComm.2018.8587420</idno>
	</analytic>
	<monogr>
		<title level="m">2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)</title>
				<meeting><address><addrLine>Aalborg</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A Network-in-the-Loop Framework to Analyze Cyber and Physical Information Flow in Smart Grids</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">E</forename><surname>Hariri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Youssef</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">F</forename><surname>Habib</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mohammed</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Innovative Smart Grid Technologies -Asia (ISGT Asia)</title>
				<meeting><address><addrLine>Singapore</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018. 2018</date>
			<biblScope unit="page" from="646" to="651" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The Safety Assessment of Critical Infrastructure Control System</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">B</forename><surname>Glebov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">N</forename><surname>Antonova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Nyrkov</surname></persName>
		</author>
		<idno type="DOI">10.1109/itmqis.2018.8524948</idno>
	</analytic>
	<monogr>
		<title level="m">2018 IEEE International Conference &quot;Quality Management, Transport and Information Security, Information Technologies&quot; (IT&amp;QM&amp;IS)</title>
				<meeting><address><addrLine>St. Petersburg</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="154" to="157" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Improved Method of Determining the Alternative Set of Numbers in Residue Number System</title>
		<author>
			<persName><forename type="first">V</forename><surname>Krasnobayev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Koshman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Moroz</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-97885-7_31</idno>
	</analytic>
	<monogr>
		<title level="m">Recent Developments in Data Science and Intelligent Analysis of Information</title>
				<meeting><address><addrLine>ICDSIAI; Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018. 2019. 2019</date>
			<biblScope unit="volume">836</biblScope>
			<biblScope unit="page" from="319" to="328" />
		</imprint>
	</monogr>
	<note>Advances in Intelligent Systems and Computing</note>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<ptr target="https://www.nist.gov/programs-projects/cybersecurity-smart-grid-systems" />
		<title level="m">Cybersecurity for Smart Grid Systems</title>
				<imprint>
			<date type="published" when="2018-06-25">25 June 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A Prospective Lightweight Block Cipher for Green IT Engineering</title>
		<author>
			<persName><forename type="first">A</forename><surname>Andrushkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Oliynykov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rodinko</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-00253-4_5</idno>
	</analytic>
	<monogr>
		<title level="m">Green IT Engineering: Social, Business and Industrial Applications. Studies in Systems, Decision and Control</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="volume">171</biblScope>
			<biblScope unit="page" from="95" to="112" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Practical Cryptography</title>
		<author>
			<persName><forename type="first">N</forename><surname>Ferguson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Schneier</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>John Wiley &amp; Sons</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Lightweight Stream Ciphers for Green IT Engineering</title>
		<author>
			<persName><forename type="first">O</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Potii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Perepelitsyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ivanenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Poluyanenko</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-00253-4_6</idno>
	</analytic>
	<monogr>
		<title level="m">Green IT Engineering: Social, Business and Industrial Applications. Studies in Systems, Decision and Control</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="volume">171</biblScope>
			<biblScope unit="page" from="113" to="137" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The Multi-join Query Optimization for Smart Grid Data</title>
		<author>
			<persName><forename type="first">H</forename><surname>Yinghua</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yanchun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Dongfang</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICICTA.2015.255</idno>
	</analytic>
	<monogr>
		<title level="m">2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)</title>
				<meeting><address><addrLine>Nanchang</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="1004" to="1007" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><forename type="first">Z</forename><surname>Du</surname></persName>
		</author>
		<title level="m">Intelligence Computation and Evolutionary Computation</title>
				<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Application of lightning detection in Smart Grid dynamic protection</title>
		<author>
			<persName><forename type="first">C</forename><surname>Tong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Chen</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICLP.2012.6344209</idno>
	</analytic>
	<monogr>
		<title level="m">2012 International Conference on Lightning Protection (ICLP)</title>
				<meeting><address><addrLine>Vienna</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012">2012. 2012</date>
			<biblScope unit="page" from="1" to="13" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based Mobile Apps</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">Y</forename><surname>Choi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">Y</forename><surname>Lee</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICSSA.2016.11</idno>
	</analytic>
	<monogr>
		<title level="m">2016 International Conference on Software Security and Assurance (ICSSA)</title>
				<meeting><address><addrLine>St. Polten</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="24" to="24" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">T-Fuzz: Fuzzing by Program Transformation</title>
		<author>
			<persName><forename type="first">H</forename><surname>Peng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Shoshitaishvili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Payer</surname></persName>
		</author>
		<idno type="DOI">10.1109/SP.2018.00056</idno>
	</analytic>
	<monogr>
		<title level="m">2018 IEEE Symposium on Security and Privacy (SP)</title>
				<meeting><address><addrLine>San Francisco, CA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="697" to="710" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Automated Fuzz Generators for High-Coverage Tests Based on Program Branch Predications</title>
		<author>
			<persName><forename type="first">J</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pang</surname></persName>
		</author>
		<idno type="DOI">10.1109/DSC.2018.00082</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE Third International Conference on Data Science in Cyberspace (DSC)</title>
				<meeting><address><addrLine>Guangzhou</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018. 2018</date>
			<biblScope unit="page" from="514" to="520" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Fuzzing: Brute Force Vulnerability Discovery</title>
		<author>
			<persName><forename type="first">M</forename><surname>Sutton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Greene</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Amini</surname></persName>
		</author>
		<ptr target="http://bxi.es/Reversing-Exploiting/Fuzzing%20Brute%20Force%20Vulnerability%20Discovery.pdf" />
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Addison-Wesley Professional</publisher>
			<pubPlace>Boston, MA, USA</pubPlace>
		</imprint>
	</monogr>
	<note>1st ed</note>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Deep Reinforcement Fuzzing</title>
		<author>
			<persName><forename type="first">K</forename><surname>Böttinger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Godefroid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Singh</surname></persName>
		</author>
		<ptr target="https://arxiv.org/abs/1801.04589" />
		<imprint>
			<date type="published" when="2018-01-14">14 Jan 2018. 2018</date>
		</imprint>
	</monogr>
	<note>Submitted on</note>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">P</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Fredriksen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">S</forename><surname>Barton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Miller</surname></persName>
		</author>
		<ptr target="ftp://ftp.cs.wisc.edu/paradyn/technical_papers/fuzz.pdf" />
		<title level="m">An Empirical Study of the Reliability of UNIX Utilities</title>
				<imprint>
			<date type="published" when="1989">1989</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">P</forename><surname>Miller</surname></persName>
		</author>
		<ptr target="ftp://ftp.cs.wisc.edu/paradyn/technical_papers/fuzz-revisited.pdf" />
		<title level="m">Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services</title>
				<imprint>
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">An Empirical Study of the Robustness of Windows NT Applications Using Random Testing</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">E</forename><surname>Forrester</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">P</forename><surname>Miller</surname></persName>
		</author>
		<ptr target="ftp://ftp.cs.wisc.edu/paradyn/technical_papers/fuzz-nt.pdf" />
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="53706" to="51685" />
			<pubPlace>WI</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Computer Sciences Department University of Wisconsin Madison</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">An Empirical Study of the Robustness of MacOS Applications Using Random Testing</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">P</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Cooksey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Moore</surname></persName>
		</author>
		<ptr target="ftp://ftp.cs.wisc.edu/paradyn/technical_papers/Fuzz-MacOS.pdf" />
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="53706" to="51685" />
			<pubPlace>WI</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Computer Sciences Department University of Wisconsin Madison</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">The Art of Fuzzing</title>
		<author>
			<persName><forename type="first">F</forename><surname>René</surname></persName>
		</author>
		<ptr target="https://www.sec-consult.com/wp-content/uploads/files/vulnlab/the_art_of_fuzzing_slides.pdf" />
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<ptr target="https://security.googleblog.com/2016/08/guided-in-process-fuzzing-of-chrome.html" />
		<title level="m">Guided in-process fuzzing of Chrome components</title>
				<imprint/>
	</monogr>
	<note type="report_type">Google Security Blog</note>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<ptr target="http://lcamtuf.coredump.cx/afl/" />
		<title level="m">American fuzzy</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<title level="m" type="main">How Heartbleed could&apos;ve been found</title>
		<author>
			<persName><forename type="first">H</forename><surname>Böck</surname></persName>
		</author>
		<ptr target="https://blog.hboeck.de/archives/868-How-Heartbleed-couldve-been-found.html" />
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m" type="main">MiniFuzz File Fuzzer Overview</title>
		<author>
			<persName><forename type="first">J</forename><surname>Dallman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pulikkathara</surname></persName>
		</author>
		<ptr target="https://msdn.microsoft.com/en-us/biztalk/gg675011" />
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<ptr target="http://www.peach.tech/resources/peachcommunity/" />
		<title level="m">Peach Fuzzer Community Edition</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<title level="m" type="main">Deep Reinforcement Learning: An Overview</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Li</surname></persName>
		</author>
		<ptr target="https://arxiv.org/abs/1701.07274" />
		<imprint>
			<date type="published" when="2017-01-26">Jan 2017. 26 Nov 2018. 2018</date>
		</imprint>
	</monogr>
	<note>Submitted on 25. last revised. this version</note>
</biblStruct>

<biblStruct xml:id="b33">
	<monogr>
		<ptr target="https://deepmind.com/research/alphago/match-archive/alphago-games-english/" />
		<title level="m">AlphaGo Games</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<title level="m" type="main">Reinforcement learning: An introduction</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Sutton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Barto</surname></persName>
		</author>
		<ptr target="http://incompleteideas.net/book/bookdraft2017nov5.pdf" />
		<imprint>
			<date type="published" when="1998">1998</date>
			<publisher>MIT press Cambridg</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<monogr>
		<title level="m" type="main">Adam: A Method for Stochastic Optimization</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">P</forename><surname>Kingma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ba</surname></persName>
		</author>
		<ptr target="https://arxiv.org/abs/1412.6980" />
		<imprint>
			<date type="published" when="2014-12-30">Dec 2014. 30 Jan 2017. 2017</date>
		</imprint>
	</monogr>
	<note>Submitted on 22. last revised. this version, v9)</note>
</biblStruct>

<biblStruct xml:id="b36">
	<monogr>
		<title level="m">Statistical hypotheses and their verification</title>
				<imprint/>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<ptr target="http://fpo.bsmu.edu.ua/static/t-kryteriy-styudenta" />
		<title level="m">t-criterion for Student</title>
				<imprint/>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b38">
	<monogr>
		<title level="m" type="main">Risk Monitoring and Intrusion Detection for Industrial Control Systems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Muller</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
			<pubPlace>Luxembourg</pubPlace>
		</imprint>
		<respStmt>
			<orgName>University of Luxembourg</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Docteur de l&apos;Université du Luxembourg en Informatique</note>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">The statistical analysis of a network traffic for the intrusion detection and prevention systems</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Smirnov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Danilenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Berezovsky</surname></persName>
		</author>
		<idno type="DOI">10.1615/TelecomRadEng.v74.i1.60</idno>
	</analytic>
	<monogr>
		<title level="j">Telecommunications and Radio Engineering</title>
		<imprint>
			<biblScope unit="volume">74</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="61" to="78" />
			<date type="published" when="2015">2015. 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">An analysis of smart grid communication infrastructure &amp; cyber security in smart grid</title>
		<author>
			<persName><forename type="first">S</forename><surname>Jahan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Habiba</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICAEE.2015.7506828</idno>
	</analytic>
	<monogr>
		<title level="m">2015 International Conference on Advances in Electrical Engineering (ICAEE)</title>
				<meeting><address><addrLine>Dhaka</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="190" to="193" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Smart grid information security -a research on standards</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Zhang</surname></persName>
		</author>
		<idno type="DOI">10.1109/APAP.2011.6180558</idno>
	</analytic>
	<monogr>
		<title level="m">2011 International Conference on Advanced Power System Automation and Protection</title>
				<meeting><address><addrLine>Beijing</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011. 2011</date>
			<biblScope unit="page" from="1188" to="1194" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Mathematical Model for the Probabilistic Minutia Distribution in Biometric Fingerprint Images</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rassomakhin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Shlokin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Belozertsev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Serhiienko</surname></persName>
		</author>
		<idno type="DOI">10.1109/DSMP.2018.8478496</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE Second International Conference on Data Stream Mining &amp; Processing (DSMP)</title>
				<meeting><address><addrLine>Lviv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018. 2018</date>
			<biblScope unit="page" from="514" to="518" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS)</title>
		<author>
			<persName><forename type="first">A</forename><surname>Borkar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Donode</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kumari</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICICI.2017.8365277</idno>
	</analytic>
	<monogr>
		<title level="m">2017 International Conference on Inventive Computing and Informatics (ICICI)</title>
				<meeting><address><addrLine>Coimbatore</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="949" to="953" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">Heuristic Methods of Hill Climbing of Cryptographic Boolean Functions</title>
		<author>
			<persName><forename type="first">I</forename><surname>Moskovchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pastukhov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kuznetsova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Prokopenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kropyvnytskyi</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2018.8632017</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Scientific-Practical Conference Problems of Infocommunications</title>
				<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
	<note>Science and Technology (PIC S&amp;T)</note>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Security and Reliability Perspectives in Cyber-Physical Smart Grids</title>
		<author>
			<persName><forename type="first">H</forename><surname>Lei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">L</forename><surname>Butler-Purry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Singh</surname></persName>
		</author>
		<idno type="DOI">10.1109/ISGT-Asia.2018.8467794</idno>
	</analytic>
	<monogr>
		<title level="m">2018 IEEE Innovative Smart Grid Technologies -Asia (ISGT Asia)</title>
				<meeting><address><addrLine>Singapore</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="42" to="47" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Periodic Properties of Cryptographically Strong Pseudorandom Sequences</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kavun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Panchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Prokopovych-Tkachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Kurinniy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Shoiko</surname></persName>
		</author>
		<idno type="DOI">10.1109/INFOCOMMST.2018.8632021</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&amp;T)</title>
				<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="129" to="134" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Conceptual fundamentals of a theory of mathematical interpretation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kavun</surname></persName>
		</author>
		<idno type="DOI">10.1504/IJCSM.2015.069459</idno>
	</analytic>
	<monogr>
		<title level="j">Int. J. Computing Science and Mathematics</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="107" to="121" />
			<date type="published" when="2015">2015. 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">Indicative-geometric method for estimation of any business entity</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kavun</surname></persName>
		</author>
		<idno type="DOI">10.1504/IJDATS.2016.077486</idno>
	</analytic>
	<monogr>
		<title level="j">Int. J. Data Analysis Techniques and Strategies</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="87" to="107" />
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<analytic>
		<title level="a" type="main">Co-Z Divisor Addition Formulae in Homogeneous Representation in Jacobian of Genus 2 Hyperelliptic Curves over Binary Fields</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kovtun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kavun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Zyma</surname></persName>
		</author>
		<idno type="DOI">10.24466/ijbschs.17.2_37</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal Biomedical Soft Computing and Human Sciences</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="37" to="43" />
			<date type="published" when="2012">2012. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
