<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Invariants Classification Characteristics for Checking the Correctness of Computational Processes*</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Innopolis University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kazan</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Russia s.petrenko@rambler.ru</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>V.I. Vernadsky Crimean Federal University</institution>
          ,
          <addr-line>Yalta</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>Selecting the invariant classification characteristics of the program behavior of some secured infrastructure (in this task, into two classes: correct and incorrect execution) is identical to the isomorphism problem of the two systems under some mapping. I order to clarify the necessary and sufficient conditions for the system isomorphism, as well as to determine the isomorphism mapping qualitative and quantitative parameters, a similarity theory of the mathematical apparatus was developed. However, in the late 1980s, the results were applied in the field of modeling, applying the universal digital computers and then transferred to solve a much wider spectrum of problems, including cybersecurity and ensuring the required cyber resilience of the critical information infrastructure.</p>
      </abstract>
      <kwd-group>
        <kwd>inverse similarity theorem</kwd>
        <kwd>dynamic control of correctness of calculation programs</kwd>
        <kwd>the correctness of computing processes</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The most detailed provisions of the similarity theory were developed concerning the
processes, described by the homogeneous power polynomial systems [1, 3]. There are
three main theorems in the similarity theory: the direct, inverse, and π-theorem. The
similarity theorem, known as "π-theorem", allows identifying the functional
relationship between variable processes in relative form. The deductions form the direct
theorem and the “π-theorem” of similarity allowed formulating invariant informative
fea*</p>
      <p>Copyright 2019 for this paper by its authors. Use permitted under Creative Commons
License Attribution 4.0 International (CC BY 4.0).
tures for the correct behavior of some critical information infrastructure
software [2, 4, 5].
2</p>
      <p>Introducing a passport system for programs
Let us consider two processes of p1 and p2, which complete equations have the
following form:
q
i1 ui  0</p>
      <p>, u = 1, 2, …, r;
q
i1Фui  0 , u = 1, 2, …, r;
 u  n xu1
j1 j</p>
      <p>n
Фu   X u1</p>
      <p>j1 j
Where and ‒ homogeneous functions of their parameters.
The direct similarity theorem states that if the processes are homogeneously similar,
then the following system takes place:</p>
      <p>Expressions
u = 1,2, …, r; s = 1,2, …, (q-1).</p>
      <p> ui  Фui
 uq</p>
      <p>Фuq ,
 us  ui</p>
      <p>uq ,
u = 1,2, …, r; s = 1,2, …, (q-1)
are called criteria or similarity invariants and, as a theorem deduction, are
numerically equal to all processes belonging to the same subclass of mutually similar
processes.</p>
      <p>Thus, the direct theorem formulates the necessary conditions for the correlation of
the analyzed process with one of the subclasses. Sufficient conditions for the
homogeneous similarity of two processes are given in the inverse similarity theorem: if it is
possible to reduce the complete processes equations to an isostructural relative form
with the numerically equal similarity invariants, then such processes are
homogeneously similar [6, 7].</p>
      <p>
        The similarity theorem, known as "π-theorem", allows identifying the functional
relationship between variable processes in relative form. The deductions form the
direct theorem and the “π-theorem” of similarity allowed formulating invariant
informative features for the correct behavior of some critical information infrastructure
software [9, 11].
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
      </p>
    </sec>
    <sec id="sec-2">
      <title>Mathematical problem formulation</title>
      <p>
        Imagine the computational process (СP) in the following form ((
        <xref ref-type="bibr" rid="ref5">5</xref>
        ), table 1):
CP=&lt;T,X,Y,Z,F,Ф&gt;
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
      </p>
      <p>The set of times t at which a computational process is observed
Sets of input and output parameters of the computational process</p>
      <p>Set of states of the computing process. Every state of the
computational process is characterized at each moment of time by the
sequence of arithmetic operations at the selected control point k.</p>
      <p>The set of transition operators fi, reflecting the mechanism of
changing the states of the computing process during its execution,
including arithmetic operations</p>
      <p>
        The set of output operators фi, describing the mechanism of the
formation of the result during the calculation
ψ: Z’→П’
μ: П’→П
ξ: П→Z
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
Impact on calculations, invariant formation, comparison with the reference invariants,
signal about incorrect calculations, calculation recovery, correct result calculation.
      </p>
      <p>In order to form the passport program the following actions are required:
1. Solving the observative problem (the computational process simulation by an
oriented program control graph).
2. Solving the problem of presenting calculations by similarity equations on linear
graph parts, i.e. to transform the arithmetic operations of the form:</p>
      <p>p
zi ( x1, x2 ,...,xm )   zij ( x1, x2 ,...,xm )</p>
      <p>j1</p>
      <sec id="sec-2-1">
        <title>To dimensionless form:</title>
        <p>[zij (x1, x2 ,..., xm )]  [zil (x1, x2 ,..., xm )], j ,l  1, p
1. Solving the problem of managing the computational process by comparing the
semantic invariants with the program passport that means that it is necessary to find
the maps:</p>
      </sec>
      <sec id="sec-2-2">
        <title>Limitations and assumptions:</title>
        <p>1. Considered set of arithmetic operations {+,‒,*,/,=}
2. ti&lt;tmax, where ti – computation time recovery, tmax – maximum allowable time to
recover the correctness of the calculations.
Solving these problems allowed developing a new method to control the
computational program semantic correctness, which complemented the known method
capabilities to ensure the required cyber resilience of the secured critical information
infrastructure [9, 12].</p>
        <p>In order to control the software correctness, it was necessary to construct a
program control graph.</p>
        <p>Let us imagine some computational process in the form of a program control
graph: G(B.D).</p>
        <p>Where B = {Bi}is set of vertices (linear program part and D = {BxB} set of arcs
(control connections) between them.</p>
        <p>Here, each linear graph part Bi  B has its own arithmetic operator sequence, i.e.</p>
        <p>Bi  (bi1, bi2 ,..., bil ).</p>
        <p>Bk  (B1k , B2k ,..., Btk ),
An ordered vertex sequence corresponds to each elementary (without cycles) route of
the graph input vertex to output vertex:</p>
        <p>where Bk  B and Bi k  (bik1 , bik2 ,..., bikl ), i  1, p form a sequence of the executed
arithmetic operators called a program implementation or a computational process. The
arithmetic expression sequence data is the potentially dangerous program fragments.</p>
        <p>The computational process algorithm was reduced to the graph representation form
to derive the arithmetic expression operators from the control operators (conditional
transitions, branching, cycles). As a result, in the control graph, all arithmetic
expression operators were grouped on a set of linear program parts — the graph vertices,
into which checkpoints (CP) were entered. Here, checkpoints were needed to
determine the routing context within which the calculations take place. Moreover, the
special systems of defining relations were constructed in the form of similarity equations
at each checkpoint for arithmetic operators. The equation system solution allowed to
form the matrices of similarity invariants to control the computational process
semantics.
4</p>
        <p>
          A similarity equations system development
The studies have shown that the most effective way to control the computation
semantics is to test relations, based on theoretically based relations and computation
features. Here the key relationships in the approach for detecting the parameters of the
incorrect computational process functioning are some invariant, which is understood
as the auto modeling (constant) presentation of program execution in the actual
operating secured infrastructure conditions. The invariant generation problem, from the
different program representations, is non-trivial and poorly formalized. In the
program execution dynamics, only semantic invariants remain fully computable
(repro(
          <xref ref-type="bibr" rid="ref9">9</xref>
          )
(
          <xref ref-type="bibr" rid="ref10">10</xref>
          )
ducible) (since they do not depend on the specific values of the program
variables) [7, 13].
        </p>
        <p>Let us imagine the implementation of Bk of the program control graph as an
ordered primary relation sequence, corresponding to arithmetic operators:
 y1  f1k ( x1 ,x2 ,..., xN ),
 y2  f2k ( x1 ,x2 ,..., xN , y1 ),
...

 yM  f Mk ( x1 , x2 ,..., xN , y1 , y2 ,..., yM 1 )
Having performed the superposition {yi} on X on the right relation sides, we obtain a
relation invariant system according to the displacement:
The relation yi  zik ( x1 ,x2 ,..., xN ) can be presented as:
 y1  z1k ( x1 ,x2 ,..., xN ),
 y2  z2k ( x1 ,x2 ,..., xN ),
...

 ym  z mk ( x1 ,x2 ,..., xN ).</p>
        <p>p
yi  ii1zij ( x1 ,x2 ,..., xN ),
where zij ( x1 ,x2 ,..., xN ) ‒ a power monomial.</p>
        <p>
          In accordance with the Fourier rule, the summands (
          <xref ref-type="bibr" rid="ref13">13</xref>
          ) should be homogeneous in
dimensions, i.e.
        </p>
        <p>[yi] = [ zij ( x1 ,x2 ,..., xN ) ] = [ zil ( x1 ,x2 ,..., xN ) ], j,l  1, pi or
[ zij ( x1 ,x2 ,..., xN ) ] = [ zil ( x1 ,x2 ,..., xN ) ], j ,l  1, pi
System (16) is a defining relations system or a similarity equation system.</p>
        <p>
          Using the function ρ = X→[X], we associate each x j  X
with some abstract
dimension x j  X . Then the summand dimensions (
          <xref ref-type="bibr" rid="ref13">13</xref>
          ) will be expressed as
        </p>
        <p>
          N  jn
zij ( x1 ,x2 ,..., xn  n1xn  , j  1, pi
(
          <xref ref-type="bibr" rid="ref11">11</xref>
          )
(
          <xref ref-type="bibr" rid="ref12">12</xref>
          )
(
          <xref ref-type="bibr" rid="ref13">13</xref>
          )
(14)
(15)
Using (14) and (15), we develop a system of defining relations:
which is transformed into the following form:
        </p>
        <p>N
 x 
n1 n
 jn</p>
        <p>N ln
  x  , j ,l  1, pi</p>
        <p>n1 n
N
 x 
n1 n
 jnln</p>
        <p> 1, j ,l  1, pi
Using the logarithm method, as it is usually done, when analyzing the similarity
relations we obtain a homogeneous system of linear equations from the system (17)
n1 j n  l n ln[xn ]  0 , j ,l  1, pi</p>
        <p>N
Expression (16) is a criterion for semantic correctness.</p>
        <p>Having performed a similar development for Bik  B , we obtain a system of
k
homogeneous linear equations for k-implementation:
Акω = 0
(19)
the Bk implementation is represented by a matrix
Generally, we can assume that the function ρ = X→[X] is surjective and, therefore,
Ak  a
ij of size mk × nk, which a
number of columns are not less than the number of rows, i.e. nk  mk .</p>
        <p>We say that the implementation of Bk is representative if it corresponds to the
matrix Аk with mk  1 , i.e. the implementation allows developing at least one similarity
criterion.</p>
        <p>Usually, a program corresponds to a separate functional module or consists of an
interconnected group of those and describes the general solution of a certain task.
Each of the implementations Bk  B describes a particular solution of the same
problem, corresponding to the certain X components values. Since Bk  Bl  
Bk ,Bl  B then the mathematical dependencies structure should be preserved during
the transition from one implementation to another, i.e. similarity criteria should be
common. Then the matrices {Ak}, corresponding to the implementations {Bk}, can be
combined into one system.</p>
        <p>Let the program have q implementations. Denote by A the union of the matrices
{Ak} corresponding to the implementations {Bk}, i.e.</p>
        <p> A1 
A   ... 

 Aq 
(16)
(17)
(18)
(20)
The A Development can be carried out using selective vertices covering the
implementations.</p>
        <p>Thus, the matrices A union is part of the program passport and is a database of
semantic standards {Ak} for the linear program {Bk} sections.</p>
        <p>The similarity equation example.</p>
        <p>Let us consider an assignment operator:
p = a*b + c/(d‒e)
(21)</p>
        <p>Here, the correct expression must be generated by some selected grammar, which
depends on both the possible terms meanings and the chosen operations set. For a
context-free grammar, each expression can be matched to an output tree in a unique
way. Thus, an output tree can be used as an alternative expression representation.</p>
        <p>When constructing a tree by the expression, the order of the calculations plays its
role. Obviously, the vertex descendant values are calculated earlier than the ancestor
vertex value. Therefore, the operation last performed will take place at the treetop. In
order to construct a tree unambiguously, it is necessary to determine the operation
calculation order in the expression, taking into account their priorities and the
operation order with the same priority, including the case when calculating the same
operation (associativity property). Usually, such expressions are calculated from left to
right.</p>
        <p>The constructed tree will definitely correspond to the specified expression taking
into account the calculation order.</p>
        <p>We formalize the arithmetic expressions:
Let Op {+,‒,*,/} be an arithmetic operations set under consideration.</p>
        <p>Terms is a set of terms, consisting of possible objects that can be operation
arguments.</p>
        <p>Expr is a set of all possible expressions, and Terms  Expr .
elem(o,e) Expr - many other elements, and oOp, e Expr .</p>
        <p>Thus, an arithmetic expression is either a term or an operation connecting several
expressions.</p>
        <p>The expression (20) with the set of terms Terms = {p,a,b,c,d,e} and the binary
operations set Op {,-,*,/} will be represented as:
elem: (=,p,(,(*,a,b),(/,c,(-,d,e)))).</p>
        <p>The arithmetic operator execution correctness can be assessed using the
appropriate semantic function. When applied to expressions, the semantic function
T : a   a  assigns to each argument some abstract entity or dimension [a]. Thus, the
arithmetic operations, performed on program variables during the program execution
are in fact operations on physical dimensions, and the semantics reflections,
performed at runtime, are linear mappings. The axiomatic of extended semantic algebra,
which defines operations on the variable dimensions, is presented in Table 2.</p>
        <p>Operator Denotation cCoonrdrietciotnness Linear equations cSrimiteilraiorinty
Addition R = L + P [L] = [P] [R]0[L]1[P]-1 = 1 0 1 -1
Subtraction R = L – P [L] = [P] [R]0[L]1[P]-1 = 1 0 1 -1
Multiplication R = L * P [R] = [L][P] [R]1[L]-1[P]-1 = 1 1 -1 -1
Division R = L / P [R] = [L][P]-1 [R]1[L]-1[P]1 = 1 1 -1 1
Exponentiation R = Ls [R] = [L]s [R]1[L]-s[P]0 = 1 1 -s 0
Assignment L = P [L] = [P] [R]0[L]1[P]-1 = 1 0 1 -1
where R – the operation result; L, R – left and right operands; [ ] – dimension.</p>
        <p>For a correctly running program in the context of this operator, the following
relations between the physical dimensions of the terms {p, a,b,c,d,e} should be fulfilled:
[p] = [a ∗ b] = [a][b],</p>
        <p>[d] = [e],
[p] = [c / (d‒ e)] = [c][d]−1 = [c][e]−1,
(22)</p>
      </sec>
      <sec id="sec-2-3">
        <title>Where [X] – is a physical object X dimension.</title>
        <p>G   , N , R, S ,</p>
        <p>A computation model in memory can be represented using the context-free
grammars. It allows describing the calculation process structure as a whole. Context-free
grammar has the following form:
where
 identifier,constant ,address ... register – a set of assembler terminal symbols/
N  Addition, Subtraction, Multiplication, Division, Appropriate – a non-terminal
character set;</p>
        <p>R  AddCommand, SubCommand MulCommand, ..., DivCommand
– an output
rule set;</p>
        <p>S  </p>
        <p>– a starting symbol.</p>
        <p>The terminal symbols include arithmetic coprocessor command lexical tokens,
including addition, subtraction, multiplication, division, assignment (data transfer)
commands. A non-terminal symbol set is a set of lexical tokens, united by a
generalizing feature, as well as their combinations, using products. An example of
nonterminal symbols is given in the Table 3.
The output rule represented by expression (21) determines the use of the “fadd”
command. Thus, we will present all possible inference rules in assembly language.</p>
        <p>AddCommand  Addition_ Re gister, Address
| Addition_ Re gister,Re gister
| Addition_ Re gister,Re gister  faddp st1, st</p>
      </sec>
      <sec id="sec-2-4">
        <title>Where</title>
        <p>Addition ‒ a non-terminal set of coprocessor addition commands;
Register ‒ a non-terminal set of coprocessor stack registers;
Address ‒ a memory identifier set or actual memory addresses.
(23)
(24)</p>
        <p>Each output in a context-free grammar, starting with a non-terminal symbol, is
uniquely associated with a directed graph, which is a tree and is called an output
(parse) tree. An output tree example related to the disassembled expression code, as
well as its representation as to the similarity equations in terms of the dimension
theory, is shown in figure 3.</p>
        <p>By taking a logarithm we obtain a homogeneous linear equation system with a
coefficients matrix:
In order to organize the similarity relations development, it is necessary to construct a
translation grammar for assignment operators of the arithmetic type. The translational
(attribute) grammar in addition to the syntax allows describing the action characters,
which are implemented as functions, procedures, and algorithms. According to
dimensions, these functions should implement algorithmic calculations and the
similarity relation development, power monomials, equations and solutions.</p>
        <p>Thus, the observation problem solution (control graph) and the computations
representation (similarity equation) made it possible to form the image of a system for
monitoring destructive software actions on the secured infrastructure, and restoring
computation processes based on similarity invariants.</p>
        <p>The plan of destructive software impacts control and the computational processes
recovery includes preparatory and main stages (Figure 4). The preparatory stage
includes the program passport formation in similarity invariants, the main ones are the
stages of:
─ Similarity invariants formation underexposure,
─ Similarity invariants database formation at the checkpoints of the program control
graph,
─ Validation of the semantic correctness criteria of computational processes,
─ Signal generation of the computation semantics violation,
─ Partial calculations recovery according to the program passport.</p>
        <p>A general representation of the information infrastructure that implements correct
calculations under the hidden intruder program actions is reflected in Figure 5. We
will reveal the stages of the destructive software impacts control and the computation
processes recovery in more detail.
Stage 1. The program passport formation in similarity invariants.</p>
        <p>In order to implement a dynamic control, it is necessary to use the static
verification results in the form of a program passport.</p>
        <p>At the stage of a static verification using the disassembled correct calculation code,
the program control graph is constructed.</p>
        <p>At each checkpoint for each arithmetic operator, a production tree of an arithmetic
expression is generated to develop a linear homogeneous equation system in the
dimension terms. The result of solving the equation systems for each linear program
part is a similarity invariant matrix. The semantic standard database is made up of
reference matrices of similarity invariants for each checkpoint (Figure 6).
Stage 2. The similarity invariants formation underexposure</p>
        <p>The similarity invariants formation of the computational process, which is
subjected to the hidden arithmetic operations impacts, runs according to the same algorithm
as the computational process reference invariant formation.</p>
        <p>For a given program, a set of checkpoints (CT) is formed, which are embedded in
the studied program. The initial program model is the control graph of the
computation process in terms of linear program sections. The similarity equations are analyzed
and a coefficient matrix is developed in embedded CT for each linear program
section, where the calculations take place (Figure 7).</p>
        <p>Incorrect calculations will differ in the state set of the computational process Z, i.e.
in arithmetic operator sequence. The incorrect calculations scheme is presented in
Figure 8.</p>
        <p>Stage 3. The similarity invariants database formation at the checkpoints of the
program control graph.</p>
        <p>At this stage, the similarity invariant matrices constructed for each checkpoint form
a similarity invariants database. The scheme of adding matrices to the database is
presented in Figure 9.</p>
        <p>Stage 4. The validation of the semantic correctness criteria of the computational
processes.</p>
        <p>In order to control the semantic correctness of the performed calculations, it is
necessary to check the semantic correctness criterion by the formula (18) applying the
reference and standard invariants matrix (Figure 9).</p>
        <p>If the validation of this checkpoint has been completed, then proceed to check the
criteria in the next CT until the program ends.</p>
        <p>Stage 5. The signal generation of the computation semantics violation and the
partial calculations recovery according to the program passport.</p>
        <p>If the semantic correctness violation of the program execution is detected, that is, if
for a given checkpoint  jn  in  0 , then a signal is formed and an attempt is made to
recover the calculations from the inverse transformation of the reference matrix
invariants (Figure 10).</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusions</title>
      <p>This approach allows to determine not only the fact of the calculation semantics
violation but also to indicate the specific impact location on the program, using the
mechanism for introducing checkpoints Thus, the dimensions and similarity theory
application allowed synthesizing new informative features - the so-called similarity
invariants for controlling the computational processes correctness. The similarity invariants
use made it possible to bring the monitoring system of destructive program actions
and the computation processes recovery closer to the controlled computational
process semantics.</p>
      <p>The obtained results allowed presenting a controlled computational process as a
corresponding equations system of dimensions and similarity invariants, and its
solution was to analyze the computations semantics under the destructive program
impacts on the secured critical information infrastructure.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>A.</given-names>
            <surname>Fink</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. L.</given-names>
            <surname>Griswold</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z. W.</given-names>
            <surname>Beech</surname>
          </string-name>
          ,
          <article-title>"Quantifying cyber-resilience against resourceexhaustion attacks,"</article-title>
          <source>in 7th International Symposium on Resilient Control Systems (ISRCS)</source>
          , Denver, CO,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <article-title>Appliance of information and communication technologies for development. Resolution of the General Assembly of the UN</article-title>
          .
          <string-name>
            <surname>Document</surname>
            <given-names>A</given-names>
          </string-name>
          / RES / 65/141 dated December 20.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bakkensen</surname>
            ,
            <given-names>L. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox-Lent</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Read</surname>
            ,
            <given-names>L. K.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Linkov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2017</year>
          ), “
          <article-title>Validating Resilience and Vulnerability Indices in the Context of Natural Disasters”</article-title>
          .
          <source>Risk Analysis</source>
          ,
          <volume>37</volume>
          :
          <fpage>982</fpage>
          -
          <lpage>1004</lpage>
          . DOI:
          <volume>10</volume>
          .1111/risa.12677.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V.L. Methodological</given-names>
          </string-name>
          <article-title>Framework for Analysis and Synthesis of a Set of Secure Software Development Controls</article-title>
          ,
          <source>Journal of Theoretical and Applied Information Technology</source>
          ,
          <year>2016</year>
          , vol.
          <volume>88</volume>
          , No 1, pp.
          <fpage>77</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Biryukov</surname>
            ,
            <given-names>D. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lomako</surname>
            ,
            <given-names>A. G.</given-names>
          </string-name>
          <article-title>Approach to Building a Cyber Threat Prevention System. Problems of Information Security</article-title>
          .
          <source>Computer systems</source>
          , Publishing house of Polytechnic University, vol.
          <volume>2</volume>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>19</lpage>
          , St. Petersburg, Russia,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Biryukov</surname>
            ,
            <given-names>D. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lomako</surname>
            ,
            <given-names>A. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sabirov</surname>
            ,
            <given-names>T. R.</given-names>
          </string-name>
          <string-name>
            <surname>Multilevel</surname>
          </string-name>
          <article-title>Modeling of Pre-Emptive Behavior Scenarios</article-title>
          . Problems of Information Security.
          <source>Computer systems</source>
          , Publishing house of Polytechnic University, vol.
          <volume>4</volume>
          , pp.
          <fpage>41</fpage>
          -
          <lpage>50</lpage>
          . St. Petersburg, Russia,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bongard</surname>
            ,
            <given-names>M. M.</given-names>
          </string-name>
          <article-title>The Problem of Recognition, Fizmatgiz</article-title>
          , Moscow, Russia,
          <year>1967</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Borzykh</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Detecting Code Security Breaches by Means of Dataflow Analysis</article-title>
          .
          <source>In CEUR Workshop Proceedings</source>
          ,
          <year>2017</year>
          , Vol-
          <volume>2081</volume>
          (
          <article-title>Selected Papers of the VIII All-Russian Scientific</article-title>
          and Technical Conference on Secure Information Technologies,
          <string-name>
            <surname>BIT</surname>
          </string-name>
          <year>2017</year>
          ). P.
          <volume>15</volume>
          -
          <fpage>20</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Bostick</surname>
            ,
            <given-names>T. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Connelly</surname>
            ,
            <given-names>E. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lambert</surname>
            ,
            <given-names>J. H.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Linkov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Resilience Science, Policy and Investment for Civil Infrastructure</article-title>
          .
          <source>Reliability Engineering &amp; System Safety</source>
          <volume>175</volume>
          :
          <fpage>19</fpage>
          -
          <lpage>23</lpage>
          . DOI:
          <volume>10</volume>
          .1016/j.ress.
          <year>2018</year>
          .
          <volume>02</volume>
          .025
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Bostick</surname>
            ,
            <given-names>T. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Holzer</surname>
            ,
            <given-names>T. H.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Sarkani</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Enabling stakeholder involvement in coastal disaster resilience planning</article-title>
          .
          <source>Risk Analysis</source>
          ,
          <volume>37</volume>
          (
          <issue>6</issue>
          ),
          <fpage>1181</fpage>
          -
          <lpage>1200</lpage>
          . DOI:
          <volume>10</volume>
          .1111/risa.12737
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>D. N.</given-names>
            <surname>Biryukov</surname>
          </string-name>
          ,
          <article-title>Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems</article-title>
          .
          <source>Proc. SPIIRAS</source>
          .
          <volume>3</volume>
          (
          <issue>40</issue>
          ), pp.
          <fpage>55</fpage>
          -
          <issue>76</issue>
          <year>Russia</year>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>D. N.</given-names>
            <surname>Biryukov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Glukhov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Pilkevich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. R.</given-names>
            <surname>Sabirov</surname>
          </string-name>
          ,
          <article-title>Approach to the processing of knowledge in the memory of an intellectual system</article-title>
          ,
          <source>Natural and technical sciences, No. 11</source>
          , pp.
          <fpage>455</fpage>
          -
          <lpage>466</lpage>
          , Russia,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>E. D.</given-names>
            <surname>Vugrin</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Turgeon</surname>
          </string-name>
          ,
          <article-title>"Advancing Cyber Resilience Analysis with PerformanceBased Metrics from Infrastructure Assessment," in Cyber Behavior: Concepts, Methodologies, Tools, and</article-title>
          <string-name>
            <surname>Applications</surname>
          </string-name>
          , Hershey, PA,
          <source>IGI Global</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>2033</fpage>
          -
          <lpage>2055</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>