<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Invariants Classification Characteristics for Checking the Correctness of Computational Processes *</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Sergei</forename><forename type="middle">A</forename><surname>Petrenko</surname></persName>
							<email>s.petrenko@rambler.ru</email>
							<affiliation key="aff0">
								<orgName type="institution">Innopolis University</orgName>
								<address>
									<settlement>Kazan</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">V.I</orgName>
								<orgName type="institution">Vernadsky Crimean Federal University</orgName>
								<address>
									<settlement>Yalta</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Invariants Classification Characteristics for Checking the Correctness of Computational Processes *</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">95041429E9DFD1EAE03924611CC9C244</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T23:30+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>inverse similarity theorem</term>
					<term>dynamic control of correctness of calculation programs</term>
					<term>the correctness of computing processes</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Selecting the invariant classification characteristics of the program behavior of some secured infrastructure (in this task, into two classes: correct and incorrect execution) is identical to the isomorphism problem of the two systems under some mapping. I order to clarify the necessary and sufficient conditions for the system isomorphism, as well as to determine the isomorphism mapping qualitative and quantitative parameters, a similarity theory of the mathematical apparatus was developed. However, in the late 1980s, the results were applied in the field of modeling, applying the universal digital computers and then transferred to solve a much wider spectrum of problems, including cybersecurity and ensuring the required cyber resilience of the critical information infrastructure.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The most detailed provisions of the similarity theory were developed concerning the processes, described by the homogeneous power polynomial systems <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b2">3]</ref>. There are three main theorems in the similarity theory: the direct, inverse, and π-theorem. The similarity theorem, known as "π-theorem", allows identifying the functional relationship between variable processes in relative form. The deductions form the direct theorem and the "π-theorem" of similarity allowed formulating invariant informative fea-Introducing a passport system for programs</p><p>Let us consider two processes of p1 and p2, which complete equations have the following form:</p><p>, u = 1, 2, …, r;</p><p>, u = 1, 2, …, r;</p><p>Where and -homogeneous functions of their parameters. The direct similarity theorem states that if the processes are homogeneously similar, then the following system takes place: ,</p><p>u = 1,2, …, r; s = 1,2, …, (q-1).</p><p>Expressions ,</p><p>u = 1,2, …, r; s = 1,2, …, (q-1)</p><p>are called criteria or similarity invariants and, as a theorem deduction, are numerically equal to all processes belonging to the same subclass of mutually similar processes.</p><p>Thus, the direct theorem formulates the necessary conditions for the correlation of the analyzed process with one of the subclasses. Sufficient conditions for the homogeneous similarity of two processes are given in the inverse similarity theorem: if it is possible to reduce the complete processes equations to an isostructural relative form with the numerically equal similarity invariants, then such processes are homogeneously similar <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>.</p><p>The similarity theorem, known as "π-theorem", allows identifying the functional relationship between variable processes in relative form. The deductions form the direct theorem and the "π-theorem" of similarity allowed formulating invariant informative features for the correct behavior of some critical information infrastructure software <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b10">11]</ref>.</p><formula xml:id="formula_4">   q 1 i ui 0     q 1 i ui 0 Ф    n 1 j j u 1 u x      n 1 j j u 1 u X Ф  uq ui uq ui Ф Ф    uq ui us    </formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Mathematical problem formulation</head><p>Imagine the computational process (СP) in the following form ((5), table <ref type="table">1</ref>):</p><p>CP=&lt;T,X,Y,Z,F,Ф&gt;</p><p>Table <ref type="table">1</ref>. Mathematical problem formulation of a computational process 1 T The set of times t at which a computational process is observed 2 X, Y Sets of input and output parameters of the computational process 3 Z Set of states of the computing process. Every state of the computational process is characterized at each moment of time by the sequence of arithmetic operations at the selected control point k.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">F</head><p>The set of transition operators fi, reflecting the mechanism of changing the states of the computing process during its execution, including arithmetic operations 5 Ф The set of output operators фi, describing the mechanism of the formation of the result during the calculation We introduce the following notation: λ -Violation mapping of an arithmetic operation at a specific time ti for given input parameters;</p><p>ψ -Mapping of the computational process regular invariants formation; μ -Comparative mapping of standard and reference invariants of the computational process; υ -Mapping of the signal generation about incorrect calculations; ξ -Mapping of the arithmetic operations recovery, based on reference similarity invariants;</p><p>χ -Performed calculation correctness mapping, based on the recovered arithmetic operations.</p><p>In order to exclude the possibility of discreet modification, made by the calculation program, it is necessary to perform dynamic control of the executed computational process (Figure <ref type="figure" target="#fig_0">1</ref>). Under the dynamic control of the computational program correctness, we will understand the correctness control of the performed arithmetic operations semantics, while their actual execution. Data for dynamic control must first be obtained as a program passport, resulting from its additional static analysis <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b9">10]</ref>. In order to form the passport program the following actions are required:</p><p>1. Solving the observative problem (the computational process simulation by an oriented program control graph). 2. Solving the problem of presenting calculations by similarity equations on linear graph parts, i.e. to transform the arithmetic operations of the form:</p><p>To dimensionless form:</p><p>1. Solving the problem of managing the computational process by comparing the semantic invariants with the program passport that means that it is necessary to find the maps: </p><formula xml:id="formula_8">ψ: Z'→П' μ: П'→П<label>(8)</label></formula><formula xml:id="formula_9">2 1 2 1 m il m ij x x x z x x x z  p , 1 l , j </formula><p>Solving these problems allowed developing a new method to control the computational program semantic correctness, which complemented the known method capabilities to ensure the required cyber resilience of the secured critical information infrastructure <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b11">12]</ref>.</p><p>In order to control the software correctness, it was necessary to construct a program control graph.</p><p>Let us imagine some computational process in the form of a program control graph: G(B.D).</p><p>Where B = {Bi}is set of vertices (linear program part and D = {BxB} set of arcs (control connections) between them.</p><p>Here, each linear graph part has its own arithmetic operator sequence, i.e.</p><p>An ordered vertex sequence corresponds to each elementary (without cycles) route of the graph input vertex to output vertex:</p><p>where and form a sequence of the executed arithmetic operators called a program implementation or a computational process. The arithmetic expression sequence data is the potentially dangerous program fragments.</p><p>The computational process algorithm was reduced to the graph representation form to derive the arithmetic expression operators from the control operators (conditional transitions, branching, cycles). As a result, in the control graph, all arithmetic expression operators were grouped on a set of linear program partsthe graph vertices, into which checkpoints (CP) were entered. Here, checkpoints were needed to determine the routing context within which the calculations take place. Moreover, the special systems of defining relations were constructed in the form of similarity equations at each checkpoint for arithmetic operators. The equation system solution allowed to form the matrices of similarity invariants to control the computational process semantics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">A similarity equations system development</head><p>The studies have shown that the most effective way to control the computation semantics is to test relations, based on theoretically based relations and computation features. Here the key relationships in the approach for detecting the parameters of the incorrect computational process functioning are some invariant, which is understood as the auto modeling (constant) presentation of program execution in the actual operating secured infrastructure conditions. The invariant generation problem, from the different program representations, is non-trivial and poorly formalized. In the program execution dynamics, only semantic invariants remain fully computable (repro-</p><formula xml:id="formula_12">B B i  ). ,..., , ( 2 1 il i i i b b b B  ), ,..., , ( 2 1 k t k k k B B B B  B B k  ), ,..., , ( 2 1 k il k i k i k i b b b B  p i , 1  </formula><p>ducible) (since they do not depend on the specific values of the program variables) <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b12">13]</ref>.</p><p>Let us imagine the implementation of B k of the program control graph as an ordered primary relation sequence, corresponding to arithmetic operators: <ref type="bibr" target="#b10">(11)</ref> Having performed the superposition {yi} on X on the right relation sides, we obtain a relation invariant system according to the displacement: <ref type="bibr" target="#b11">(12)</ref> The relation can be presented as: <ref type="bibr" target="#b12">(13)</ref> where -a power monomial. In accordance with the Fourier rule, the summands (13) should be homogeneous in dimensions, i.e.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>[yi] = [ ] = [ ],</head><p>or</p><formula xml:id="formula_13">[ ] = [ ],<label>(14)</label></formula><p>System ( <ref type="formula">16</ref>) is a defining relations system or a similarity equation system.</p><p>Using the function ρ = X→[X], we associate each with some abstract dimension . Then the summand dimensions (13) will be expressed as </p><formula xml:id="formula_14">, (<label>15</label></formula><formula xml:id="formula_15">)            ) y ,..., y , y , x ,..., x , x ( f y ... ), y , x ,..., x , x ( f y ), x ,..., x , x ( f y 1 M 2 1 N 2 1 k M M 1 N 2 1 k 2 2 N 2 1 k 1 1           ).</formula><formula xml:id="formula_16">1 ij i    ) x ,..., x , x ( z N 2 1 ij ) x ,..., x , x ( z N 2 1 ij ) x ,..., x , x ( z N 2 1 il i p , 1 l , j  ) x ,..., x , x ( z N 2 1 ij ) x ,..., x , x ( z N 2 1 il i p , 1 l , j  X x j      X x j      jn N 1 n n n 2 1 ij x x ,..., x , x ( z     i p , 1 j  164</formula><p>Using ( <ref type="formula" target="#formula_13">14</ref>) and (15), we develop a system of defining relations:</p><p>(16) which is transformed into the following form:</p><formula xml:id="formula_17">(17)</formula><p>Using the logarithm method, as it is usually done, when analyzing the similarity relations we obtain a homogeneous system of linear equations from the system (17)</p><formula xml:id="formula_18">, (<label>18</label></formula><formula xml:id="formula_19">)</formula><p>Expression ( <ref type="formula">16</ref>) is a criterion for semantic correctness.</p><p>Having performed a similar development for , we obtain a system of homogeneous linear equations for k-implementation:</p><formula xml:id="formula_20">А к ω = 0 (19)</formula><p>Generally, we can assume that the function ρ = X→[X] is surjective and, therefore, the B k implementation is represented by a matrix of size mk × nk, which a number of columns are not less than the number of rows, i.e. . We say that the implementation of B k is representative if it corresponds to the matrix А k with , i.e. the implementation allows developing at least one similarity criterion.</p><p>Usually, a program corresponds to a separate functional module or consists of an interconnected group of those and describes the general solution of a certain task. Each of the implementations describes a particular solution of the same problem, corresponding to the certain X components values. Since then the mathematical dependencies structure should be preserved during the transition from one implementation to another, i.e. similarity criteria should be common. Then the matrices {A k }, corresponding to the implementations {B k }, can be combined into one system.</p><p>Let the program have q implementations. Denote by A the union of the matrices {A k } corresponding to the implementations {B k }, i.e.</p><p>(20)</p><formula xml:id="formula_21">    , x x ln jn N 1 n n N 1 n n        i p , 1 l , j    , 1 x ln jn N 1 n n       i p , 1 l , j        N n n n l n j x 1 0 ] ln[   i p , 1 l , j  k k i B B   ij k a A  k k m n  1 m k  B B k     l k B B B B , B l k              q 1 A ... A A 165</formula><p>The A Development can be carried out using selective vertices covering the implementations.</p><p>Thus, the matrices A union is part of the program passport and is a database of semantic standards {A k } for the linear program {B k } sections.</p><p>The similarity equation example.</p><p>Let us consider an assignment operator:</p><formula xml:id="formula_22">p = a*b + c/(d-e)<label>(21)</label></formula><p>Here, the correct expression must be generated by some selected grammar, which depends on both the possible terms meanings and the chosen operations set. For a context-free grammar, each expression can be matched to an output tree in a unique way. Thus, an output tree can be used as an alternative expression representation.</p><p>When constructing a tree by the expression, the order of the calculations plays its role. Obviously, the vertex descendant values are calculated earlier than the ancestor vertex value. Therefore, the operation last performed will take place at the treetop. In order to construct a tree unambiguously, it is necessary to determine the operation calculation order in the expression, taking into account their priorities and the operation order with the same priority, including the case when calculating the same operation (associativity property). Usually, such expressions are calculated from left to right.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 2. Arithmetic expression generation tree</head><p>The constructed tree will definitely correspond to the specified expression taking into account the calculation order.</p><p>We formalize the arithmetic expressions: Let Op {+,-,*,/} be an arithmetic operations set under consideration.</p><p>Terms is a set of terms, consisting of possible objects that can be operation arguments.</p><p>Expr is a set of all possible expressions, and .</p><p>-many other elements, and . Thus, an arithmetic expression is either a term or an operation connecting several expressions.</p><p>The expression (20) with the set of terms Terms = {p,a,b,c,d,e} and the binary operations set Op {,-,*,/} will be represented as: elem: <ref type="figure">(=,p,(,(*,a,b),(/,c,(-,d,e</ref>)))).</p><p>The arithmetic operator execution correctness can be assessed using the appropriate semantic function. When applied to expressions, the semantic function assigns to each argument some abstract entity or dimension <ref type="bibr">[a]</ref>. Thus, the arithmetic operations, performed on program variables during the program execution are in fact operations on physical dimensions, and the semantics reflections, performed at runtime, are linear mappings. The axiomatic of extended semantic algebra, which defines operations on the variable dimensions, is presented in Table <ref type="table" target="#tab_1">2</ref>.  1 [P] -1 = 1 0 1 -1 where Rthe operation result; L, Rleft and right operands; [ ]dimension.</p><formula xml:id="formula_23">[L] = [P] [R] 0 [L] 1 [P] -1 = 1 0 1 -1 Subtraction R = L -P [L] = [P] [R] 0 [L] 1 [P] -1 = 1 0 1 -1 Multiplication R = L * P [R] = [L][P] [R] 1 [L] -1 [P] -1 = 1 1 -1 -1 Division R = L / P [R] = [L][P] -1 [R] 1 [L] -1 [P] 1 = 1 1 -1 1 Exponentiation R = L s [R] = [L] s [R] 1 [L] -s [P] 0 = 1 1 -s 0 Assignment L = P [L] = [P] [R] 0 [L]</formula><p>For a correctly running program in the context of this operator, the following relations between the physical dimensions of the terms {p, a,b,c,d,e} should be fulfilled:</p><formula xml:id="formula_24">[p] = [a * b] = [a][b], [d] = [e], [p] = [c / (d-e)] = [c][d] −1 = [c][e] −1 ,<label>(22)</label></formula><p>Where [X]is a physical object X dimension. a starting symbol. The terminal symbols include arithmetic coprocessor command lexical tokens, including addition, subtraction, multiplication, division, assignment (data transfer) commands. A non-terminal symbol set is a set of lexical tokens, united by a generalizing feature, as well as their combinations, using products. An example of nonterminal symbols is given in the Table <ref type="table">3</ref>. The output rule represented by expression (21) determines the use of the "fadd" command. Thus, we will present all possible inference rules in assembly language.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Expr</head><p>(24)</p><p>Where Addition -a non-terminal set of coprocessor addition commands; Register -a non-terminal set of coprocessor stack registers; Address -a memory identifier set or actual memory addresses. Each output in a context-free grammar, starting with a non-terminal symbol, is uniquely associated with a directed graph, which is a tree and is called an output (parse) tree. An output tree example related to the disassembled expression code, as well as its representation as to the similarity equations in terms of the dimension theory, is shown in figure <ref type="figure" target="#fig_3">3</ref>.</p><formula xml:id="formula_25"> , S , R , N , G     register ... address , t tan cons , identifier     e Appropriat Division tion Multiplica n Subtractio Addition N , , , ,    DivCommand ..., , MulCommand SubCommand , AddCommand R    S N    ...</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 3. Calculations representation by similarity equations</head><p>The solution to this equation system is a similarity coefficient matrix, constructed as follows:</p><formula xml:id="formula_26">[ebp+p] = [ebp+a][ebp+b] [ebp+d] = [ebp+e] [ebp+p] = [ebp+c][ebp+d]- 1=[ebp+c][ebp+e]-1 [ebp+p]1[ebp+a]-1[ebp+b]- 1[ebp+c]0[ebp+d]0[ebp+e]0=1 [ebp+p]0[ebp+a]0[ebp+b]0[ebp+c]0[ebp+d]1 [ebp+e]-1=1 [ebp+p]0[ebp+a]0[ebp+b]0[ebp+c]- 1[ebp+d]1[ebp+e]0=1  169</formula><p>By taking a logarithm we obtain a homogeneous linear equation system with a coefficients matrix:</p><p>(25)</p><p>In order to organize the similarity relations development, it is necessary to construct a translation grammar for assignment operators of the arithmetic type. The translational (attribute) grammar in addition to the syntax allows describing the action characters, which are implemented as functions, procedures, and algorithms. According to dimensions, these functions should implement algorithmic calculations and the similarity relation development, power monomials, equations and solutions.</p><p>Thus, the observation problem solution (control graph) and the computations representation (similarity equation) made it possible to form the image of a system for monitoring destructive software actions on the secured infrastructure, and restoring computation processes based on similarity invariants.</p><p>The plan of destructive software impacts control and the computational processes recovery includes preparatory and main stages (Figure <ref type="figure" target="#fig_5">4</ref>). The preparatory stage includes the program passport formation in similarity invariants, the main ones are the stages of: A general representation of the information infrastructure that implements correct calculations under the hidden intruder program actions is reflected in Figure <ref type="figure" target="#fig_6">5</ref>. We will reveal the stages of the destructive software impacts control and the computation processes recovery in more detail. At the stage of a static verification using the disassembled correct calculation code, the program control graph is constructed.</p><p>At each checkpoint for each arithmetic operator, a production tree of an arithmetic expression is generated to develop a linear homogeneous equation system in the dimension terms. The result of solving the equation systems for each linear program part is a similarity invariant matrix. The semantic standard database is made up of reference matrices of similarity invariants for each checkpoint (Figure <ref type="figure" target="#fig_7">6</ref>). The similarity invariants formation of the computational process, which is subjected to the hidden arithmetic operations impacts, runs according to the same algorithm as the computational process reference invariant formation.</p><p>For a given program, a set of checkpoints (CT) is formed, which are embedded in the studied program. The initial program model is the control graph of the computation process in terms of linear program sections. The similarity equations are analyzed and a coefficient matrix is developed in embedded CT for each linear program section, where the calculations take place (Figure <ref type="figure" target="#fig_8">7</ref>). Incorrect calculations will differ in the state set of the computational process Z, i.e. in arithmetic operator sequence. The incorrect calculations scheme is presented in Figure <ref type="figure" target="#fig_9">8</ref>. At this stage, the similarity invariant matrices constructed for each checkpoint form a similarity invariants database. The scheme of adding matrices to the database is presented in Figure <ref type="figure" target="#fig_10">9</ref>. In order to control the semantic correctness of the performed calculations, it is necessary to check the semantic correctness criterion by the formula (18) applying the reference and standard invariants matrix (Figure <ref type="figure" target="#fig_10">9</ref>).</p><p>If the validation of this checkpoint has been completed, then proceed to check the criteria in the next CT until the program ends.</p><p>Stage 5. The signal generation of the computation semantics violation and the partial calculations recovery according to the program passport.</p><p>If the semantic correctness violation of the program execution is detected, that is, if for a given checkpoint , then a signal is formed and an attempt is made to recover the calculations from the inverse transformation of the reference matrix invariants (Figure <ref type="figure" target="#fig_11">10</ref>). </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The mapping diagram of the calculation correctness recovery</figDesc><graphic coords="4,125.04,159.12,353.76,96.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>in memory can be represented using the context-free grammars. It allows describing the calculation process structure as a whole. Context-free grammar has the following form:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Table 3 .</head><label>3</label><figDesc>Sets of non-terminal symbols</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>─AFig. 4 .</head><label>4</label><figDesc>Fig. 4. Distortion control and computation process recovery scheme</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. The correct calculation scheme</figDesc><graphic coords="13,124.68,453.84,346.08,51.36" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. The passport program formation scheme in the invariant similarity</figDesc><graphic coords="14,126.24,220.92,345.84,317.04" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. The similarity invariants scheme underexposure</figDesc><graphic coords="15,126.24,268.92,345.84,170.04" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Fig. 8 .</head><label>8</label><figDesc>Fig. 8. The incorrect calculations scheme</figDesc><graphic coords="15,124.68,522.84,345.60,51.36" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head>Fig. 9 .</head><label>9</label><figDesc>Fig. 9. The similarity invariants database formation scheme</figDesc><graphic coords="16,124.68,147.36,345.72,78.24" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_11"><head>Fig. 10 .</head><label>10</label><figDesc>Fig. 10. The computational processes validation scheme</figDesc><graphic coords="16,126.24,457.20,345.72,206.76" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="1,0.00,190.95,595.32,460.02" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="8,136.08,391.44,345.84,255.36" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="11,124.68,219.36,351.84,217.68" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 .</head><label>2</label><figDesc>The operations on the program variables dimensions</figDesc><table><row><cell>Operator</cell><cell>Denotation</cell><cell>Correctness condition</cell><cell>Linear equations</cell><cell>Similarity criterion</cell></row><row><cell>Addition</cell><cell>R = L + P</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Quantifying cyber-resilience against resourceexhaustion attacks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fink</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">L</forename><surname>Griswold</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">W</forename><surname>Beech</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">7th International Symposium on Resilient Control Systems (ISRCS)</title>
				<meeting><address><addrLine>Denver, CO</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Appliance of information and communication technologies for development. Resolution of the General Assembly of the UN</title>
		<idno>/ 65/141</idno>
	</analytic>
	<monogr>
		<title level="j">Document A / RES</title>
		<imprint>
			<date>December 20</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Validating Resilience and Vulnerability Indices in the Context of Natural Disasters</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Bakkensen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Fox-Lent</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">K</forename><surname>Read</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Linkov</surname></persName>
		</author>
		<idno type="DOI">10.1111/risa.12677</idno>
	</analytic>
	<monogr>
		<title level="j">Risk Analysis</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="page" from="982" to="1004" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Methodological Framework for Analysis and Synthesis of a Set of Secure Software Development Controls</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Barabanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Markov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Tsirlov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Theoretical and Applied Information Technology</title>
		<imprint>
			<biblScope unit="volume">88</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="77" to="88" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Approach to Building a Cyber Threat Prevention System</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">N</forename><surname>Biryukov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Lomako</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Problems of Information Security</title>
				<meeting><address><addrLine>St. Petersburg, Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="13" to="19" />
		</imprint>
		<respStmt>
			<orgName>Computer systems ; Publishing house of Polytechnic University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Multilevel Modeling of Pre-Emptive Behavior Scenarios</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">N</forename><surname>Biryukov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Lomako</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">R</forename><surname>Sabirov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Problems of Information Security</title>
				<meeting><address><addrLine>St. Petersburg, Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="41" to="50" />
		</imprint>
		<respStmt>
			<orgName>Computer systems ; Publishing house of Polytechnic University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">The Problem of Recognition</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Bongard</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1967">1967</date>
			<publisher>Fizmatgiz</publisher>
			<pubPlace>Moscow, Russia</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Detecting Code Security Breaches by Means of Dataflow Analysis</title>
		<author>
			<persName><forename type="first">S</forename><surname>Borzykh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Markov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Tsirlov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Barabanov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Selected Papers of the VIII All-Russian Scientific and Technical Conference on Secure Information Technologies</title>
				<meeting><address><addrLine>BIT</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2081. 2017</date>
			<biblScope unit="page" from="15" to="20" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Resilience Science, Policy and Investment for Civil Infrastructure</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">P</forename><surname>Bostick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">B</forename><surname>Connelly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Lambert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Linkov</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ress.2018.02.025</idno>
	</analytic>
	<monogr>
		<title level="j">Reliability Engineering &amp; System Safety</title>
		<imprint>
			<biblScope unit="volume">175</biblScope>
			<biblScope unit="page" from="19" to="23" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Enabling stakeholder involvement in coastal disaster resilience planning</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">P</forename><surname>Bostick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">H</forename><surname>Holzer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sarkani</surname></persName>
		</author>
		<idno type="DOI">10.1111/risa.12737</idno>
	</analytic>
	<monogr>
		<title level="j">Risk Analysis</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1181" to="1200" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">N</forename><surname>Biryukov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proc. SPIIRAS</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">40</biblScope>
			<biblScope unit="page" from="55" to="76" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Approach to the processing of knowledge in the memory of an intellectual system</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">N</forename><surname>Biryukov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Glukhov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Pilkevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">R</forename><surname>Sabirov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Natural and technical sciences</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="455" to="466" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Advancing Cyber Resilience Analysis with Performance-Based Metrics from Infrastructure Assessment</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Vugrin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Turgeon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Cyber Behavior: Concepts, Methodologies, Tools, and Applications</title>
				<meeting><address><addrLine>Hershey, PA</addrLine></address></meeting>
		<imprint>
			<publisher>IGI Global</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="2033" to="2055" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
