<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Mathematical Model of Threats Resistance in the Critical Information Resources Protection System</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>© Bogdan Korniyenko</string-name>
          <email>bogdanko@gmx.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>© Liliya Galata</string-name>
          <email>galataliliya@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>© Lesya Ladieva</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>281</fpage>
      <lpage>291</lpage>
      <abstract>
        <p>The main problems of information security of critical information resources and causes of their occurrence are considered. The main threats to security systems of critical information resources are analyzed. Mathematical model of counteraction of internal and external threats to the system of protection of critical information resources of mineral fertilizers production is developed. The process of building a mathematical model of countering the threats in the system of protection of critical information resources with the help of Markov chain. The methodology of finding current threats to data security during their processing is offered. The software module is developed in the Piton programming language. These examples calculate the probability of mathematical model of information system in one of four states (the threat did not come; the threat came but was not implemented; the threat has been implemented; the threat came, but it was reflected protection system). Examples of numerical results analysis using proposed techniques clearly show that their use helps to define threats that are relevant to the system being investigated and can be used in practice. The disadvantage of proposed methodology is the need to consider the system behaviour when it comes to each type of threat, individually and inability to define behaviour on the simultaneous action of several threats. Studying the influence of each threat separately allows to study each of its types in more detail and to determine the probability of which is the greatest occurrence. As a result of exploitation of critical information resources protection systems and substantial changes in composition and quality of modern threats, it is necessary to project and implement information security of the systems taking into account tendencies of cyber threats development.</p>
      </abstract>
      <kwd-group>
        <kwd>Mathematical Model</kwd>
        <kwd>Threat</kwd>
        <kwd>System of Protection</kwd>
        <kwd>Critical Information Resources</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>In today's world, automated control systems are used more and more often. The
need for information security in automated control systems is increasing every year
by increasing the number of attacks by intruders and leakage of confidential
information. But the most susceptible to security is the most automated control systems of
technological processes, as when attackers attack, it can happen not only leakage of
secret information, but also interference into the technological process itself, which,
when malfunctions, can lead to environmental catastrophe.</p>
      <p>Control of technological processes in enterprises of small, medium and large size
is impossible without computer equipment and modern means of automation, without
highly effective of automated control systems of technological processes (ACS TP).</p>
      <p>ACS is a comprehensive system of hardware and software, which is designed for
remote centralized monitoring of processes and system as a whole, as well as for
automated control of engineering and technical subsystems.</p>
      <p>Information Security (IS) is becoming more and more topical issue with the
development of computing equipment and the increasing penetration of such systems
into the daily lives of people. This is discussed in almost every event on the security
of the IS, and the analysis of reliability and safety of the systems already
commissioned is one of the mandatory conditions of State and international certification. One
of the biggest problems of the security is that the majority of ACS of small and
medium complexity are projected by small organizations under conditions of strict
financial limitation, which eliminates or complicates the security issue.</p>
      <p>Experts believe that the provision of IS is different from the provision of corporate
information systems. Even the term "information security" is very rarely used in
relation to ACS TP. The reason for this is that it is necessary to pay attention not so much
the confidentiality of information, but ensuring the continuity and integrity of the
technological process. Although at the same time a significant amount of attention is
given to the problems of ensuring confidentiality of information, because, according
to many experts, the solution of this problem leads to the automatic solution of the
problem of integrity and availability of information.</p>
      <p>Modern ACS in many cases manage difficult and dangerous technological
processes, failure of which could potentially lead to accidents in production or, in the
worst case, to technogenic disasters. This significantly increases the price of risk due
to violations of the IS, because threats can theoretically cause damage to people, the
environment, and also leads to the financial and reputational losses.</p>
      <p>In modern times, the priority in providing the IS ACS TP is to ensure the
availability and integrity of the management and configuration information on the
parameters of the technological process. Particular attention should be paid to preventing
unauthorized access to the system to preserve the stable functioning of ACS TP [1-5].
Despite the large number of accidents with catastrophic consequences, the problem of
critical information resources protection at industrial enterprises in the chemical and
energy industries has never been so acute as in recent years.</p>
      <p>The general interest to the security of industrial systems occurred only after the
incidents with the computer viruses Stuxnet, Duqu, Flame, which attacked Iranian
nuclear facilities, government agencies and industrial facilities in India, China and other
countries. Separately, attacks to enterprises in the Ukraine’s energy sector and the
banking sector should be highlighted. Before these incidents advent, it was considered
that the protection system of critical information resources was been very difficult to
compromise. Such representations were based on the following postulates: the
software of each protection system for critical information resources is unique and closed;
penetration into the system is associated with high costs of intellectual resources, and
the monetary reward for the attacker is not obvious; the local network of the critical
information resources protection system solves access restriction problems.</p>
      <p>
        A study of software and hardware structure, that used in the protection systems of
critical information resources, has shown that there have been big changes in recent
years. Almost everywhere, widely known software is used, such as Windows OS,
TCP/IP protocols, etc., which, together with their advantages in standardization,
simplicity, and quality of use, have also brought disadvantages - vulnerabilities.
Computers connected to the Internet appear in the local network, and they also present a large
number of potential threats to the system [
        <xref ref-type="bibr" rid="ref10">6-10</xref>
        ].
2
      </p>
      <p>Formulation of the problem
In industrial systems of critical infrastructure there are the same vulnerabilities as in
most conventional IT systems. In addition, the peculiarity of industrial systems is the
existence of unique vulnerabilities, which include:</p>
      <p>Human factor. Operation Industrial and corporate systems are usually involved in
various divisions and specialists. In turn, the personnel of industrial systems, as a rule,
are not far from the issues of providing information security, in its composition there
are no security specialists, and the recommendations of the IT staff are not distributed.
The solution of technological problems arising during the operation of the system,
ensuring its reliability and availability, efficiency and minimization of overhead
should be one of the main tasks of specialists.</p>
      <p>OS vulnerabilities. The vulnerabilities of OS (operating systems) are inherent for
both industrial and enterprise systems, but software installations are not normally
implemented in industrial systems. Uninterrupted operation of such system is the
responsibility of the administrator. The establishment of pre-approved software
corrections can contribute to serious problems, and there is no time or money on full
testing.</p>
      <p>Authentication. Common passwords are usually used for industrial systems. The
two-factor authentication system is rarely used, and sensitive information is often
transmitted in an open form.</p>
      <p>Remote access. To control the industrial systems often used remote access by
dialup channels or by VPN channels via the Internet. If not controlled use, this may cause
serious security problems.</p>
      <p>External network connections. Lack of appropriate regulatory framework and
usage is aimed more at convenience rather than security, sometimes lead to the fact that
network connections are created between industrial and corporate networks. There are
even recommendations for using "composite" networks that allow you to simplify
administration. This can adversely affect the security of both industrial and corporate
systems.</p>
      <p>Means of protection and monitoring. Unlike enterprise systems, use IDS. Systems,
etc. In the industrial system is not a common practice, the analysis of security audit
logs is also not rarely bypassed.</p>
      <p>Wireless networks. In industrial systems, various types of wireless communication
are often used, including 802.11 protocols, which are known to not provide sufficient
capabilities to protect the information.</p>
      <p>Remote processors. Some remote processor classes have known vulnerabilities.
Performance of these processors does not always allow to implement security
functions. In addition, after installation, they try not to touch for years, during which they
remain vulnerable.</p>
      <p>Software. The software of the industrial systems usually does not have enough
security functions. In addition, in most cases, it is not devoid of architectural
weaknesses.</p>
      <p>Disclosures. The owners of industrial systems are often deliberately publish
information about their architecture. Consultants and developers often share
experiences and reveal useful information about employees.</p>
      <p>Physical security. Remote processors and industrial systems equipment can be
outside the controlled area. In such conditions they physically cannot be controlled by
the personnel, and the only mechanism of their physical protection is the use of metal
doors and locks. Such measures are not a serious obstacle to intruders.</p>
      <p>
        In this way, we can conclude that there is a significant number of vulnerabilities
that are both common to any information systems and specific to industrial systems.
These vulnerabilities cause specific security requirements and special operating
regimes for such systems [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14 ref15">11-15</xref>
        ].
      </p>
      <p>Also, the new term “cyberwarfare” has recently appeared, which is often mentioned
in the media, because there is a problem in critical information resource system
protection at infrastructure facilities and hazardous industries. Thus, the widespread use
of computer equipment in the management of industrial enterprises creates the need to
pay more and more attention to the problems of information security of such systems.</p>
      <p>The main problems of information security of critical information resources,
according to experts, appear because there are:
- low protection against unauthorized access (passwords);
- undeclared SCADA capabilities;
- lack of control in management actions;
- using of wireless communications (crypto persistent Wi-Fi encryption);
- lack of clear boundaries between different network segments;
- untimely or incorrect software updates;
- rejection from even minimal security tools (often for convenience or
performance, companies refuse to install not only, for example, anti-virus protection, but
also password protection for critical assets);
- the distribution of Windows as an operating system for workstations and even
servers;
- development for trusted environment of closed industrial networks;
- creating systems without taking into account the best practices in safe code
development;
- human factor, poor staff discipline.</p>
      <p>Here is an example of the main threats to critical information resource systems
found after analyzing these incidents:
- attacks to SCADA;
- attacks to PLC, PLC vulnerabilities (standard password, unauthorized access to
original software);</p>
      <p>- attacks to the infrastructure and the operating system (viruses, trojans, worms,
DoS and DDoS attacks, ARP spoofing);</p>
      <p>- attacks to protocols, protocol vulnerabilities (unauthorized access, SQL
injection);</p>
      <p>- attacks such as Buffer Overflow, Information Disclose, Denial of Access,
Manipulation of View.</p>
      <p>Among all types of vulnerable components of critical information resources
protection systems, the next one prevails: SCADA - 87%, systems providing
humanmachine interfaces - 49%, programmable controllers - 20%, protocols - 1%.</p>
      <p>
        The vulnerabilities by type was divided as follows: buffer overflow - 36%,
authentication / key management - 22.86%, Web application vulnerabilities - server
10.86%, client - 9.14%, remote code execution - 13.14% [
        <xref ref-type="bibr" rid="ref16 ref17 ref18">16-18</xref>
        ].
      </p>
      <p>As a result of the operation of protection systems for critical information resources
and a significant change in the composition and quality of modern threats, it is
necessary to design and implement information security systems taking into account trends
in cyber threats development. On the other hand, it is necessary to carry out regular
work to neutralize emerging or potential threats on working systems. At this level, the
following information security services are implemented: access control, integrity,
secure network connections, antivirus protection, security analysis, intrusion
detection, information security system management (continuous state monitoring, incident
detection, reaction).
3</p>
      <p>
        Analysis of recent research and publications
The protection system of critical information resources of mineral fertilizers
production was chosen as the object of research [
        <xref ref-type="bibr" rid="ref19 ref20 ref21">19-21</xref>
        ]. The basis of information security
models are the following theories: formal-heuristic approach; probability theory and
random processes; evolutionary modeling; theory of graphs, automata, and Petri nets;
game theory and conflict; catastrophe theory; theory of fuzzy sets; entropy approach.
The differences between the majority of models are which parameters they use as
input and which parameters are given as output after calculations. In addition,
recently, modeling methods based on the informal theory of systems are widely used:
structuring methods, estimation methods, and methods for finding optimal solutions
[2224].
      </p>
      <p>Structuring methods is the development of a formal description, applies to
organizational and technical systems. Using these methods allows us to present the
architecture and process of complex system functioning in the form that satisfies the
following conditions: completeness of main parts display and their relationships;
simplicity of elements organization and their relationships; flexibility - simplicity of
making changes to the structure, etc. Evaluation methods allow you to determine the
values of system characteristics, that cannot be measured or obtained using analytical
expressions, or in the statistical analysis process, such as the probability of threats, the
effectiveness of the protection system element, etc. The basis of such methods is
expert assessment - an approach of attracting specialists in relevant fields to obtain some
characteristics values.</p>
      <p>Methods for finding optimal solutions is a generalization of a large number of
independent, mostly mathematical, theories, in order to solve optimization problems. In
the general case, this group includes methods for informally reducing a complex
problem to a formal description, followed by formal approaches. Combining of methods
for these three groups allows you to expand the possibilities of applying formal
theories to do a complete simulation of protection systems.</p>
      <p>The purpose of the article is the development and research of a mathematical
model of threats resistance in the critical information resources protection system,
obtaining transitional characteristics for system states.
4</p>
      <p>
        Main research material
The mathematical model of influence resistance of internal and external threats on the
protection system of critical information resources of the mineral fertilizers
production is proposed. The process of constructing a mathematical model for threats
resistance in the critical information resources protection system by using the Markov
chain [
        <xref ref-type="bibr" rid="ref25 ref27">25-27</xref>
        ] is described in stages. The methodology for finding relevant threats to
data security during their processing is proposed. The examples of calculating the
probabilities of finding a mathematical model of an information system in one of four
states is shown (the threat has not occurred; the threat occurred, but has not been
implemented; the threat occurred, and has been implemented; the threat occurred, but
has been reflected by the security system).
      </p>
      <p>The system can be interpreted as a queuing system, which receives threats. First,
consider the situation when threats of the same type come to the system input,
assuming that the threat cannot be realized and come several times in the same time period.
If these conditions are met, then the system can be in one of four states (see Fig. 1):
1. the threat has not been occurred and, accordingly, was not implemented;
2. the threat occurred, but has not been implemented;
3. the threat occurred, but has been implemented;
4. the threat occurred, but has been reflected by the security system.</p>
      <p>The system under consideration is a system with recovery, this system can go
from any state to the initial one. We will consider a system with continuous time. The
transition from state to state occurs according to a directed graph (see Fig. 1). To
describe the transition from state to state, we will construct a transition intensity matrix:
From prior approvals, as a result, the elements of this matrix have the following
To determine the probabilities of being the system in the states x0, x1, x2, x3, we
construct a system of differential equations:
(1)
(2)
(3)
(4)
⎪ 




properties:
 0
1,0,0,0
is set, so vector of absolute probabilities







 












 
 
 








 







0
 
 
 











defines by the ratio:
 

 , 
 ,</p>
      <p>,  
 

0</p>
      <p />
      <p>
        After research on the simulation model, two results of finding the coefficients 
were determined, which will be given below [
        <xref ref-type="bibr" rid="ref28 ref29">28-30</xref>
        ].
      </p>
      <p>Option 1. Let the transition intensity matrix 
be as follows:</p>
      <p>We get the solution of the equations system by the fourth-order Runge-Kutta
method for the time t = 50 s. To implement the solution, a software module has been
developed by Python. As a result of the calculations, the probability values of being
the system in each of the states were found (see Fig. 2).
(5)
(6)
(7)
(8)</p>
      <p>Option 2. We will make the calculation similar to Option 1 with the values of the
transition intensity matrix 
:
0.040
0.225
0.575
0.125
As a result, we will get the following graph (see Fig. 3):
Based on the obtained results, it can be said that in Option 2, the system is more
probable to be in a threatened state, although there is a high probability that the security
system will successfully reflect the threat.</p>
      <p>The mathematical model of threats resistance in the protection system of critical
information resources of the mineral fertilizers production is proposed. A
methodology for identifying actual security threats on the basis of this model has also been
developed and displayed.</p>
      <p>Examples of the numerical results analysis using the proposed methodology
clearly demonstrate that their use helps to identify threats that are relevant to the research
system and can be used in practice. The disadvantage of the proposed methodology is
the need to consider the behavior of the system when each type of threat is exposed to
it separately and the inability to determine the behavior of the system when
simultaneous action of several threats is exposed to it. But on the other hand, research of the
influence of each threat separately allows you more detailed study each of its types
and identify those with the highest probability of occurrence.</p>
      <p>System
v3.0:</p>
      <p>User</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Kurilov F. M.</surname>
          </string-name>
          <article-title>Simulation of information protection systems</article-title>
          .
          <source>Graph Theory App/ Technical Sciences: Theory and Practice: Materials III Internar. Scientific. Conf</source>
          . - Reading: Young Scientist Publishing House, pp.
          <fpage>6</fpage>
          -
          <lpage>9</lpage>
          . (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>Rosenko</given-names>
            <surname>AP</surname>
          </string-name>
          .
          <article-title>Theoretical basis for analyzing and assessing the impact of internal threats on the security of confidential information: monograph</article-title>
          . M.:
          <string-name>
            <surname>Helios</surname>
            <given-names>ARV</given-names>
          </string-name>
          ,
          <volume>154</volume>
          p. (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>Raphael</given-names>
            <surname>Hertzog</surname>
          </string-name>
          ,
          <string-name>
            <surname>Jim O'Gorman</surname>
          </string-name>
          , and Mati Aharoni «Kali Linux Revealed» , Offsec Press, 347 p. (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Lei</given-names>
            <surname>Chen</surname>
          </string-name>
          , Hassan Takabi,
          <string-name>
            <surname>Nhien-An Le-KhacJohn</surname>
            <given-names>Wiley</given-names>
          </string-name>
          &amp; Sons. Security, Privacy, and Digital Forensics in the Cloud,
          <volume>360</volume>
          p. (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Glen D. Singh</surname>
            ,
            <given-names>Rishi</given-names>
          </string-name>
          <string-name>
            <surname>Latchmepersad</surname>
          </string-name>
          .
          <source>CompTIA Network+ Certification Guide</source>
          ,
          <volume>422</volume>
          p.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>Dijiang</given-names>
            <surname>Huang</surname>
          </string-name>
          , Ankur Chowdhary,
          <string-name>
            <given-names>Sandeep</given-names>
            <surname>Pisharody</surname>
          </string-name>
          .
          <source>Software-Defined Networking and Security: From Theory to Practice</source>
          ,
          <volume>328</volume>
          p. (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Robert</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
          </string-name>
          .
          <source>Active Cyber Defense Cycle</source>
          ,
          <volume>651</volume>
          p. (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>Jason C.</given-names>
            <surname>Neumann</surname>
          </string-name>
          ,
          <article-title>The Book of GNS3: Build Virtual Network Labs Using Cisco, Juniper, and</article-title>
          <source>More 1st Edition</source>
          , 274 p. (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>Kwangjo</given-names>
            <surname>Kim</surname>
          </string-name>
          , Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja.
          <article-title>Network Intrusion Detection Using Deep Learning: A Feature Learning Approach</article-title>
          ,
          <volume>79</volume>
          p. (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Korniyenko</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galata</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ladieva</surname>
            <given-names>L</given-names>
          </string-name>
          .
          <article-title>Security Estimation of the Simulation Polygon for the Protection of Critical Information Resources</article-title>
          .
          <source>CEUR Workshop Proceedings, Selected Papers of the XVIII International Scientific and Practical Conference "Information Technologies and Security" (ITS</source>
          <year>2018</year>
          )
          <article-title>Kyiv</article-title>
          , Ukraine, November
          <volume>27</volume>
          ,
          <year>2018</year>
          , Vol-
          <volume>2318</volume>
          , - pp.
          <fpage>176</fpage>
          -
          <lpage>187</lpage>
          , urn:nbn:de:
          <fpage>0074</fpage>
          -
          <lpage>2318</lpage>
          -
          <fpage>4</fpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Korniyenko</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yudin</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galata</surname>
            <given-names>L</given-names>
          </string-name>
          .
          <article-title>Research of the Simulation Polygon for the Protection of Critical Information Resources</article-title>
          .
          <source>CEUR Workshop Proceedings, Information Technologies and Security, Selected Papers of the XVII International Scientific and Practical Conference on Information Technologies and Security (ITS</source>
          <year>2017</year>
          ), Kyiv, Ukraine, November
          <volume>30</volume>
          ,
          <year>2017</year>
          , Vol-
          <volume>2067</volume>
          , - pp.
          <fpage>23</fpage>
          -
          <lpage>31</lpage>
          , urn:nbn:de:
          <fpage>0074</fpage>
          -
          <lpage>2067</lpage>
          -
          <volume>8</volume>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Zhulynskyi</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ladieva</surname>
            ,
            <given-names>L. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korniyenko</surname>
            ,
            <given-names>B. Y.</given-names>
          </string-name>
          <article-title>Parametric identification of the process of contact membrane distillation</article-title>
          .
          <source>ARPN Journal of Engineering and Applied Sciences</source>
          , Volume
          <volume>14</volume>
          , Issue 17, pp.
          <fpage>3108</fpage>
          -
          <lpage>3112</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Galata</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korniyenko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <article-title>Research of the training ground for the protection of critical information resources by iRisk method</article-title>
          .
          <source>Mechanisms and Machine Science</source>
          , Volume
          <volume>70</volume>
          , pp.
          <fpage>227</fpage>
          -
          <lpage>237</lpage>
          , (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -13321-4_
          <fpage>21</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Korniyenko</surname>
            ,
            <given-names>B. Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borzenkova</surname>
            ,
            <given-names>S. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ladieva</surname>
            ,
            <given-names>L. R.</given-names>
          </string-name>
          <article-title>Research of three-phase mathematical model of dehydration and granulation process in the fluidized bed</article-title>
          .
          <source>ARPN Journal of Engineering and Applied Sciences</source>
          , Volume
          <volume>14</volume>
          , Issue 12, pp.
          <fpage>2329</fpage>
          -
          <lpage>2332</lpage>
          , (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kornienko</surname>
            ,
            <given-names>Y. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liubeka</surname>
            ,
            <given-names>A. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachok</surname>
            ,
            <given-names>R. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korniyenko</surname>
            ,
            <given-names>B. Y.</given-names>
          </string-name>
          <article-title>Modeling of heat exchangement in fluidized bed with mechanical liquid distribution</article-title>
          .
          <source>ARPN Journal of Engineering and Applied Sciences</source>
          , Volume
          <volume>14</volume>
          , Issue 12, pp.
          <fpage>2203</fpage>
          -
          <lpage>2210</lpage>
          , (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Bieliatynskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Osipa</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kornienko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <article-title>Water-saving processes control of an airport</article-title>
          .
          <source>Paper presented at the MATEC Web of Conferences</source>
          ,
          <volume>239</volume>
          , (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1051/matecconf/201823905003
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Korniyenko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Informacijni tehnologii' optymal'nogo upravlinnja vyrobnyctvom mineral'nyh dobryv</article-title>
          . K.:
          <article-title>Vyd-vo Agrar Media Grup (</article-title>
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Korniyenko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Osipa</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Identification of the granulation process in the fluidized bed</article-title>
          .
          <source>ARPN Journal of Engineering and Applied Sciences</source>
          Volume
          <volume>13</volume>
          , Issue 14, pp.
          <fpage>4365</fpage>
          -
          <lpage>4370</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Babak</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shchepetov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nedaiborshch</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Wear resistance of nanocomposite coatings with dry lubricant under vacuum</article-title>
          .
          <source>Scientific Bulletin of National Mining University Issue 1</source>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>52</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shymkovych</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ;
          <source>Hardware Implementation Neural Network Controller on FPGA for Stability Ball on the Platform 2nd International Conference on Computer Science</source>
          , Engineering and Education Applications,
          <string-name>
            <surname>ICCSEEA</surname>
          </string-name>
          <year>2019</year>
          ; Kiev; Ukraine; 26
          <source>January</source>
          <year>2019</year>
          -
          <volume>27</volume>
          <issue>January 2019</issue>
          (Conference Paper), Volume
          <volume>938</volume>
          ,pp.
          <fpage>247</fpage>
          -
          <lpage>256</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Arber</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Davey</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>The use of the CCTA risk analysis and management methodology CRAMM</article-title>
          .
          <source>Proc. MEDINFO92</source>
          , North Holland, pp.
          <fpage>1589</fpage>
          -
          <lpage>1593</lpage>
          . (
          <year>1992</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Ryabko</surname>
            <given-names>B.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monarev</surname>
            <given-names>V.A.</given-names>
          </string-name>
          <article-title>Using information theory approach to randomness testing</article-title>
          .
          <source>Journal of Statistical Planning and Inference</source>
          , Vol.
          <volume>133</volume>
          , № 1, pp.
          <fpage>95</fpage>
          -
          <lpage>110</lpage>
          , (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Chris</surname>
            <given-names>Clymer</given-names>
          </string-name>
          , Ken Stasiak, Matt Neely, Stephen Marchewitz. IRisk Equatuion Available via https://securestate.en/iRisk-Equation-Whitepaper.pdf
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>24. Common Vulnerability Scoring https://www.first.org/cvss/user-guide</mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Loch</surname>
            <given-names>K</given-names>
          </string-name>
          , Carr Houston, Warkentin M.
          <article-title>Threats to Information Systems: Today's Reality, Yesterday's Understanding</article-title>
          ,
          <source>Management Information Systems Quarterly 16.2;</source>
          (
          <year>1992</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <surname>McCue A</surname>
          </string-name>
          .
          <article-title>Beware the insider security threat</article-title>
          , CIO Jury; http://www.silicon.com/management/cio-insights/
          <year>2008</year>
          /04/17/bewaretheinsider-securitythreat-
          <volume>39188671</volume>
          / (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Howard</surname>
            <given-names>MD</given-names>
          </string-name>
          . LeBlanc, Writing Secure Code 2nd ed., Redmond, Washington: Microsoft Press; (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Rasmi</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jantan</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Attack Intention Analysis Model for Network Forensics</article-title>
          .
          <source>Software Engineering and Computer Systems;</source>
          <fpage>403</fpage>
          -
          <lpage>411</lpage>
          . (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Ben Arfa Rabai</surname>
            <given-names>L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jouini</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ben Aissa</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mili</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>A cybersecurity model in cloud computing environments</article-title>
          .
          <source>Journal of King</source>
          Saud University - Computer and Information Sciences;
          <volume>1</volume>
          :
          <fpage>63</fpage>
          -
          <lpage>75</lpage>
          . (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <given-names>Ben</given-names>
            <surname>Arfa Rabai</surname>
          </string-name>
          <string-name>
            <given-names>L</given-names>
            ,
            <surname>Jouini</surname>
          </string-name>
          <string-name>
            <given-names>M</given-names>
            ,
            <surname>Ben Aissa</surname>
          </string-name>
          <string-name>
            <given-names>A</given-names>
            ,
            <surname>Mili</surname>
          </string-name>
          <string-name>
            <surname>A..</surname>
          </string-name>
          <article-title>An economic model of security threats for cloud computing systems</article-title>
          .
          <source>International Conference on Cyber Security, Cyber Warfare and Digital</source>
          Forensic (CyberSec);
          <fpage>100</fpage>
          -
          <lpage>105</lpage>
          . (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>