<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Proceedings of SPIIRAS. -</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.15622/sp.39.1</article-id>
      <title-group>
        <article-title>Сoncept of Cyber Immunity of Industry 4.0</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sergei A. Petrenko</string-name>
          <email>S.Petrenko@rambler.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Krystina A. Makoveichuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexander V. Olifirov</string-name>
          <email>Alex.Olifirov@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Economics and Finance V.I. Vernadsky Crimean Federal University Yalta</institution>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Informatics and Information Technologies V.I. Vernadsky Crimean Federal University Yalta</institution>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Information Security Saint Petersburg Electrotechnical University "LETI" St. Petersburg</institution>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <volume>2</volume>
      <issue>39</issue>
      <fpage>93</fpage>
      <lpage>99</lpage>
      <abstract>
        <p>- The article presents the development of the concept of cyber immunity to protect the Industry 4.0 critical information infrastructure and the theory of self-healing machine computing. The specified theory is based on the results of the scientific-applied sections of biological and cybernetic immunology. In the developed concept it was taken into account that the neutralization of malicious influences should not lead to a denial of service for the entire system and to a loss of the functional semantics of calculations. Using interrelated probative, verification and testing programming, a model for restoring functional program specifications was developed. It was developed with separation by levels: semantic (functional, logical and algebraic models are defined to determine the base of functionally-logic specifications of programs); syntactic (defined models to form automatic machines for the detection and neutralization of malicious influences); semantically syntactic (models are defined for applying the simplest forms of program calculation semantics based on graphical, schematic, and network representations). In order to prove the correctness of functional semantics of the "cleared" calculations, a mathematical apparatus of the similarity theory and calculation dimensions were developed. The п-converter was identified; this operator allows forming the required "passports" of trusted computations in the conditions of disturbances. Calculations with "antibodies" are represented by regular schemes in the system of algorithmic algebras of V. M. Glushkov. A semantically controlled translator based on formal automata with abstract memory was developed for the interpretation of the input program of the trusted computations and type of actions.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>cyber immunity</kwd>
        <kwd>Industry 4</kwd>
        <kwd>0</kwd>
        <kwd>self-healing</kwd>
        <kwd>vulnerabilities</kwd>
        <kwd>antigens</kwd>
        <kwd>antibodies</kwd>
        <kwd>destructive code</kwd>
        <kwd>neutralization of malicious</kwd>
        <kwd>critical infrastructure</kwd>
        <kwd>functional semantics</kwd>
        <kwd>semanticsyntactic models</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>A fundamental contribution to the formation and
development of the theoretical and system programming was
made by the outstanding scientists from all over the world: A.
•
•
•
•
•
•
•</p>
      <p>
        However, in order to protect the critical information
infrastructure of the Industry 4.0 in the face of increasing threats
to information security, it was necessary to define the concept of
cyber immunity and develop a new theory of self-healing
machine computing [
        <xref ref-type="bibr" rid="ref10 ref11">13, 14</xref>
        ]. This new theory was enriched by
the results of the scientific-applied sections of biological (E.
Metchnikoff) (Figure 1, Figure 2), and cybernetic immunology
(A. Tarakanov, D. Hunt, D. Dasgupta, P. Andyus).
      </p>
      <p>Including under conditions of a priori uncertainty and
obfuscation of programs (Figure 3).</p>
      <p>In the mentioned theory, by analogy with classical
immunology (Figure 1, Figure 2), the antigen is understood to
be some destructive program code, and the antibody is a
synthesized metaprogram of this code neutralization. Model of
immune protection of Industry 4.0 describes the causal
relationship between "antigens" and "antibodies". That is,
between vulnerabilities and program defects (manifested in the
form of structural violations), modes of functioning (distorting
the properties of programs), security incidents, caused by the
destructive program tabs (changing the given standard
algorithms of calculations) and metaprograms for their
neutralization.</p>
      <p>Immune protection of Industry 4.0 includes three key
subsystems: Recognizer, Planner and Executor. Here, the
Recognizer is designed to recognize patterns (images) of
malicious code by its structural, correlation and invariants
features. The scheduler is intended for planning, i.e. creation of
corresponding plans and metaprograms of malicious code
neutralization. The executor is intended for execution of the
specified plans and metaprograms. As a result of these three
subsystems operation, the required "purification" and formation
of a trusted environment for calculations in the conditions of
heterogeneous mass cyber-attacks by malefactors takes place.</p>
      <p>
        Whereas the classical immunology neutralizes antigens by
physically destroying them (absorbing them), this is
unacceptable in cybernetic immunology. As far as the loss of a
part of the functional program code can lead to denial of service
and impossibility to continue calculations as a whole. That is
why it was demanded that the functional semantics of
calculations during the neutralization of malicious influences be
invariable (constant) [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref13 ref14 ref15 ref2 ref3 ref4">1-7, 13-18</xref>
        ]. Moreover, the critical
information infrastructure of Industry 4.0 must be able to
recover from both known and previously unknown attackers.
      </p>
      <p>Taking into account the requirements set forth above, we
present the main goals of the organization of self-recovering
trusted computations C1, C2 and C3 by the following display
 0 ÷  6 system (Figure 4).</p>
      <p>In order to reach these goals, a number of research objectives
were achieved. In particular, the model of restoration of
functional program specifications in the ideology of interrelated
probative, verification and testing programming has been
developed (Figure 4). Here, the probative programming allowed
us to study the correctness of computational structures,
correctness of computability properties and stability of
calculations. These aspects were modelled by denotation,
axiomatic and operational formal semantics of programs,
respectively.</p>
      <p>Thus for an establishment of conformity between their
functionally-logic specifications and physical design the
methods of annotated programs of N. Wirth, Ch. Hoare and E.
Dixtra were involved.</p>
      <p>
        In order to solve the specific problems of restoring the
functional specifications of programs, a corresponding model
basis was developed (Figure 5) [
        <xref ref-type="bibr" rid="ref1 ref11">1, 14</xref>
        ].
      </p>
      <p>Here, the level classification was made by analogy with the
classification of formal languages by N. Khomsky. In the
semantic class we chose models suitable for the construction of
calculations, in the syntactic class we chose models that allow
us to form automatic machines for the detection and
neutralization of malicious influences. The class of
semanticsyntactic models has allowed operating with the simplest forms
of program calculation semantics in an effective basis of models
types of graphical, schematic and network representation
(Figure 6). At the same time, the control flow graph (CFG),
Yanov schemata and Petri nets were chosen to specify the model
basis.</p>
      <p>
        As a result, the following architecture of the neutralization
system of malware and malicious software bookmarks was
proposed (Figure 7) [
        <xref ref-type="bibr" rid="ref10 ref11 ref3 ref4">3-5, 13, 14</xref>
        ].
      </p>
      <p>In order to prove the correctness of functional semantics of
the "cleared" calculations, a mathematical apparatus of the
similarity theory and calculation dimensions were developed. In
particular, the direct similarity theorem, which allows
establishing the general scheme of representation of
semantically correct calculations in the invariant
(dimensionless) form, is formulated and proved
(    11 0 ,   22 0 , … ,       0 , П1 , П2 , … , П −1 = 0,
where
 1 ,  2 , … ,       0 - similarity invariants of calculations.
 1 0  2 0</p>
      <p>The direct similarity theorem allowed proving the statements
about the necessary and sufficient similarity conditions of
semantically correct calculations
 ( +1) =  1(П11, … , П( 1−1);  1 0
 1 , … ,      0)
⎧ ( +1) 0
⎪
 ( +2) =  2(П12, … , П( 2−1);  1 0
 1 , … ,      0)
⎨ ( +2) 0
⎪    =   (П1 , … , П(  −1);  1 0
 1 , … ,      0)
⎩    0
where
П1 =  1 ⁄ 1 , П2 =  2 ⁄ 2 , … , П −1 =    ⁄  
similarity invariants,
   - multipliers of similarity ratios transformation,
  - functions of all or some relative data.</p>
    </sec>
    <sec id="sec-2">
      <title>Example.</title>
      <p>For the assignment operator A ≔ B ∗ C + DE + 1, the
following relations must be performed between the abstract
dimensions of the parameters (A, B, C, D, E, CONST_1):
(1)
(2)
(3)
(1) ∗  [ ] + (−1) ∗  [ ] + (−1) ∗  [ ] = 0,
(1) ∗  [ ] + (−1) ∗  [ ] + (1) ∗  [ ] = 0,
(1) ∗  [ ]1 + (−1) ∗  [  1]1 = 0.</p>
      <p>The received relations allow defining unequivocally the
standard (or passport) of semantically correct calculation. The
calculation is semantically correct if the corresponding system
of dimension equations has at least one component consisting of
all non-zero components among the set of vectors-solutions.</p>
      <p>Let us suppose that this is not the case, and among these
parameters there appeared a parameter identically equal to zero
at any values of other parameters. This indicates that the new
parameter is dimensionless. However, it is impossible because it
contradicts the initial condition of semantic correctness of
calculations, which was to be proved.</p>
      <p>Also, a п-converter was identified; this operator allows
forming the required "passports" of trusted computations in the
conditions of disturbances.</p>
      <p>Statement 1: Operator F is a п-converter if for each object
   ∈  and each element   ∈   of the finite abelian
subgroup the ratio of
=  ∗     −1,  = 1, 2, … , 
(4)</p>
      <p>Let F is п-converter and F* is corresponding mapping in the
subgroup   .</p>
      <p>Let us assume that the objects to be compared are equivalent.
 ∗     
is true.</p>
    </sec>
    <sec id="sec-3">
      <title>Proof.</title>
      <p>Then</p>
      <p>=     ,  = 1, 2, … , 
or in terms of mapping
 ∗     
    
=  ∗   
   ,  = 1, 2, … , 
Apply now to the left and right parts of this equality the
 ∗ (   )−1,  ∗ (   )−1 ∗     
     =
=  ∗ (   )−1 ∗   
  
=    ,  = 1, 2, … , 
based on the property of the existence of the group unit
 ∗ (   )−1 ∗        =  ,  = 1, 2, … , 
multiplying on the left by  ∗ (   ), get</p>
      <p>∗        =  ∗    ,  = 1, 2, … , 
multiplying on the right  −1, find the required ratio
 ∗</p>
      <p>=  ∗     −1,  = 1, 2, … ,</p>
      <sec id="sec-3-1">
        <title>The converse holds true.</title>
        <p>As a result, the following conclusions can be drawn:
- п-converter is a mapping of a reference pair
- Set of standards M0 represents a set of objects (similarity
invariants), which do not change values of their information
signs under the action of п-converter F, i.e.</p>
        <p>- With the help of п-converter F and the corresponding
mapping
 :</p>
        <p>→  0</p>
        <p>=    ,
 ∗: 
→  
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)</p>
        <p>one can find the transformation g, which connects two
equivalent objects   1 and   2so that  =  (  2)−1 (  1).</p>
        <p>
          It is essential that a multi-model approach was proposed
solving the task of synthesizing programs of trusted
computations which allowes describing abstract programs of the
trusted computations in structural-functional, logical-semantic
and computational-operational aspects [
          <xref ref-type="bibr" rid="ref11 ref5 ref6 ref7 ref8 ref9">8-12, 14</xref>
          ]. Such a
multimodel organization of calculations required the introduction of
coordination, allowing taking into account the specifics and
features of each named functional model of calculations. This
has led to the need to build an appropriate knowledge
metamodel. As basic models in the knowledge system it was
proposed to use formal grammar, production system, automatic
converter.
        </p>
        <p>When choosing a meta-modeling apparatus, preference was
given to the system of algorithmic algebras (SAA) proposed by
academician V. M. Glushkov. This made it possible to create an
algorithmic system equivalent in its visual capabilities to such
classical algorithmic systems as Turing machines, Post products
and Markov algorithms. Besides, the advantage of SAA is the
possibility to express structures of abstract programs of trusted
calculations in a strict basis of Dijkstra types (sequence,
branching, cycle) in the form of corresponding algebraic
formulas. This allowed developing a multi-faceted algebraic
system of the form &lt;  ,  &gt; with a signature of operations ∆,
where A is a set of operators; L is a set of logical conditions
taking values from a set of {true, false, uncertain}. Here, the
signature ∆= ∆1 ∪ ∆2consists of a system of ∆1 logical
operations that take on a value in a variety of conditions L and a
system of ∆2 operations that take on values in a variety of
operators A.</p>
        <p>In SAA &lt;  ,  &gt; the system of forming ∐ is fixed. It is the
final functionally complete set of operators and logical
conditions. With the help of this set and by means of
superposition of operations included in ∆, arbitrary operators
and logical conditions of the set A and L are generated. The
logical operations of the system ∆1 include generalized Boolean
operations of disjunctions, conjunctions, and negation, as well
as the operation of left multiplication of the condition by the
operator  =  and filtration. The following operations belong
to the ∆2 set: composition of operators  ∗  , sequential
execution of operators A and L, α - disjunction of operators,
alternative execution of operators A and L, i.e.</p>
        <p>( ∨  ) =  ̀ ,   = 1;
 ( ∨  ) =  ,   = 0;
 ( ∨  ) = J ,   =  .
(14)</p>
        <p>Here, the α-iteration of operator A under the condition   { }
consists in checking the condition α, if this condition is false,
then the execution of operator A is performed.</p>
        <p>It should be noted that such a representation &lt;  ,  &gt; allows
developing effective regularization procedures (reduction to a
regular scheme (RS))  (∐) and prove the theorem, which
defines the principal possibility of a formal description of an
arbitrary and reconstructed algorithm and procedure of trusted
calculations in RS.</p>
        <p>Thus, it is possible to formally describe the declarative,
technological and procedural knowledge of trusted
computations in the form of regular schemes.</p>
        <p>Statement 2. Calculations with "antibodies" are represented
by regular schemes in the system of algorithmic algebras (SAA)
of V. M. Glushkov.</p>
        <p>The modified technique of a composite programming
allowed determining the effective sequence of operations of
trusted calculations. For each operator's construction there were
given operations and operands that make up the program of
trusted calculations. After checking the completeness of this
program for compliance with the selected criteria, an executable
program of trusted calculations was synthesized (Figure 8).</p>
        <p>A semantically controlled translator based on formal
automata with abstract memory (AAM) was developed for the
interpretation of the input program of the trusted computations
and type of actions (Figure 9). The AAM consists of four elastic
belts (EB), which contain:
•
•
•</p>
      </sec>
      <sec id="sec-3-2">
        <title>Messages of functional automatons;</title>
      </sec>
      <sec id="sec-3-3">
        <title>Reports of identified software bookmarks;</title>
        <p>Neutralization and countermeasures scenarios;
• Information messages of the broadcast procedures’
completion.</p>
        <p>The following significant results have been obtained in the
course of the concept development.
Theoretical results:
1. Scientific-methodological apparatus of computer
immunology of cyber-security based on the mechanisms of
"immune response" and "immune memory" of classical
immunology.</p>
        <p>2. Methodology of self-recovery of trusted machine
calculations with the required functional semantics of
calculations.</p>
      </sec>
      <sec id="sec-3-4">
        <title>Scientific and practical results:</title>
        <p>•
•
•
•</p>
        <p>Approach to deobfuscation and normalization of logical
structures of calculations using a system of equivalent
transformations of Janov's schemes.</p>
        <p>Method of combined verification of semantics of
calculations on the basis of similarity invariants and
provocative load testing.</p>
        <p>Methods of generating trusted program algorithms on the
basis of synthesis of calculations in the system of
algorithmic algebra and scenarios of permits.</p>
        <p>Computer immunology technology for cybersecurity and
private methods of detecting and neutralizing destructive
software bookmarks and program vulnerabilities.
[7] Biryukov D.N, Rostovtsev Yu.G. Approach to constructing a consistent
theory of synthesis of scenarios of anticipatory behavior in a conflict //
Proceedings of SPIIRAS. - 2015. - Issue. 1 (38). - P. 94-111. DOI:
http://dx.doi.org/10.15622/sp.38.6</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Ashby</surname>
            <given-names>W.R.</given-names>
          </string-name>
          (
          <year>1991</year>
          )
          <article-title>Principles of the Self-Organizing System</article-title>
          .
          <source>In: Facets of Systems Science. International Federation for Systems Research International Series on Systems Science and Engineering</source>
          , vol
          <volume>7</volume>
          . Springer, Boston, MA. DOI: https://doi.org/10.1007/978-1-
          <fpage>4899</fpage>
          -0718-9_
          <fpage>38</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V.L. Methodological</given-names>
          </string-name>
          <article-title>Framework for Analysis and Synthesis of a Set of Secure Software Development Controls</article-title>
          ,
          <source>Journal of Theoretical and Applied Information Technology</source>
          ,
          <year>2016</year>
          , vol.
          <volume>88</volume>
          , No 1, pp.
          <fpage>77</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Biryukov</surname>
            <given-names>D.</given-names>
          </string-name>
          <article-title>N Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems /</article-title>
          / Proceedings of SPIIRAS. -
          <year>2015</year>
          . - Issue.
          <volume>3</volume>
          (
          <issue>40</issue>
          ). - C.
          <fpage>55</fpage>
          -
          <lpage>76</lpage>
          . DOI: http://dx.doi.org/10.15622/sp.40.5
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Biryukov</surname>
            <given-names>D.N</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lomako</surname>
            <given-names>A. G</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrenko</surname>
            <given-names>S. A.</given-names>
          </string-name>
          <article-title>Generating scenarios for preventing cyber attacks // Protecting information</article-title>
          .
          <source>Inside</source>
          .
          <article-title>-</article-title>
          <year>2017</year>
          . - No.
          <volume>4</volume>
          (
          <issue>76</issue>
          ). (In Russian).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Gruber</surname>
            <given-names>T.</given-names>
          </string-name>
          <article-title>A translation approach to portable ontology specifications</article-title>
          . // Knowledge Acquisition,
          <year>1993</year>
          , V. 5,
          <string-name>
            <surname>I.</surname>
          </string-name>
          <year>2</year>
          , pp.
          <fpage>199</fpage>
          -
          <lpage>220</lpage>
          . DOI:
          <volume>10</volume>
          .1006/knac.
          <year>1993</year>
          .
          <volume>1008</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Gruber</surname>
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Toward</surname>
          </string-name>
          <article-title>Principles for the Design of Ontologies Used for Knowledge Sharing</article-title>
          ? // International Journal Human-Computer
          <string-name>
            <surname>Studies</surname>
          </string-name>
          ,
          <year>1995</year>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <year>43</year>
          , I. 5-
          <issue>6</issue>
          , pp.
          <fpage>907</fpage>
          -
          <lpage>928</lpage>
          . DOI:
          <volume>10</volume>
          .1006/ijhc.
          <year>1995</year>
          .
          <volume>1081</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Guarino</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musen</surname>
            <given-names>M.</given-names>
          </string-name>
          <article-title>Applied ontology: The next</article-title>
          decade begins // Applied Ontology.
          <article-title>-</article-title>
          <year>2015</year>
          . - V.
          <volume>10</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . DOI:
          <volume>10</volume>
          .3233/AO150143.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Kotenko</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          <article-title>Intelligent mechanisms of cybersecurity management // In Risk and security management</article-title>
          .
          <source>Proceedings of the Institute of System Analysis of the Russian Academy of Sciences</source>
          ,
          <year>2009</year>
          , Vol.
          <volume>41</volume>
          , pp.
          <fpage>74</fpage>
          -
          <lpage>103</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Nardi</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Falbo</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Almeida</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guizzardi</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pires</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sinderen</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guarino</surname>
            <given-names>N.</given-names>
          </string-name>
          <article-title>An Ontological Analysis of Value Propositions</article-title>
          .
          <source>Published in: Enterprise Distributed Object Computing Conference (EDOC)</source>
          ,
          <source>2017 IEEE 21st International. Quebec City</source>
          ,
          <string-name>
            <surname>QC</surname>
          </string-name>
          , Canada,
          <fpage>10</fpage>
          -
          <lpage>13</lpage>
          Oct.
          <year>2017</year>
          , pp.
          <fpage>184</fpage>
          -
          <lpage>193</lpage>
          . DOI:
          <volume>10</volume>
          .1109/EDOC.
          <year>2017</year>
          .
          <volume>32</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Petrenko</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrenko</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makoveichuk</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chetyrbok</surname>
            ,
            <given-names>P.V.</given-names>
          </string-name>
          <article-title>Protection model of PCS of subway from attacks type «wanna cry», «petya» and «bad rabbit» IoT, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus</article-title>
          ),
          <year>2018</year>
          , pp.
          <fpage>945</fpage>
          -
          <lpage>949</lpage>
          . DOI:
          <volume>10</volume>
          .1109/EIConRus.
          <year>2018</year>
          .8317245
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Petrenko</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makoveichuk</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          <article-title>Ontology of cyber security of selfrecovering smart Grid</article-title>
          <source>In CEUR Workshop Proceedings</source>
          ,
          <year>2017</year>
          , Vol-
          <volume>2081</volume>
          , pp.
          <fpage>98</fpage>
          -
          <lpage>106</lpage>
          . http://ceur-ws.
          <source>org/</source>
          Vol-2081/paper21.pdf
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Pospelov</surname>
            <given-names>D. A.</given-names>
          </string-name>
          <article-title>The modeling of reasoning. Experience in the analysis of mental acts</article-title>
          . - M .:
          <article-title>Radio and communication</article-title>
          . -
          <source>1989</source>
          . - 184 p.
          <article-title>(In Russian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Leontiev</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gordeev</surname>
            <given-names>E</given-names>
          </string-name>
          .
          <source>On the Algebraic Immunity of Coding Systems. Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          ,
          <year>2019</year>
          , No
          <volume>1</volume>
          (
          <issue>29</issue>
          ), pp.
          <fpage>59</fpage>
          -
          <lpage>68</lpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          -3456-2019-1-
          <fpage>59</fpage>
          -68.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Pospelov</surname>
            <given-names>D. A.</given-names>
          </string-name>
          <string-name>
            <surname>Thinking</surname>
          </string-name>
          and automatons. - Moscow: Soviet radio.
          <source>- 1972</source>
          . - 224 p.
          <article-title>(In Russian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Sheremet</surname>
            <given-names>I. A.</given-names>
          </string-name>
          <string-name>
            <surname>Augmented Post</surname>
          </string-name>
          <article-title>Systems: The Mathematical Framework for Data and Knowledge Engineering in Network-centric Environment</article-title>
          . Berlin,
          <year>2013</year>
          . 395 p.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>