<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Criterion Of Cyber-Physical Systems Sustainability</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Evgeny Pavlenko</string-name>
          <email>pavlenko@ibks.spbstu.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Higher School of Cybersecurity and Information Security Peter the Great St. Petersburg Polytechnic University Saint-Petersburg</institution>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>60</fpage>
      <lpage>64</lpage>
      <abstract>
        <p>-The article proposes a sustainability criterion for cyber-physical systems. The concept of information security for cyber-physical systems has been transformed due to the specifics of these systems. Cyber-physical systems combine information and physical processes, which requires the creation of new approaches to ensure their security. The sustainability property for such systems shows their ability to maintain correct functioning under cyber-attacks. The criterion proposed in the article uses the representation of the structure of the cyberphysical system in the form of a graph, where the processes performed by the system are reflected in the form of routes. In proposed approach sustainability criterion is the number of routes of a certain quality, which allow to perform the objective function. Such a representation of the system and the objective function provides convenient modeling of possible ways to rebuild routes. Attacking impacts and system restoration measures that prove the applicability of the criterion for assessing the sustainability of cyber-physical systems are considered.</p>
      </abstract>
      <kwd-group>
        <kwd>sustainability</kwd>
        <kwd>cyber sustainability</kwd>
        <kwd>cyber resilience</kwd>
        <kwd>cyber-physical system</kwd>
        <kwd>information security</kwd>
        <kwd>graph theory</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>modeling</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>
        Cyber-physical systems (CPS) is a technological concept,
which provides a close coordination between computing and
physical resources. In general, CPS support the maintenance of
real world processes using regular monitoring and a feedback
loop [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. As a result, physical processes influence on
information processes and vice versa.
      </p>
      <p>
        Vivid examples of CPS are industrial systems associated
with critical areas of human activity [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. Unauthorized
interference with such systems can lead to disastrous
consequences; therefore, the question about CPS security is
extremely important nowadays.
      </p>
      <p>
        The close integration of physical and information processes
leads to the fact that CPS security do not provide by classical
concepts of confidentially, integrity and availability of
information circulated in system [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The CPS protection from
destructive impact is also important, since the physical
processes implemented by system are irreversible. In this
regard, the problem of maintaining the functional sustainability
      </p>
      <p>The study was carried out as part of the scholarship of the President of the
Russian Federation to young scientists and graduate students SP-1689.2019.5.
of CPS in the context of destructive interventions comes to the
fore.</p>
      <p>II.</p>
      <p>
        There are many approaches to maintain sustainability of
CPS [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref22 ref8 ref9">8-19, 22</xref>
        ]. One of promising approach uses a biology
concept of homeostasis – mechanism that provide constancy of
internal organism processes. This approach provides adaptation
and self-regulation mechanisms of complex dynamic systems.
Such features of the approach allow autonomous control and
maintenance of the state of the system. Homeostatic approach
for CPS was proposed in [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ] as an ability of
selfadaptation. However, authors of these papers were focused on
the operation correctness, but not on security aspects.
Moreover, proposed model is not applicable because of high
monitoring algorithm complexity in case of large dynamic
systems. One more paper [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] focused from self-adaptive
architectures to self-learning architectures to learn and improve
QoS parameters over a time. However, such approach do not
take into account structural parameters of CPS, but only time
series and data stream.
      </p>
      <p>
        Thus, due to dynamic behavior of CPS, homeostatic
strategy can be separate on three stages: system monitoring,
sustainability estimating and making decision to system
recovery. To implement this strategy, a method is needed to
evaluate the sustainability of the CPS at the current time, as
well as to predict the maximum destructive load, which will
lead to a complete loss of system functionality. Thus, second
stage can be realized by different methods using mathematical
statistics, game theory and so on. Paper [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] proposed novel
algorithm for estimation of system state that resilient to
different types of attacks. Proposed method uses principles of
robust optimization and give a “frequentist” robust estimator.
However, such method do not take into account structure of the
CPS which can be represented as a network of devices. Paper
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] proposed game-theoretic concept to estimating system
sustainability. This approach defined sustainability as
powerform product of the survival probabilities of cyber and physical
spaces, each with a corresponding correlation coefficient. Such
method do not take into account a structure of the system and
might not be as flexible as it needed for providing
cybersecurity. Paper [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] proposes methodology to estimate
environmental sustainability of CPS. This approach is scalable,
economic perspective, however due to simplifications some
failures can be missed. In addition, this method do not consider
structural features of heterogeneous systems. In [
        <xref ref-type="bibr" rid="ref17 ref19">17, 19</xref>
        ]
authors proposed to estimate CPS as rate of system recovery,
however this method is posteriori, so this model allow only
restoring system after destructive influences.
      </p>
      <p>III.</p>
      <p>APPROACH TO CPS SECURITY</p>
      <p>
        Homeostasis strategy was applied to security of CPS in
[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. The method of estimating CPS sustainability is
determined by the way the system is presented and simulated.
In case of CPS, one of the most common is a model based on
graph theory. Graph theory allows us to consider not only the
network of devices within an integrated CPS, but also the
interaction of CPS components with each other. Since the
processes in the CPS are carried out by exchanging data
between devices, each process can be represented as a route on
a graph. The presence of a large number of such routes, as well
as their quality, determine the system's ability to function,
thereby giving an assessment of its stability.
      </p>
      <p>
        Paper [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] proposed graph model, according to which CPS
is a graph G=&lt;V, E&gt;, where V={v1,v2,…,vn} − is set of graph
vertices representing the devices, and E={e1,e2,…,en} − set of
edges representing connections between system components.
      </p>
      <p>Each vertex is characterized by a tuple, which contains the
characteristics, depending on its type. The important parameter
of vertex is capacity of device performance(vi), where i is the
node identifier. In addition to typical parameters, each vertex
corresponds to a set of functions that it can perform
F(vi)=(f1,f2,…,fk). The set of functions that can be performed by
components of the CPS is not homogeneous: it can include
both trivial and more complex in terms of function
implementation. Therefore, it is advisable to enter a measure
for each of the functions that determines its complexity fi→
complexity(fi). Knowing the node performance and the
complexity of the functions it performs, you can find the
execution time of the function fj on the device vi through the
equation (1).</p>
      <p>time(vi, fj)= complexity(fj)/ performance(vi)
(1)</p>
      <p>Each edge also has a parameter characterizing the data rate
between vertices vi and vj: time(vi, vj).</p>
      <p>A process running in a CPS is characterized by a sequence
of functions that are performed by the vertices of the graph
Rprocess={f1,f2,…,fm}. It should be noted that complex functions
can be decomposed as a sequence of simpler ones, which
allows to effectively reconfigure the route in terms of
destructive effects. This fact, as well as the fact that each
function can correspond to several vertices of the graph with
different performance, leads to the fact that each processi in the
CPS corresponds to a set of working routes pathj from Rprocess
differing in their characteristics.</p>
      <p>As parameters of the routes, it is proposed to consider:
 route length.
 total route complexity.
 total route performance.
 time of route execution.



 energy characteristics of the vertex, determined by
device type.</p>
      <p>Thus, when calculating the characteristics of the route, all
connections between the components of the system are taken
into account, as well as the characteristics of the vertices that
perform the functions included in the process. Intermediate
nodes are not counted in the summation.</p>
      <p>The presence of high-quality routes, for example, with a
short execution time, determines the stability of the CPS in
terms of destructive influences, since the reduction of such
routes will lead to system downtime, which can lead to failures
and of the target function - that is, to lose sustainability.</p>
      <p>IV.</p>
    </sec>
    <sec id="sec-2">
      <title>ESTIMATING OF SUSTAINABILITY AREA</title>
      <p>
        To estimate the CPS sustainability, the information system
was modeled as a graph. The graph was constructed using
Erdos-Renyi model [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] with the number of nodes equal to 30,
and the probability, and the probability of edge appearance
equal to 0.35. Each vertex of the graph was mapped:
set functions that the vertex can perform and its
complexity.
      </p>
      <p>performance of the device.</p>
      <p>time of function execution of the device.</p>
      <p>Each edge is associated with a time rate between vi and vj
time: time(vi, vj).</p>
      <p>While ensuring the CPS security, important parameters are
times of attacks detection and CPS rebuilding to neutralize
destructive impacts. Therefore, as the characteristics of the
quality of the route were chosen the time of the route execution
and its total performance.</p>
      <p>As a part of study, a working route was defined,
represented as a sequence of functions. To estimate CPS
sustainability an algorithm was developed that performs a
search for various routes on a graph, including a sequence of
vertices that perform functions from the working route. The
characteristics of the intermediate vertices were not taken into
account. For each route found, time and performance were
calculated. The bar plot for the values obtained are shown in
Fig. 1.</p>
      <p>To estimate the number of routes depending on the time of
their execution, a cumulative function was built (Figure 2). The
argument of this function is an ordered set of time values, and
the function values are the number of routes that have a time
execution less than the value of the argument. Thus, judging
from Fig. 2, the number of routes that have an execution time
less than 19 is approximately 100,000.</p>
      <p>In a case of performance estimation, the best quality route
will have a large total performance value. Therefore, the
cumulative function for the performance of routes is
constructed as follows: the number of routes whose
performance is greater than the value of the performance taken
as the value of function (Fig. 3).</p>
      <p>For further analysis, the normalization of the values of
performance and execution time of the route was carried out.
The graphs for both characteristics were combined, and then
the intersection point was found (Fig.4).</p>
      <p>The left area of the graph corresponds to routes with lowest
performance; the right area corresponds to routes with longest
execution time. Thus, routes in the middle part of plot on Fig. 4
can be interpreted as area of system sustainability. It is
proposed to limit the sustainability area by symmetric intervals
of length 0.25 from the intersection point. The right boundary
refers to the execution time of the routes — that is, routes from
the sustainability area should not run for longer than a certain
time. The left border, respectively, refers to route performance.</p>
      <p>For fix values of execution time and performance of
working route on x axis the number of routes suites to such
characteristics was calculated. The largest value observed at the
intersection point of two curves (Fig. 5). Since the number of
routes is also a quality criterion, to limit the area of
sustainability, it is proposed to cut off a part with
characteristics for which the number of routes is less than
20,000.</p>
      <p>Thus, the paper proposed the criterion for CPS
sustainability, which is number of working routes in system
with optimal values of execution time and performance. In
order to check the applicability of the criterion, it is necessary
to simulate destructive influences and to check reaction of
criterion to changes in system structure.</p>
    </sec>
    <sec id="sec-3">
      <title>SIMULATING IF DESTRUCTIVE INFLUENCES</title>
      <p>As part of the study, an attack was modeled, consisting in
sequential removal of half of the vertices. For the resulting
graph, number of routes was calculated, characteristics of time
and performance that was in area of the system sustainability
(Fig. 6).</p>
      <p>The second model of the attack influence is to delete the
vertex, which has a certain degree of criticality. As an indicator
of the vertex criticality, is it proposes to use the ratio of
working routes number passing through the vertex to the total
number of working routes. Number of routes depending on
criticality of deleted vertex was evaluated for fixed values of
execution time and performance of routes (Fig. 7).</p>
      <p>As experiments show, at a certain criticality of vertex,
number of routes in the sustainability area reaches zero, which
indicates the complete inability of system to function along a
given sequence of functions.</p>
      <p>During the simulation of attacking influences, proposed
criterion of sustainability showed high sensitivity to structural
changes in CPS.</p>
      <p>VI.</p>
      <p>APPROACH TO SYSTEM RECOVERY</p>
      <p>Taking into account the proposed criterion, recovery of
system functionality is reduced to problem of changing the
graph in such a way that number of routes satisfying the given
characteristics increases. An increase in the number of routes is
possible through implementation of various scenarios:


</p>
      <p>Rebuilding and reconfiguration of CPs to improve the
graph connectivity, which will lead to emergence of
new routes or change their length.</p>
      <p>Definition of new sequence of performing target
function due to possibility of representing the functions
as a decomposition of other functions.</p>
      <p>Improving device characteristics, in particular,
increasing the performance of certain type devices.</p>
      <p>The tasks of reconfiguring the network structure and setting
new routes can be associated with high computational costs for
implementing mathematical algorithms, as well as time costs
for rebuilding the system, which can lead to system downtime
and, consequently, affect the speed of the target function.
Therefore, these methods are recommended in most serious
cases. The approach of changing the characteristics of devices
implies the allocation of additional resources to increase
devices performance.</p>
      <p>Obviously, due to varying complexity of functions
performed by devices, an increase in performance of different
types of vertices affect the number of suitable routes in
different ways. As part of the work, an experiment consists in
increasing performance of certain type vertex twice, was
conducted. Results are presented in Figure 8.</p>
      <p>Abscissa axis indicates type of functions that can be
performed by system components, arranged in order of
increasing complexity. The first point on the plot corresponds
to the initial value of number of routes in graph without
changing the performance of devices of a particular type.</p>
      <p>It should be noted that in Figure 8, the observed linear
relationship is determined by the fact that the sequence of
functions includes all the functions performed by system. If,
however, we increase length of working route and duplicate
occurrence of f3 function, then a small jump will be observed
precisely with an increase in performance of devices
implementing this function, as shown in Fig. 9.</p>
      <p>Thus, for effective CPS recovery and increasing number of
suitable routes that satisfy the specified characteristics, it is
necessary to give preference to types of devices that perform
more complex functions if the ratio of functions of different
types in a given sequence is approximately the same.</p>
      <p>CPS security reduces to maintaining system sustainability.
For solving this problem criterion on sustainability is needed.
This criterion should take into account not only information
and physical parameters of system devices, but also structural
characteristics of CPS network.</p>
      <p>Using graph representation of CPS, the processes in the
system can be represented as a set of routes that include a given
sequence of vertices, each of which performs set of specific
functions. Mapping set of qualitative characteristics to vertices
and connections, leads to simple evaluating the optimality of
the route as total value of vertices and links characteristics
containing in the route.</p>
      <p>Thus, number of routes with optimal value of quality
characteristics determines sustainability of CPS. Applicability
of this criterion was verified by modeling destructive effects, as
a result of which proposed sustainability assessment
demonstrated high sensitivity to changes in the graph
describing CPS.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lavrova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Poltavtseva</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Shtyrkina, “
          <article-title>Security analysis of cyberphysical systems network infrastructure</article-title>
          ,
          <source>” IEEE Industrial CyberPhysical Systems (ICPS)</source>
          , pp.
          <fpage>818</fpage>
          -
          <lpage>823</lpage>
          , May
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .1109/ICPHYS.
          <year>2018</year>
          .
          <volume>8390812</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Zegzhda</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasilev</surname>
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poltavtseva</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kefele</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borovkov</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Advanced Production Technologies Security in the Era of Digital Transformation</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          ,
          <year>2018</year>
          , No
          <volume>2</volume>
          (
          <issue>26</issue>
          ), pp.
          <fpage>2</fpage>
          -
          <lpage>15</lpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          -3456-2018-2-2-15.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Kotenko</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levshun</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chechulin</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ushakov</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <article-title>Krasov A. Integrated Approach to Provide Security of Cyber-Physical Systems Based on Microcontrollers</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          ,
          <year>2018</year>
          , No
          <volume>3</volume>
          (
          <issue>27</issue>
          ), pp.
          <fpage>29</fpage>
          -
          <lpage>38</lpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          -3456-2018-3-
          <fpage>29</fpage>
          -38.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N.</given-names>
            <surname>Sadiku</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cui</surname>
          </string-name>
          , M. Musa, “
          <article-title>Cyber-physical systems: a literature review</article-title>
          ,
          <source>” European Scientific Journal</source>
          , vol.
          <volume>13</volume>
          , num. 36, pp.
          <fpage>52</fpage>
          -
          <lpage>58</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1142/S2424862217500129.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D. P. F.</given-names>
            <surname>Möller</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Vakilzadian</surname>
          </string-name>
          , “
          <article-title>Cyber-physical systems in smart transportation</article-title>
          ,”
          <source>2016 IEEE International Conference on Electro Information Technology (EIT)</source>
          ,
          <source>Grand Forks, ND</source>
          , pp.
          <fpage>0776</fpage>
          -
          <lpage>0781</lpage>
          .
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .1109/EIT.
          <year>2016</year>
          .
          <volume>7535338</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>O.</given-names>
            <surname>Givehchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Landsdorf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Simoens</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. W.</given-names>
            <surname>Colombo</surname>
          </string-name>
          , “
          <article-title>Interoperability for Industrial Cyber-Physical Systems: An Approach for Legacy Systems</article-title>
          ,
          <source>” IEEE Transactions on Industrial Informatics</source>
          , vol.
          <volume>13</volume>
          ,
          <issue>num</issue>
          . 6, pp.
          <fpage>3370</fpage>
          -
          <lpage>3378</lpage>
          , Dec.
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1109/TII.
          <year>2017</year>
          .
          <volume>2740434</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ashibani</surname>
          </string-name>
          and
          <string-name>
            <given-names>Q. H.</given-names>
            <surname>Mahmoud</surname>
          </string-name>
          , “
          <article-title>Cyber physical systems security: Analysis, challenges</article-title>
          and solutions,”
          <source>Computers &amp; Security</source>
          , vol.
          <volume>68</volume>
          , pp.
          <fpage>81</fpage>
          -
          <lpage>97</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1016/j.cose.
          <year>2017</year>
          .
          <volume>04</volume>
          .005.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Marquis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Rainey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kimpel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ghiorzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Cricchi</surname>
          </string-name>
          , N. Bezzo, “
          <article-title>Toward attack-resilient state estimation and control of autonomous cyber-physical systems,” 2018 Systems and Information Engineering Design Symposium (SIEDS), Charlottesville</article-title>
          , VA, pp.
          <fpage>70</fpage>
          -
          <lpage>75</lpage>
          .
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .1109/SIEDS.
          <year>2018</year>
          .
          <volume>8374762</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>I.</given-names>
            <surname>Kolosok</surname>
          </string-name>
          and E. Korkina, “
          <article-title>Cyber resilience of SCADA at the level of energy facilities,” V-th International workshop " Critical infrastructures: Contingency management, Intelligent, Agent-based, Cloud computing and Cyber security" (IWCI 2018)</article-title>
          , vol.
          <volume>158</volume>
          , pp.
          <fpage>100</fpage>
          -
          <lpage>105</lpage>
          .
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .2991/iwci-
          <fpage>18</fpage>
          .
          <year>2018</year>
          .
          <volume>18</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Voropai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Kolosok</surname>
          </string-name>
          and E. Korkina, “
          <article-title>Resilience Assessment of the State Estimation Software under Cyber Attacks,” E3S Web of Conferences</article-title>
          , vol.
          <volume>58</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . 2018 DOI: 10.1051/e3sconf/20185802013.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I.</given-names>
            <surname>Gerostathopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Skoda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Plasil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Bures</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Knauss</surname>
          </string-name>
          , “
          <article-title>Architectural Homeostasis in Self-Adaptive Software-Intensive CyberPhysical Systems</article-title>
          ,” Tekinerdogan
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Zdun</surname>
          </string-name>
          <string-name>
            <given-names>U.</given-names>
            ,
            <surname>Babar</surname>
          </string-name>
          <string-name>
            <surname>A</surname>
          </string-name>
          . (
          <article-title>eds) Software Architecture</article-title>
          .
          <source>ECSA 2016. Lecture Notes in Computer Science</source>
          , vol
          <volume>9839</volume>
          , pp.
          <fpage>113</fpage>
          -
          <lpage>128</lpage>
          ,
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -48992-
          <issue>6</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>I.</given-names>
            <surname>Gerostathopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Bures</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hnetynka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Keznikl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Plasil</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Plouzeau</surname>
          </string-name>
          , “
          <article-title>Self-adaptation in software-intensive cyber-physical systems: From system goals to architecture configurations</article-title>
          ,
          <source>” Journal of Systems and Software</source>
          ,vol.
          <volume>122</volume>
          , pp.
          <fpage>378</fpage>
          -
          <lpage>397</lpage>
          ,
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .1016/j.jss.
          <year>2016</year>
          .
          <volume>02</volume>
          .028.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>H.</given-names>
            <surname>Muccini</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Vaidhyanathan</surname>
          </string-name>
          ,
          <string-name>
            <surname>“</surname>
          </string-name>
          <article-title>A Machine Learning-Driven Approach for Proactive Decision Making in Adaptive Architectures</article-title>
          ,” 2019 IEEE International Conference on Software Architecture
          <string-name>
            <surname>Companion (ICSA-C)</surname>
          </string-name>
          , Hamburg, Germany,
          <year>2019</year>
          , pp.
          <fpage>242</fpage>
          -
          <lpage>245</lpage>
          ,
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .1109/ICSA-C.
          <year>2019</year>
          .
          <volume>00050</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S. Z.</given-names>
            <surname>Yong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Q.</given-names>
            <surname>Foo</surname>
          </string-name>
          and E. Frazzoli, “
          <article-title>Robust and resilient estimation for Cyber-Physical Systems under adversarial attacks</article-title>
          ,
          <source>” 2016 American Control Conference (ACC)</source>
          , Boston, MA,
          <year>2016</year>
          , pp.
          <fpage>308</fpage>
          -
          <lpage>315</lpage>
          ,
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .1109/ACC.
          <year>2016</year>
          .
          <volume>7524933</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>F.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhuang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. S. V.</given-names>
            <surname>Rao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. Y. T.</given-names>
            <surname>Ma</surname>
          </string-name>
          and D. K. Y. Yau, “
          <article-title>Gametheoretic resilience analysis of Cyber-Physical Systems</article-title>
          ,”
          <source>2013 IEEE 1st International Conference on Cyber-Physical Systems</source>
          , Networks, and
          <string-name>
            <surname>Applications</surname>
          </string-name>
          (CPSNA),
          <year>Taipei</year>
          ,
          <year>2013</year>
          , pp.
          <fpage>90</fpage>
          -
          <lpage>95</lpage>
          ,
          <year>2013</year>
          . DOI:
          <volume>10</volume>
          .1109/CPSNA.
          <year>2013</year>
          .
          <volume>6614252</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Thiede</surname>
          </string-name>
          , “
          <source>Environmental Sustainability of Cyber Physical Production Systems,” Procedia CIRP</source>
          , vol.
          <volume>69</volume>
          , pp.
          <fpage>644</fpage>
          -
          <lpage>649</lpage>
          ,
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .1016/j.procir.
          <year>2017</year>
          .
          <volume>11</volume>
          .124.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>D.</given-names>
            <surname>Wei</surname>
          </string-name>
          , J. Kun, “
          <article-title>Method for quantitative resilience estimation of industrial control systems</article-title>
          ,” U.S. Patent Application No.
          <volume>13</volume>
          /703,158,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Procedure for Substantiated Development of Measures to Design Secure Software for Automated Process Control Systems</article-title>
          .
          <source>In Proceedings of the 12th International Siberian Conference on Control and Communications</source>
          (Moscow, Russia, May
          <volume>12</volume>
          -14,
          <year>2016</year>
          ).
          <article-title>SIBCON 2016</article-title>
          . IEEE,
          <volume>7491660</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . DOI:
          <volume>10</volume>
          .1109/SIBCON.
          <year>2016</year>
          .
          <volume>7491660</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Markov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Periodic Monitoring and Recovery of Resources in Information Systems</article-title>
          . In Book:
          <article-title>Probabilistic Modeling in System Engineering</article-title>
          , by ed.
          <source>A.Kostogryzov. IntechOpen</source>
          ,
          <year>2018</year>
          , Chapter
          <issue>10</issue>
          , pp.
          <fpage>213</fpage>
          -
          <lpage>231</lpage>
          . DOI:
          <volume>10</volume>
          .5772/intechopen.75232.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>D.P</given-names>
            <surname>Zegzhda</surname>
          </string-name>
          and E. Y. Pavlenko, “
          <article-title>Cyber-physical system homeostatic security management,” Automatic Control</article-title>
          and
          <source>Computer Sciences</source>
          , vol.
          <volume>51</volume>
          ,
          <issue>num</issue>
          . 8, pp.
          <fpage>805</fpage>
          -
          <lpage>816</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .3103/S0146411617080260.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>P.</given-names>
            <surname>Erdos</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Rényi</surname>
          </string-name>
          , “
          <article-title>On the evolution of random graphs</article-title>
          ,
          <source>” Publication Of The Mathematical Institute Of The Hungarian Academy Of Sciences, vol. 5</source>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>61</lpage>
          .
          <year>1960</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Petrenko</surname>
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petrenko</surname>
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makoveichuk</surname>
            <given-names>K.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chetyrbok</surname>
            <given-names>P.V.</given-names>
          </string-name>
          <article-title>The IIoT/IoT device control model based on narrow-band IoT (NB-IoT)</article-title>
          .
          <source>In Proceedings of the the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (29 Jan.-1 Feb</source>
          .
          <year>2018</year>
          , Moscow and St. Petersburg, Russia) EIConRus, IEEE,
          <year>2018</year>
          , pp.
          <fpage>950</fpage>
          -
          <lpage>953</lpage>
          . DOI:
          <volume>10</volume>
          .1109/EIConRus.
          <year>2018</year>
          .
          <volume>8317246</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>