<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Bio-inspired Approach to Self-Regulation for Industrial Dynamic Network Infrastructure</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Daria Lavrova</string-name>
          <email>lavrova@ibks.spbstu.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Petr Zegzhda</string-name>
          <email>zeg@ibks.spbstu.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Higher School of Cybersecurity and Information Security Peter the Great St. Petersburg Polytechnic University Saint-Petersburg</institution>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>34</fpage>
      <lpage>39</lpage>
      <abstract>
        <p>- A bio-inspired approach for self-regulation of modern industrial network infrastructure is proposed. The approach is based on the analogy between the target function of an industrial system and the DNA. The target function describes the set of functions necessary for the operation of industrial system, including a description of their relations and the order of execution. The proposed functional representation of the target function uniquely characterizes the industrial system, just as DNA characterizes the organism and contains biological information important for its building and maintaining. Then the task of restoring the target function after the attack is similar to the task of DNA sequencing. The key difference is that the functional representation of the target function is known in advance, and this greatly simplifies the task. Proposed approach using both self-regulation scenarios and mathematical apparatus of de Bruijn graphs and intersection graphs used in bioinformatics for DNA sequencing. The approach reduces the time for network self-regulation required when detecting security threats.</p>
      </abstract>
      <kwd-group>
        <kwd>industrial network</kwd>
        <kwd>self-regulation</kwd>
        <kwd>de Bruijn graph</kwd>
        <kwd>cyber threat</kwd>
        <kwd>intersection graph</kwd>
        <kwd>information security</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>cyber-physical system</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>
        The development of industrial systems has led to a shift
from automated production to the concept of Digital
Production. In Digital Production systems, the information and
physical components are closely interconnected; they work
within a single industrial circuit [
        <xref ref-type="bibr" rid="ref2 ref3">1-3</xref>
        ].
      </p>
      <p>
        At the same time, the problem of ensuring the security of
industrial systems, the specificity of which is autonomy from
humans, mutual components control of each other and their
availability to communicate using the Internet, is becoming
increasingly important [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. This specificity opens up wide
opportunities for remote destructive impact on the components
of industrial systems, as a result of which physical processes
can be disturbed. This can cause harm to the environment, life
      </p>
      <p>
        The study was carried out as part of the scholarship of the President of the
Russian Federation to young scientists and graduate students SP- 1932.2019.5.
and human health. In such conditions, the task of preventing
computer attacks on industrial systems is especially urgent, an
important step in solving which is to counter attacks [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>In this paper, we propose a bio-inspired approach for
industrial network infrastructure self-regulation. The purpose
of this approach is to exclude the conditions of successful
cyber-attack implementation due to reconfiguration of the
network structure.</p>
      <p>II.</p>
      <p>The study of the problem of developing approaches to
automatic self-regulation of the network infrastructure of
complex large-scale systems showed that many solutions are
aimed at restoring the system after a failure (including that
caused by a cyber-attack).</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the authors propose an approach for automatic
proactive response to cybersecurity incidents, which uses data
obtained from open sources; analytical models of attacks,
events, countermeasures and dependencies between services;
hierarchical built-in set of heterogeneous security metrics. The
choice of metrics is based on their effectiveness, defined as the
difference in risk levels before and after the implementation of
the metric. Risk, in turn, is determined by the presence of
vulnerabilities in the system and the cost of resources. The
main problem of this approach is the use of data presented in
open sources. Thus, the method is focused on already known
attacks and may prove to be powerless when attackers invent
new methods of influencing the system.
      </p>
      <p>
        A small number of studies are devoted to creating
approaches that allow not only detecting cyber-attacks, but also
counteracting them by neutralizing them or correcting system
behavior [
        <xref ref-type="bibr" rid="ref10 ref11 ref7 ref8 ref9">7-11</xref>
        ]. The study [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] is especially noted, in which the
authors propose the correction of destructive effects based on
the control method, using the Lyapunov model. This method is
designed to ensure system stability. To identify potential
computer attacks, the authors use machine learning methods
that are widely used for clustering and regression, as well as
methods based on neural networks. The use of control based on
the Lyapunov model allows a neutralizing effect on the
subsystem when a cyber-attack is detected. The disadvantage
of this method as applied to its integration with PS is the rather
high complexity of mathematical transformations and
calculations, in particular, the construction of the Lyapunov
model. We should also highlight the works devoted to the
implementation of the bio-inspired homeostatic concept
[
        <xref ref-type="bibr" rid="ref12 ref13">12,13</xref>
        ]. This concept implies maintaining a constant state of
the environment under the conditions of destructive influences,
provided by the implementation of the homeostatic control
loop, which carries out automatic self-regulation of the system.
The approach [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] can be used for self-regulation of the
network infrastructure of small-scale industrial systems. This
approach is based on the development of self-regulation
scenarios and the application of a specific scenario, depending
on what destructive effect the system has on the system. Thus,
we can conclude that most approaches to self-regulation of
complex systems (including industrial ones) are based on the
use of behavior models and self-regulation patterns. These
approaches, on the one hand, will be effective in case of system
failures, but on the other hand, it will not It will be effective in
case of massive cyberattacks that immediately affect a large
number of system components.
      </p>
      <p>The approach proposed in this paper is aimed at
selfregulation of industrial systems with a flexible dynamic
network infrastructure. It provides a system response both to
the negative impact caused by cyberattacks and to failures
caused by technical malfunctions. The approach uses a graph
representation of the network infrastructure and a functional
representation of the target function.</p>
      <p>III.</p>
    </sec>
    <sec id="sec-2">
      <title>MODELING OF NETWORK INFRASTRUCTURE AND</title>
      <p>TARGET FUNCTION</p>
      <p>Network infrastructure of industrial system is represented
as an oriented graph (Fig. 1). The set of graph vertices 
characterizes all components of the industrial system that are
capable of network interaction. The set of arcs  reflects all
possible inter-component connections, which manifest as data
exchange.</p>
      <p>f3</p>
      <p>Each component of the system modeled by the vertex   is
characterized by a set of functions that it is able to implement.
Each arc   of the graph corresponds to a certain characteristic
 , which may have different meanings depending on the type
of industrial system (channel bandwidth, data transfer rate,
etc.).</p>
      <p>The target function of an industrial system is presented
simultaneously as a set of routes on a graph (where each route
characterizes a specific process performed by the system) and
as a set of functional sequences: F={F1, F2, …, Fn}, where each
system process corresponds to a functional sequence.</p>
      <p>The following types of relationships between functions are
introduced into the model:
•
•
•
•</p>
      <p>Sequentially performed functions - one function uses
the results of others, it is not required to perform this
function immediately after the completion of the
previous ones. Parentheses are used to indicate this
relationship: fj(fk) - first, the function fk is executed,
then the function fj is applied to its result.</p>
      <p>Strictly sequentially performed functions - one
function uses the results of others, it is required to
perform this function immediately after the previous
ones are completed. To indicate such a relationship,
square brackets are used: fj[fk] - the function fk is first
executed, then, immediately after its completion, the
function fj is applied to its result.</p>
      <p>Parallel functions - must be performed simultaneously.
To indicate such a relationship, the sign * is used, the
operation is commutative: fj * fk.</p>
      <p>Functions performed in random order. To indicate such
a relationship, the + sign is used, the operation is
commutative: fj + fk + fm.</p>
      <p>Then {} is used as an analogue of ordinary brackets.</p>
      <p>For functions, a decomposition operation can be performed
that implements the representation of some complex function fi
as a sequence of several, more computationally simple,
functions.</p>
      <p>IV.</p>
      <p>ANALOGY BETWEEN TARGET FUNCTION AND DNA
Both target function of an industrial system and DNA can
be represented as a sequence of elements: in the case of an
target function, the elements are functions, and in the case of
DNA, nucleotides. Under cyber-attacks, one or more
components can lose their ability to perform certain functions.
In this case, the target function “breaks up” into separate parts,
which will need to be connected together again. To do this, it is
required to reconfigure the network infrastructure. To restore
the functional sequence that determines the target function, it is
proposed to apply a mathematical apparatus used in DNA
sequencing - the search for overlaps and matching parts of the
sequence.</p>
      <p>
        A DNA chain is a sequence of four types of nucleotides: A
(adenine), T (thymine), G (guanine), C (cytosine). Modern
technologies allow reading reads - sequences of several
hundred nucleotides in length from random places; the key step
is to combine reads based on their overlapping sections. For
this, special programs are used, most of which use de Bruijn
and overlap graphs [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. The de Bruijn graph is a directed
graph whose vertices are rows of length (k − 1), and the edges
are rows of length k. The overlap graph is a weighted oriented
graph whose vertices are rows (which can be of different
lengths). An edge between a pair of vertices is drawn if the
corresponding lines overlap.
      </p>
      <p>Examples for target function which could be constructed
using by both graphs are presented at Fig. 2, 3. Let the target
function be represented by the following sequence:
F=f1f3f4f5f8f11.</p>
      <p>Thus, the main differences between the graph de Bruijn and
the overlap graph in terms of graph structure are as follows:
•
•</p>
      <p>When searching for overlappings in the de Bruijn graph,
a fixed length of the prefix and suffix equal to k-1 is
used.</p>
      <p>De Bruijn graph is characterized by a fixed length of
lines characterizing each vertex (length k).</p>
      <p>Also proposed an analogy between information functions of
industrial systems and DNA fragments (Table 1).</p>
      <p>To implement the method, for each function that is part of
the target function, is constructed a set of vertices that are able
to implement this function. Thus, for each function, a cluster of
devices is formed that can replace each other in the event of
failure or compromise (Fig. 4).</p>
      <p>The proposed approach to self-regulation also uses
preformed self-regulation scenarios based on representing the
network infrastructure of the industrial system in the form of a
graph. Scenarios contain rules for replacing vertices and arcs in
a graph, as well as restrictions on the construction of new
routes that reflect the performance of the target function. In
particular, such routes should not include compromised system
components or components with suspicious behavior.</p>
    </sec>
    <sec id="sec-3">
      <title>The method is performed in three main steps:</title>
      <p>Updating data on the structure of the system in
accordance with the identified anomalies and threats to
cybersecurity. At this step, the removal of incorrectly
functioning vertices from the clusters and their
relationships is performed.</p>
      <p>Automatic selection of the method of self-regulation
(use of scripts, de Bruijn graphs or overlap graphs).
Application of the selected method of self-regulation,
as a result of which the restoration of the target
function is performed.</p>
      <p>Type of security breach
Violation of several functions (both reads
and contigs) related to each other or a
combination of various types of
violations</p>
      <p>Target function recovery</p>
      <p>Using self-regulation
scenarious, de Bruijn
graphs and overlap graphs</p>
      <p>To confirm the assumption described in Table 2, an
experiment was conducted consisting in simulating
cyberattacks and estimating the time of self-regulation, performed in
different ways.</p>
      <p>The Fig. 5 shows the results of an experiment in which 3
interconnected vertices were removed from the graph
characterizing the industrial network. Average time for
selfregulation using scenarios was 0.02 seconds, for overlap graphs
– 0.003 seconds.</p>
      <p>The Fig. 6 shows the results of an experiment in which one
vertex was deleted, then 3 interconnected vertices in another
part of the graph were deleted and 2 successive vertices were
compromised. The time spent on self-regulation turned out to
be approximately the same for both approaches (0.004 seconds
for scenarios and 0.003 seconds for complex approach),
however, the use of an integrated approach gave a greater gain
in time.</p>
      <p>The results of the experiments confirmed the assumption
that when removing interconnected vertices, de Bruijn graphs
and overlap graphs should be used, and for massive attacks
involving vertices in different parts of the graph, an integrated
approach should be used.</p>
      <p>
        To conduct experimental research, a bench simulating an
automatic industrial water treatment system was used [
        <xref ref-type="bibr" rid="ref16">15</xref>
        ].
Water treatment includes six subprocesses P1-P6 (Fig. 7):
•
      </p>
      <p>P1: collection and storage of untreated water.</p>
      <p>P3: primary water treatment involving the use of
ultrafiltration and backwash technologies.</p>
    </sec>
    <sec id="sec-4">
      <title>P4: secondary treatment (dechlorination).</title>
    </sec>
    <sec id="sec-5">
      <title>P5: reverse osmosis.</title>
    </sec>
    <sec id="sec-6">
      <title>P6: transfer of purified purification. water, backwash and Target function of a part of water treatment system:</title>
      <p>F={{{f8(f6(f7(f4)))* f5*f2(f7)}( f3(f3(f1)))}* f4 }(f3(f2(f1))), where:
f1 - control of water circulation systems.
f2 - parameter adjustment.
f3 - access to the database.
f4 - command sending and reconfiguration.
f5 - adjusting the volume of water in the tanks.
f6 - sending a command about moving water.
f7 - change system parameters.</p>
      <p>f8 - resetting the tank.</p>
      <p>The following types of destructive influences were
modeled: denial of service attacks on the components of the
experimental bench, attacks consisting in modifying data from
the components of the experimental bench, illegitimate changes
to the structure of the experimental bench. Consider one of the
denial of service attacks, as a result of which three
interconnected system components fail (in terms of the graph
model, three vertices of the graph are removed).</p>
      <p>Fig. 8 shows the changes in the target function of the
system, as a result of which the functions f1, f3 and f4 ceased to
be executed in the target function.</p>
      <p>For system self-regulation, de Bruijn graphs and known
function decompositions were used:
f1=f3(f6).
f2=f7(f3).
f5=f7(f6(f8)).</p>
      <p>The graph obtained as a result of self-regulation is shown in
Fig. 9.</p>
      <p>Black edges are edges constructed according to the
principles of constructing an overlap graph. The dashed edges
are based on the neighborhood of the vertices in the original
graph. The peaks reachable from the starting peak are marked
in gray. The vertices from which the final vertex is reachable
are marked in black.</p>
      <p>For the considered attack, the time of self-regulation was
25% of the time of its implementation. Thus, for this
cyberattack, it was possible to exclude the conditions for its
implementation. The restored target function is shown in Fig.
10.</p>
      <p>For other attacks, the system’s self-regulation time was
1238% of their implementation time.</p>
    </sec>
    <sec id="sec-7">
      <title>CONCLUSION</title>
      <p>The specifics of systems that combine information
technology and physical process control devices have made
insufficient the use of classical methods of ensuring
information security. The work is devoted to a detailed
consideration of one of the stages of preventing cyber-attacks
on industrial systems, which consists in the self-regulation of
their network structure.</p>
      <p>In this paper, the similarity between target function
restoring and DNA sequencing is investigated. It is proposed to
use the principles of constructing de Bruin graphs and overlap
graphs to restore system performance. The use of such graphs
will reduce assembly time due to faster “coupling” of the
restored sections of the target function.</p>
      <p>This approach was proposed for the first time, an analysis
of related works showed that most studies use behavioral
models and pre-formed self-regulation patterns for automatic
self-regulation. The combined use of de Bruijn graphs and
overlap graphs together with self-regulation scenarios will
effectively resist massive cyber-attacks, which is confirmed by
the results of experimental studies.
[1]</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>M.J. de C Henshaw</surname>
          </string-name>
          , “
          <article-title>Systems of systems, cyber-physical systems, the internet-of-things</article-title>
          ... whatever next?,
          <source>” Insight</source>
          , vol.
          <volume>19</volume>
          ,
          <issue>num</issue>
          . 3, pp.
          <fpage>51</fpage>
          -
          <lpage>54</lpage>
          2.
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .1002/inst.12109.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Pavlenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zegzhda</surname>
          </string-name>
          , “
          <article-title>Sustainability of cyber-physical systems in the context of targeted destructive influences</article-title>
          ,
          <source>” IEEE Industrial CyberPhysical Systems (ICPS)</source>
          , pp.
          <fpage>830</fpage>
          -
          <lpage>834</lpage>
          , May
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .1109/ICPHYS.
          <year>2018</year>
          .
          <volume>8390814</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>N.</given-names>
            <surname>Sadiku</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cui</surname>
          </string-name>
          , M. Musa, “
          <article-title>Cyber-physical systems: a literature review</article-title>
          ,
          <source>” European Scientific Journal</source>
          , vol.
          <volume>13</volume>
          , No.
          <volume>36</volume>
          , pp.
          <fpage>52</fpage>
          -
          <lpage>58</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1142/S2424862217500129.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>O.</given-names>
            <surname>Givehchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Landsdorf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Simoens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. W.</given-names>
            <surname>Colombo</surname>
          </string-name>
          , “
          <article-title>Interoperability for industrial cyber-physical systems: An approach for legacy systems</article-title>
          ,
          <source>” IEEE Transactions on Industrial Informatics</source>
          , vol.
          <volume>13</volume>
          , No,
          <issue>6</issue>
          , pp.
          <fpage>3370</fpage>
          -
          <lpage>3378</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1109/TII.
          <year>2017</year>
          .
          <volume>2740434</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lavrova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Poltavtseva</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Shtyrkina, “
          <article-title>Security analysis of cyberphysical systems network infrastructure</article-title>
          ,
          <source>” IEEE Industrial CyberPhysical Systems (ICPS)</source>
          , pp.
          <fpage>818</fpage>
          -
          <lpage>823</lpage>
          , May
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .1109/ICPHYS.
          <year>2018</year>
          .
          <volume>8390812</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.</given-names>
            <surname>Doynikova</surname>
          </string-name>
          , I. Kotenko, “
          <article-title>The Multi-Layer Graph Based Technique for Proactive Automatic Response Against Cyber Attacks</article-title>
          ,” 26th Euromicro International Conference on Parallel,
          <source>Distributed and Network-based Processing (PDP)</source>
          , pp.
          <fpage>470</fpage>
          -
          <lpage>477</lpage>
          ,
          <issue>21</issue>
          <year>March 2018</year>
          . DOI:
          <volume>10</volume>
          .1109/PDP2018.
          <year>2018</year>
          .
          <volume>00081</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Albalawi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , H. Durand, P. Christofides, “
          <article-title>Detecting and Handling Cyber-attacks in Model Predictive Control of Chemical Processes</article-title>
          ,” Mathematics, vol.
          <volume>6</volume>
          , No.
          <volume>10</volume>
          , pp.
          <fpage>173</fpage>
          ,
          <year>October 2018</year>
          . DOI:
          <volume>10</volume>
          .3390/math6100173.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Markov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Barabanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tsirlov</surname>
          </string-name>
          , “
          <source>Information Security Controls against Cross-Site Request Forgery Attacks on Software Applications of Automated Systems,” Journal of Physics: Conference Series</source>
          , vol.
          <volume>1015</volume>
          , No.
          <issue>4</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          -6596/1015/4/042034.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Markov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dorofeev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tsirlov</surname>
          </string-name>
          , “
          <article-title>Social media in identifying threats to ensure safe life in a modern city</article-title>
          ,
          <source>” International Conference on Digital Transformation and Global Society</source>
          , pp.
          <fpage>441</fpage>
          -
          <lpage>449</lpage>
          ,
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -49700-6_
          <fpage>44</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chennareddy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Karuppiah, “
          <article-title>Modular selfreconfigurable robotic systems: a survey on hardware architectures</article-title>
          ,
          <source>” Journal of Robotics</source>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1155/
          <year>2017</year>
          /5013532.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I.</given-names>
            <surname>Kotenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Saenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Lauta</surname>
          </string-name>
          , “
          <article-title>Analytical modeling and assessment of cyber resilience on the base of stochastic networks conversion</article-title>
          ,
          <source>” IEEE International Workshop on Resilient Networks Design and Modeling (RNDM)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          ,
          <year>August 2018</year>
          . DOI:
          <volume>10</volume>
          .1109/RNDM.
          <year>2018</year>
          .
          <volume>8489830</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>I.</given-names>
            <surname>Gerostathopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Skoda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Plasil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Bures</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Knauss, “
          <article-title>Architectural homeostasis in self-adaptive software-intensive cyberphysical systems</article-title>
          ,
          <source>” European Conference on Software Architecture</source>
          , pp.
          <fpage>113</fpage>
          -
          <lpage>128</lpage>
          ,
          <year>November 2016</year>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -48992-
          <issue>6</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D. P.</given-names>
            <surname>Zegzhda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Y.</given-names>
            <surname>Pavlenko</surname>
          </string-name>
          , “
          <article-title>Cyber-physical system homeostatic security management,” Automatic Control</article-title>
          and
          <source>Computer Sciences</source>
          , vol.
          <volume>8</volume>
          , pp.
          <fpage>805</fpage>
          -
          <lpage>816</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .3103/S0146411617080260.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sergushichev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Aleksandrov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kazakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Tsarev</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Shalyto, “
          <article-title>Combining de Bruijn graphs, overlap graphs and microassembly for de novo genome assembly,”</article-title>
          <string-name>
            <surname>Izv. Saratov Univ. (N. S.</surname>
          </string-name>
          ), Ser. Math. Mech.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Inform.</surname>
          </string-name>
          , vol.
          <volume>13</volume>
          ,
          <issue>iss</issue>
          . 2, pp.
          <fpage>51</fpage>
          -
          <lpage>57</lpage>
          ,
          <year>2013</year>
          . DOI:
          <volume>10</volume>
          .18500/1816-9791- 2013-13-2-2-
          <fpage>51</fpage>
          -57.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.</given-names>
            <surname>Goh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Adepu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Junejo</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Mathur, “
          <article-title>A dataset to support research in the design of secure water treatment systems</article-title>
          ,
          <source>” International Conference on Critical Information Infrastructures Security</source>
          , pp.
          <fpage>88</fpage>
          -
          <lpage>99</lpage>
          ,
          <year>October 2016</year>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -71368-
          <issue>7</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>