<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Sergiy Gnatyuk</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Satbayev University</institution>
          ,
          <addr-line>Almaty</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>Aktau</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>1</volume>
      <issue>2</issue>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>Protection of the state's critical information infrastructure is a complex process, which requires effective tools for entities' identification, assessing their criticality, threat and vulnerability assessment, protection against threats and also determining the cybersecurity level of the individual entities, industries, regions, and countries. The conducted analysis is shown that today there is no complex, multifunctional method which helps to evaluate the cybersecurity level of the critical information infrastructure entity or a certain industry of the state. With that in mind, in this paper the method of determining the cybersecurity level of the state's critical information infrastructure was developed, taking into account the advantages and disadvantages of the known approaches. The method will be useful for CSIRT groups (or any other parties, who is responsible for cybersecurity in organization) to analyze a particular industry and evaluate its cybersecurity level. The developed method allows to calculate quantitative parameters, describing the analyzed sector, also to compare the security level of the critical entity before and after implementation of certain security measures. For example, the usage of the mentioned method in the civil aviation was shown but it can be used in various critical infrastructure sectors.</p>
      </abstract>
      <kwd-group>
        <kwd>cybersecurity index</kwd>
        <kwd>critical information infrastructure</kwd>
        <kwd>civil aviation</kwd>
        <kwd>cybersecurity level determining</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The current trends in the development of information and communication
technologies (ICT) caused a phenomenal dependence on social services, which are
provided by various sectors of infrastructure. Today, with the cutting-edge
technologies, fundamentally new global concepts have emerged, such as information
and cyber space, cybersecurity, cyber threat, critical infrastructure (CI), which have
nearly unlimited power and a leading role in the economic and social development of
each country in the world. However, in addition to its benefits, there are a number of
problems caused by the growing vulnerability of the information assets from external
cybersecurity impact, which the world’s community has also received.</p>
      <p>
        A number of planned in advance, well-executed attacks in cyberspace increase
every year, these are so-called APT attacks (Advanced Persistent Threat). According
to that, there is a need to control and further regulate the relevant relationships in
cyberspace, and therefore urgently creat a reliable cybersecurity system [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        In October 2017, the Parliament of Ukraine has signed the Law “On Basic Principles of
Cybersecurity of Ukraine” [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], in that paper Article 8 clearly describes the definitions,
main tasks and stages of the National Cybersecurity System operation. In order to provide
the necessary protection (vital interests of the individual, society and state, national
interests of Ukraine in cyberspace) of critical information infrastructure (CII) sectors,
according to [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], it is necessary to constantly maintain and improve the National
Cybersecurity System of Ukraine, by developing and rapidly adapting the public
cybersecurity policie; creating a legal and terminological framework for cybersecurity;
establishing the mandatory information security requirements of CII sectors; involing the
expert scientific institutions, professional and public associations in the preparation of
conceptual documents in the cybersecurity field; conducting drills for emergency
situations in cyberspace; developing and improving the technical and cryptographic
information protection systems; ensuring compliance with the requirements of the
legislation on protection of state’s information resources and public information;
periodicaly review the National Cybersecurity System; developing the cybersecurity
indicators etc.
      </p>
      <p>1.Identification the state CII
objects and forming the list of
them
2.Assessment the importance
(criticality) of the state CII
objects
3.Assessment vulnerabilities
and threats of the state CII
objects
5.Identification the level of
cybersecurity of state CII
objects</p>
      <p>4.Development and
implementation methods and
tools of the state CII objects
protection</p>
      <p>
        Rather complicated issues are the development of appropriate indicators and
determination of the required protection level of cybersecurity, according to which the
price of the security system will not be higher than the usefulness of the information
to be protected. This problem can be solved, for example, by determining the
necessary level of cybersecurity for a certain facility or relevant CII sector, according
to basic approach, presented in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and CIIP concept (Fig. 1, Stage 5).
      </p>
      <p>Related research analysis and problem statement
In 2016, the International Telecommunication Union (ITU) conducted a complex
study of the cybersecurity level of 143 countries.</p>
      <p>
        In 2017 the main results were announced in the report [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], accroding to which, the
method for assessing state’s security in cyberspace was proposed. It has five pillars –
Legal Measures, Technical Measures, Organizational Measures, Capacity Building,
and Cooperation. There are twenty-five pillars in total of all indicators. Global
Cybersecurity Index (GCI) is calculated as the arithmetic mean of all pillars. A
representative from an analised state should answer the 157 question to compleate the
poll. Having received the answers, ITU has defined a state’s index and a global
ranking list was created. State’s security level in cyberspace takes value from “1”
(highest) to “0” (smallest). What allows to define a worldwide overwiev of the
cybersecurity level, to assess the protection level in some parts of the world and to
analyze the cybersecurity level of each state separetly. The main disadvantage of this
approach is unjustified used indicators, their assessment is subjective. Thus, obtaining
the reliable data is a complicated task.
      </p>
      <p>
        A flexible method for determining the cybersecurity level is reflected in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The
authors propose to use cybersecurity metrics that can be used for evaluation, revision,
and improvement of the research entity cybersecurity level.
      </p>
      <p>The approach is based on the metrics, which companies and organizations are using in
their business processes. To determine the new metric or specific measures, which
mathematically described, a set of relevant parameters should be identified. They can be
used to analyze and continually improve the business of an organization or a state. The
matrics usage is widely used nowadays. The disadvantages of this approach are
preliminary modeling, mathematical justification for the development and implementation
of these metrics, which is a difficult problem, also the result may not be unbiased enough.</p>
      <p>
        A comprehensive method is proposed in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].The cybersecurity level can be
determined by using completely independent metrics NSCI (National Cyber Security
Index) and ISD (Informational Society Score). NSCI consists of some sub-indexes:
ISD is divided on the following sub-indexes – IDI (The ICT Development Index) and
NRI (Networked Readiness Index) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The disadvantage of this method is necessity
to allocate considerable resources for research due to the large number of indicators in
order to collect a reliable data.
      </p>
      <p>
        Mathematical and statistical approach is described in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. It is a method for
assessing the cybersecurity level of CII assets, which allows to calculate a criticality
index of the entity. In order to implement the method, it is necessary to identify key
indicators, such as Severity level, the Availability of continuous operation systems,
Cost, Downtime etc. Thereafter, a weighting factor must be used for each determinant
indicator. Each of them must have a value from “0” to “100”, according to the
proposed scale of the value calculation. The mportance index of the CII entity can be
calculated based on the value of its criticality index. The disadvantage of this method
is a difficult adaption to the new systems and complexity of justifying weighting
factors and indicators.
      </p>
      <p>
        In the next paper [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] was proposed a methodology for assessing ICT security,
using the example of automated banking systems, which is based on the concept
of a complex security management of those systems. The mentioned concept
provides a mutually valid approach to select the most effective ways of achieving
the cybersecurity goals. Which also is taking into account the risk value at each
level of the management model. It makes it possible to comprehensively select
the alternative options for potential cybersecurity strategic decisions. However,
the proposed concept is focused exclusively on the banking sector and is not
flexible, which means it can not be used for other CII sectors.
      </p>
      <p>
        According to [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], the analysis results of the mentioned approaches of determining the
cybersecurity level by the following criteria are reflected (Table 1): CS is consideration of
cybersecurity means and measures; ICT is consideration of ICT implementation; QP is
quantitative parameters; CIIP is CII sector protection; UM is universality [
        <xref ref-type="bibr" rid="ref10 ref11">10-11</xref>
        ].
      </p>
      <p>The analysis shows that the existing methods have a list of disadvantages,
including unsubstantiated indicators, which are needed to develop metrics, complex
modeling of the given systems, the need to use a complex mathematical tools,
statistical resources involvement, which is needed for further analysis and creation of
the cybersecurity metrics. Given the need to assess the cybersecurity level of a CII
sector, a method for determining the cybersecurity level of the state’s CII sector needs
to be developed. This issue will be a main target of this work.</p>
      <p>The main part of the study</p>
      <p>
        Proposed method descryption
According to [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] the method of determining the cybersecurity level of the CII sector is
implemented in the following 3 stages:
1. Determination of metrics and cybersecurity index of a CII sector;
2. Determination of the ICT development and implementation metrics of a CII
sector;
      </p>
      <p>3. Calculation of quantitative parameters, that describe the cybersecurity level of a
CII sector.</p>
      <p>Input data: information regarding critical infrastructure, cybersecurity methods and
tools, ICT implementation.</p>
      <p>Output data: quantitative parameters, that describe the security of a particular
industry or the state’s CII in general. Namely, cybersecurity metrics, ICT
development and implementation metrics, also a relevant cybersecurity index.</p>
      <p>Consider in details each of the stage of the proposed method by itself.
Stage 1. Determination of the metrics and the cybersecurity index of a CII sector
Step 1.1. Formalization of the cybersecurity metrics
i1
mi
j1
Pi  {</p>
      <p>Pij }  {Pi.1, Pi.2 ,, Pi.mi },
P1</p>
      <p>P2
...</p>
      <p>Pn
/</p>
      <p>The set Pi can be represented as a subset system:
where Pij (i = 1, n, j = 1, mi ) is metrics list of the i parameter (the metric’s range
value is determined according to appropriate standards and recommended practices
for each CII sector), mi is a number of metrics in i parameter.</p>
      <p>Taking into account (2), the set (1) can be represented as follows:</p>
      <p>n n mi
P  {</p>
      <p>Pi }  {
i1</p>
      <p>{
i1 j1</p>
      <p>Pij }}  {{P1.1, P1.2 ,..., P1.m1 },
{P2.1, P2.2 , ..., P2.m2 },...,{Pn.1, Pn.2 ,..., Pn.mn }}, (i  1, n, j  1, mi ).
head</p>
      <p>tail
where  mPijax is the sum of the maximum possible values of Pij metric.</p>
      <p>Stage 2. Determination of the ICT development and implementation metrics of a
CII sector</p>
      <p>Step 2.1. Formalization of the ICT development and implementation metrics, that
describe the ICT readiness and availability</p>
      <p>Step 1.2. The value calculation of the index, that describes the CII sector
cybersecurity level</p>
      <p>The index of the CII sector cybersecurity level is calculated according to (1-3)
considering (4):
n mi
  Pij ×100%
ICS = i=1 j=1
 mPijax
,  mPijax  0,
M
set.</p>
      <p>head
tail</p>
      <p>M1</p>
      <p>M2
...</p>
      <p>Mn
/
The set Mk can be represented as a subset system:</p>
      <p>Mk  {</p>
      <p>M kr }  {M k.1, M k.2 ,, M k. pi },
where Mkr (k = 1, q, r = 1, pi ) are metrics of the set k , pi is metric’s number of the k
M  {</p>
      <p>
        Mk }  {M1, M2 ,, Mq },
where Mk  M (k = 1, q) is the subset of the ICT development and implementation
metrics, q is a number of the metric’s subsets. Similarly, taking into account [
        <xref ref-type="bibr" rid="ref12 ref13">12-13</xref>
        ],
the set (5) was represented as a linked list as it shown in Fig. 3.
      </p>
    </sec>
    <sec id="sec-2">
      <title>Declaring the</title>
      <p>implementation:
metrics set</p>
    </sec>
    <sec id="sec-3">
      <title>M , that describe the ICT development and</title>
      <p>q
(5)
(6)
(7)
(8)
Similarly, taking into account (6), the set (5) can be represented as:</p>
      <p>q q pi
M  {
,  mPijax  0, mMakxr  0, q  0. (9)
According to [3. 10, 11], an example of the developed method usage for the civil
aviation (CA) is showed below (Fig. 4). This sector includes to transportation and it is
a part of CI for most of states (Table 2).
{PBASS ,PESEV ,PEIDN ,PCIIP},{PCIRC ,PCRIS ,PCRIM ,PMIL },{PINT }} , (i = 1,n, j = 1,mi ).</p>
      <p>Step 1.2. The value calculation of index, that describes the CII sector cybersecurity
level</p>
      <p>According to (4):
ICS = (PPLC + PTHR + PEDU + PBASS + PESEV + PEIDN + PCIIP + PCIRC + PCRIS + PCRIM + PMIL + PINT )100  35%.</p>
      <p>PPmLaCx + PTmHaRx + PEmDaUx + PBmAaSxS + PEmSaExV + PEmIDaxN + PCmIIaPx + PCmIRaCx + PCmRaISx + PCmRaIMx + PMmIaLx + PINmTax
+
+
+
+
+
+
+
+
+
.i
n
m
d
a
c
i
l
b
u
P
+
+
+
+
+
+
+
+
+
+
+
+
+
+</p>
      <p>Stage 3. Calculation of the quantitative parameters, that describe the cybersecurity
level of CA</p>
      <p>Based on the results in Step 1.2, Step 2.2 and considering (9), quantitate
parameters, that describe the cybersecurity level of CA can be calculated as follows:</p>
      <p>Iratio = ICS - IDDL  35 %  62, 5 %  27, 5 %.</p>
      <p>The difference between ICS and IDDL indicators shows the correlation between the
cybersecurity level and ICT development and implementation index. A positive result
shows that cybersecurity level meets a sufficient level of ICT index for CA (or even
overcame it), on the other hand, a negative result shows that cybersecurity level is not
sufficient for current ICT index. The obtained result Iratio = 27, 5 % for CA shows that
cybersecurity level should be improved.
4</p>
      <p>Conclusion and future research study
Consequently, in this paper the modern methods, tools for assessing the cybersecurity
level and their supporting instruments were analyzed. The research found that currently
there are no comprehensive, flexible methods that can quantify the cybersecurity level
of the CII sector. A method for determining the cybersecurity level has been developed.
This method provides the sets of cybersecurity level and ICT development and
implementation metrics in a linked lists view, also helps to calculate its relevant metrics.
It allows to determine quantitative parameters, that describe the cybersecurity level of a
particular industry or the state’s CII in general. The developed method can be used to
analyze a particular state’s CII, determine the cybersecurity level, identify critical
systems, which need to be protected from external and internal threats. For example, the
proposed method can be applied for comparing the cybersecurity level before and after
the implementation of certain ICT security measures.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , “
          <article-title>Critical Aviation Information Systems Cybersecurity”, Meeting Security Challenges Through Data Analytics and Decision Support, NATO Science for Peace</article-title>
          and Security Series,
          <string-name>
            <surname>D</surname>
          </string-name>
          : Information and
          <string-name>
            <given-names>Communication</given-names>
            <surname>Security</surname>
          </string-name>
          . IOS Press Ebooks, vol.
          <volume>47</volume>
          , №3, рр.
          <fpage>308</fpage>
          -
          <lpage>316</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <source>The Law of Ukraine “On Basic Principles of Cyber Security of Ukraine” of 15.10</source>
          .
          <year>2017</year>
          , №
          <fpage>2163</fpage>
          -VIII, Available Online, URL: http://zakon3.rada.gov.ua/laws/show/2163-
          <lpage>19</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>V.</given-names>
            <surname>Sydorenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polozhentsev</surname>
          </string-name>
          , S. Gnatyuk, “
          <article-title>The method of determining the security level of the critical information infrastructure”, Academy of Engineering of Ukraine News</article-title>
          , vol.
          <volume>42</volume>
          , pp.
          <fpage>81</fpage>
          -
          <lpage>89</lpage>
          ,
          <year>2017</year>
          (in Ukrainian).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Global</given-names>
            <surname>Cybersecurity</surname>
          </string-name>
          <string-name>
            <surname>Index</surname>
          </string-name>
          , Available Online, URL: https://www.itu.int/en/ITU-D/.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>P.</given-names>
            <surname>Black</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Scarfone</surname>
          </string-name>
          , M. Souppaya, “
          <article-title>Cyber security metrics</article-title>
          and measures”,
          <source>Wiley Handbook of Science and Technology for Homeland Security</source>
          , vol.
          <volume>4</volume>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>National</given-names>
            <surname>Cyber Security Index</surname>
          </string-name>
          , Available Online, URL: http://ncsi.ega.ee/ncsi-index/.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Network</given-names>
            <surname>Readiness</surname>
          </string-name>
          Index
          <year>2016</year>
          . Available Online, URL: http://www3.weforum.org/ docs/GITR/2014/GITR_OverallRanking_
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>A.</given-names>
            <surname>Nestrugin</surname>
          </string-name>
          ,
          <article-title>Technique of automatic ranking of objects protection according to the level of potential danger on the example of oil refineries</article-title>
          , pp.
          <fpage>77</fpage>
          -
          <lpage>84</lpage>
          ,
          <year>2014</year>
          (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>S.</given-names>
            <surname>Evseev</surname>
          </string-name>
          , “
          <source>Methodology of Information Security Assessment of Automated Banking Systems of Ukraine”, Information Security</source>
          , vol.
          <volume>22</volume>
          , No.
          <issue>3</issue>
          , pp.
          <fpage>297</fpage>
          -
          <lpage>309</lpage>
          ,
          <year>2016</year>
          (in Ukrainian).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Polishchuk</given-names>
            <surname>Yu</surname>
          </string-name>
          .,
          <string-name>
            <surname>Sydorenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Sotnichenko</given-names>
            <surname>Yu</surname>
          </string-name>
          .
          <article-title>“Determining the level of importance for critical information infrastructure objects”</article-title>
          ,
          <source>Proceedings of 2019 IEEE International Scientific-Practical Conference: Problems of Infocommunications Science and Technology, PIC S and T</source>
          <year>2019</year>
          ,
          <article-title>Kyiv</article-title>
          , Ukraine, October 8-
          <issue>11</issue>
          ,
          <year>2019</year>
          , pp.
          <fpage>829</fpage>
          -
          <lpage>834</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abakumova</surname>
          </string-name>
          ,
          <article-title>Security Key Indicators Assessment for Modern Cellular Networks</article-title>
          ,
          <source>Proceedings of the 2018 IEEE First International Conference on System Analysis &amp; Intelligent Computing (SAIC)</source>
          ,
          <source>Kyiv, Ukraine, October</source>
          <volume>8</volume>
          -
          <issue>12</issue>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>T.</given-names>
            <surname>Kormen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Leiserson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Rivest</surname>
          </string-name>
          , C. Stein, “
          <source>Algorithms: Construction and Analysis, 3rd Edition”</source>
          , Moscow: LTD Williams,
          <volume>1328</volume>
          p.,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Smirnov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiian</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamula</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rudenko</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hryhorenko</surname>
            <given-names>V.</given-names>
          </string-name>
          , “
          <article-title>Variance Analysis of Networks Traffic for Intrusion Detection in Smart Grids”</article-title>
          ,
          <source>2019 IEEE 6th International Conference on Energy Smart Systems</source>
          , Kyiv, Ukraine,
          <year>2019</year>
          , P.
          <fpage>353</fpage>
          -
          <lpage>358</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Zhukov</surname>
            <given-names>I.A.</given-names>
          </string-name>
          “
          <article-title>Implementation of integral telecommunication environment for harmonized air traffic control with scalable flight display systems”</article-title>
          , Aviation,
          <year>2010</year>
          , №
          <volume>14</volume>
          (
          <issue>4</issue>
          ),
          <fpage>117</fpage>
          -
          <lpage>122</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Smirnov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kavun</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Babenko</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakisko</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsova</surname>
            <given-names>K.</given-names>
          </string-name>
          , “Malware Correlation Monitoring in Computer Networks of Promising Smart Grids',
          <source>2019 IEEE 6th International Conference On Energy Smart Systems</source>
          , Kyiv, Ukraine, 2019 P.
          <fpage>347</fpage>
          -
          <lpage>352</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>