<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Platform for Testing and Dynamic Control of Software Code Based on Dimensions *</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Sergei</forename><forename type="middle">A</forename><surname>Petrenko</surname></persName>
							<email>s.petrenko@rambler.ru</email>
							<affiliation key="aff0">
								<orgName type="institution">Innopolis University</orgName>
								<address>
									<settlement>Kazan</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><surname>Petrenko</surname></persName>
							<email>aa_petrenkoa@guu.ru</email>
							<affiliation key="aff1">
								<orgName type="institution">MIREA -Russian Technological University</orgName>
								<address>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Krystina</forename><forename type="middle">A</forename><surname>Makoveichuk</surname></persName>
							<affiliation key="aff2">
								<orgName type="department">V.I</orgName>
								<orgName type="institution">Vernadsky Crimean Federal University</orgName>
								<address>
									<settlement>Simferopol</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Platform for Testing and Dynamic Control of Software Code Based on Dimensions *</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">0449E9AAF5E5707088CAEBF8367D47BE</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T10:57+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>semantics of computing</term>
					<term>technology platform</term>
					<term>digital economy</term>
					<term>digital enterprise</term>
					<term>invariants of similarity</term>
					<term>dimensions</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>A possible platform for test automation and dynamic control of software code based on authoring models and methods of invariants of similarity and dimensions is considered. The development of the mentioned platform allowed organizing dynamic control of the program code of modern applications of digital enterprises with high reliability and reasonable complexity.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>1</head><p>The relevance of research</p><p>The relevance of developing a platform to automatize the testing and dynamic control of the software code of digital platforms is explained by the need to ensure the required quality and speed of development of the relevant software (Qa&amp;testing), and the imperfection of known methods of testing and verification of the software code in the context of a large-scale digital transformation of leading state and commercial enterprises in Russia.</p><p>Currently, the following main solutions are used to test digital enterprise applications: Katalon (https://www.katalon.com/), TestComplete (http://tiny.cc/xyt5cz), Re-portPortal (https://reportportal.io), TestRail (https://bit.ly/2kfTbia), Aquality Automation (https://aquality-automation.ru/) <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref>.</p><p>The advantages of the first Katalon solution (takes up 2.5% of the world market of automated testing tools) include: own development environment with project templates; developed components for analysis of test results; scripting tools (Record &amp; Play). Disadvantages of Katalon include: lack of native support for Desktop application automation; focus on applications written only in Java and Groovy programming languages; lack of flexibility when distributed runs are needed; lack of web version and user interface overload etc.</p><p>The advantages of the second Test Complete, Smartbear Software solution (occupies at least 5% of the world market of automated testing tools) include: support for different types of interfaces; the ability to write scripts in different programming languages; a well-established product support process. Disadvantages of Test Complete include: the inability to store the testing history; limited IDE compared to Visual Studio, Idea Jetbrains, etc.; the need for licensing (not distributed free of charge).</p><p>The advantages of the third solution ReportPortal (occupies from 2.5% of the world market of automated testing tools) include: support for most Test Runners; possibility of a joint analysis of results; automatic analysis of test results. Disadvantages of Reportportal include: limited ability to develop new tests; complex structure of stored results.</p><p>Advantages of the fourth Test Rail solution, An Idera Inc. (occupies up 7% of the world market of automated testing tools) include: a functionally rich structure for organizing tests; a REST API for integration with other systems; and a JIRA defect tracking subsystem. Disadvantages of Test Rail include the lack of a system for generating automated tests; and the lack of visual analysis of test results.</p><p>Advantages of the fifth solution Aquality Automation (occupies up to 4% of the world market of automated testing tools) include: a single user-friendly interface for writing and maintaining tests; fast generation, development and launch of automated tests for various types of products (web, mobile, desktop); advanced algorithms for automatically determining the causes of test failures; formation, maintenance and management of a set of tests for a product and a test data storage system; automatic collection, aggregation and visualization of automated testing results; collection and provision of access to testing artifacts for further analysis; reduction of labor costs for regression testing by 15 times, the time of its implementation -by 5 times; integration with continuous build systems, maintaining a lifecycle for detected test failures; integration with cloud testing platforms.</p><p>In practice, testing applications of the digital economy, the listed solutions have shown themselves as follows. ReportPortal is effective for pre-scripted automated tests that require analysis of test execution. TestRail is a convenient test storage tool but does not allow using written tests to automate testing. TestComplete provides a tool to automate the application interface but does not provide an analytic system to enable launches and analysis. Aquality Automation combines solving most of the problems in one interface and allows organizing the process of automated testing of digital economy applications in general.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Description of the proposed approach</head><p>The proposed QA &amp; Testing platform for automated testing of digital economy applications is based on several well-known and author's models and methods of software testing and analytical program verification <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref>. This platform includes a Web portal (Database, Backend and Frontend), as well as corresponding modules for organizing and conducting automated testing of digital economy applications. Thus, a web application provides an interface for developing tests, grouping them into sets, and visualizing test results. This web application consists of the following components: database; Database; Backend and Frontend component. In this case, the components are packaged into a docker image and distributed further in the form of an image. MySQL database is used as Database (it is possible to use other well-known databases). The purpose of the Database is to store any static information: descriptions of tests, launches and their results. SQL procedures are used to optimize work with Database and speed up query processing.</p><p>Backend is a portal with REST API for interacting with other platform components. At the same time, the REST API is developed using technologies: Java, Servlet API, Spring Framework. The Backend component contains methods for processing test results from different test runners (for example, TestNG, JUnit, MSTest, RobotFramework, etc.). The backend also provides interfaces for sending data to the platform, including test results, new tests, etc.</p><p>The frontend is responsible for visualizing the information received from the database. The user graphical interface is developed using TypeScript, AngularJS, HTML5 technologies. Using the graphical interface, the user can analyze the results obtained in the form of graphs, tables. Also, the user can flexibly manage data using filters and a search system that provides hints based on historical and analyzed information.</p><p>Also, the QA &amp; Testing platform contains several modules for automating application types: web, mobile, desktop. Each such module can use various combinations of free automation tools and programming languages. For example, a module for working with Java is designed to automate testing of web applications and is an add-on to the tool for working with a browser via WebDriver. This module allows you to automate web tests for Chrome, Firefox, Safari, IExplorer, Edge. At the same time, tests can be run under the control of an operating system with JDK version 8 and higher installed on it.</p><p>The QA &amp; Testing platform supports integration with the most popular Continuous Integration systems (Jenkins, TeamCity, Azure VSTS, Atlassian Bamboo) to run automated tests. At the same time, the system provides a common interface for launching regardless of which Continuous Integration system the integration is configured with. The launcher provides a set of parameters (data files, browser settings, applications, etc.) that are used to automate testing a product with specified parameters.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2.1</head><p>An example of checking the semantics of applications.</p><p>Consider an operator of the form:</p><formula xml:id="formula_0">1     E D C B A . (<label>1</label></formula><formula xml:id="formula_1">)</formula><p>In terms of dimensions, we obtain three corresponding dimensional equations (2-4):</p><formula xml:id="formula_2">      0 ln ) 1 ( ln ) 1 ( ln ) 1 (         C B A , (2)       0 ln ) 1 ( ln ) 1 ( ln ) 1 (        E D A , (3)     0 ln 1 1   A . (<label>4</label></formula><formula xml:id="formula_3">)</formula><p>If in (1) we consider a numeric constant as a variable (for example, with the name CONST_1) of a certain dimension, then operator (2) will add six variables (A, B, C, D, E, CONST_1) to the system of constraints. Equation (2) will also change -it will take the following form:</p><formula xml:id="formula_4">      0 1 _ ln ) 1 ( ln 1 1 1      CONST A . (<label>5</label></formula><formula xml:id="formula_5">)</formula><p>As a result, variable A will remain in the system with a nontrivial value until the completion of the calculations <ref type="bibr" target="#b6">[7]</ref>.</p><p>Correctness assertion. Such a change in the status of numeric constants makes it possible to determine the criterion for the semantic correctness of the Technological platform of some digital enterprise in the following form <ref type="bibr" target="#b7">[8]</ref>:</p><p>Statement 1. For the semantic correctness of the Technological platform of a digital enterprise, the system of dimensional equations built for it with regard to numerical constants must have at least one solution vector among the set of solution vectors, consisting of all nonzero components.</p><p>Proof of the statement (by contradiction). The appearance among the variables corresponding to dimensions, such that is identically equal to zero for any values of other variables, means its dimensionlessness. However, this contradicts the condition for constructing a system of restrictions, namely the introduction of dimensions for all variables and process constants. The statement is proven.</p><p>For the numerical verification of the criterion, based on the matrix S of coefficients, we construct a system of equations for the dimension of the matrix R, which has a special form:</p><formula xml:id="formula_6">k n k k k n k n c c c c c c R     , 1 , ,<label>2 1 , 2 , 1 1 , 1</label></formula><p>... The matrix R in this form can be represented by the following formula:</p><formula xml:id="formula_7">) ( | k n k k k n k C E R      , (<label>7</label></formula><formula xml:id="formula_8">)</formula><p>where E is the identity matrix, k and n are the number of rows and columns of the original matrix S, respectively.</p><p>To construct a matrix R, it is sufficient to use three types of operations:</p><p>1. addition of an arbitrary row of the matrix with a linear combination of other rows; 2. permutation of lines; 3. permutation of columns.</p><p>The main course of the process of achieving a form is similar to the Jordan-Gauss method (see, for example, <ref type="bibr" target="#b7">[8]</ref>). The difference is as follows:</p><p>─ double pass of the algorithm: first in the forward (top to bottom), and then in the opposite (bottom to top) direction; ─ permutation of columns in cases where a nonzero value in any cell within the first k columns, which is not the first nonzero in a row, cannot be turned into zero due to the absence of other nonzero members in this column <ref type="bibr" target="#b7">[8]</ref>.</p><p>As applied to the solution of the system of dimensional constraints, the matrix R is identical to the matrix S, except for possibly performed column permutations. That is, there is an equivalent</p><formula xml:id="formula_9">) 0 ( ) 0 (       X T R X S , (<label>8</label></formula><formula xml:id="formula_10">)</formula><p>where T is a square permutation matrix of dimension n  n corresponding to the permutations of columns in S performed at the stage of constructing R. This result is due to the nature of the transformations performed on the matrix S in the process of constructing the matrix R.</p><p>Correctness conditions. Formula (8) allows using not the matrix S, but the matrix R when checking the semantic correctness. For this, we formulate the following statement:</p><p>Statement 2. For the first k values of the solution vector of the system of constraints of the i-th component to be identically equal to zero, it is necessary and sufficient that all the elements in the i-th row of the matrix C in the formula be equal to zero.</p><p>Let us prove the necessity of the condition (by contradiction). Let there be at least one nonzero element in the i-th row of the matrix C (for example, in position j). Then, set equal to zero all (nk) last variables except for the (k + j) th, we obtain the following equality:</p><formula xml:id="formula_11">0 0 0 , , 1 , , 1                j k j i k n j q q q i i k i p p p x c c x x  (9) j k j i i x c x     , ,<label>(10)</label></formula><p>from which it follows that in this case, the variable xi is not equal to zero. We got a contradiction. The necessity of the condition is proved.</p><p>Let us prove the sufficiency of the condition. If all elements of the i-th row of matrix C are equal to zero, we obtain the following equality:</p><formula xml:id="formula_12">0 0 0 1 , 1             k n q q k i k i p p p x x x ,<label>(11)</label></formula><p>from which the required identity is obtained directly.</p><formula xml:id="formula_13">0  i x . (<label>12</label></formula><formula xml:id="formula_14">)</formula><p>The statement is proven.</p><p>The variables corresponding to the first k columns of the matrix R are basic (independent) in the given system of dimension invariants. The variables corresponding to the remaining columns of the R matrix are dependent. Thus, the above statement determines the relationship between the incident of anomalous functioning of the Technological platform of a digital enterprise and the situation when one of the basic variables has the dimension "0". The reason for this relationship is that the situation of dimension "0" is impossible according to the methodology for constructing a system of invariants of dimension.</p><p>Assessment of the results obtained. This technique (with complete construction of the matrix R) is the basis for the construction of optimized algorithms for testing the criterion. As input data, the algorithm uses a matrix of dimension k  n with elements from Z, the result of the work is a Boolean variable, which has the value "True" if the criterion of semantic correctness is met and "False" otherwise. The intermediate results of the algorithm are: ─ matrix C of dimension k  (nk) with elements from the set of rational numbers Q, corresponding to the matrix S in the form (8); ─ the value of kERR, equal to 0, if the criterion of semantic correctness is fulfilled, or the number of the first row of the matrix C, consisting only of zero elements if a violation of the criterion is found.</p><p>In practice, when using the basic technique, a variation of the algorithm for constructing the matrix R is possible, which consists in creating it directly during the analysis of each operator of the computational process under study. The allocation of basic variables and the necessary computational transformations over R are performed each time a new line is added to it. The purpose of the modification is to have a matrix of dimensionality constraints already reduced to the form <ref type="bibr" target="#b6">(7)</ref> at each analysis step.</p><p>This algorithm allows:</p><p>─ eliminate the computational costs associated with the late (within the framework of the Jordan-Gauss algorithm) permutation of the matrix columns; ─ to reduce the number of computational operations during the selection of the identity matrix on the left side of the matrix R.</p><p>The algorithm requires additional storage of the permutation matrix T at the entire stage of the analysis of the Technological platform of the digital enterprise and somewhat slows down the access to the matrix elements. However, the use of efficient data structures makes it possible to reduce the additional costs to a negligible amount. The construction of the matrix R allows us to detect an incident of anomalous functioning of the mentioned Technological platform before the end of the entire construction (however, it is not at all necessary that the criterion of semantic correctness is violated at the moment of adding information about a semantically incorrect operator). This fact is an advantage of the modified technique in the case of a large number of erroneous packets (intentionally or unintentionally generated). In this case, the receiving station L, having not yet decoded the message completely, can decide to ignore it, thereby freeing up its computational resources. This possibility of the technique can be used when it is included in a layered system of protection against cyber attacks of the "denial of service" class. The possibility of early rejection of the packet does not affect the average statistical computational complexity under normal operating conditions. This is since in such conditions the proportion of abnormal implementations of processes in the network protocol stack should tend to zero <ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Conclusions</head><p>The lack of proper tools for automated testing and analytical verification of digital economy applications can lead to an organization: ─ significant financial losses due to complete failure of the system and shutdown of work due to poor quality, incomplete or untimely testing; ─ loss of existing and potential clients due to failure to complete tasks on time; ─ loss of business reputation, which has been created over the years and has a value in terms of investment and impact on income <ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref>.</p><p>Note that manual testing and analytical verification of digital economy applications are not always effective, since there is a risk of missing defects due to the human factor, as well as the need to attract a large number of highly qualified engineers, mathematicians and testers (up to 50 people).</p><p>The proposed solution -the QA &amp; Testing platform -for automated testing and analytical verification of digital economy applications provides: ─ completeness, reliability and consistency of testing and dynamic control of the program code of digital platforms; ─ the ability to dynamically control not only the structure but the semantics of digital economy applications; ─ the efficiency of detecting "digital bombs" and destructive program code of digital platforms; ─ reducing the cost of ensuring the security and cyber resilience of digital platforms in the long term.</p></div>		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This work was supported by the RFBR grant (No. 18-47-160011 p_a)</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Methodological Framework for Analysis and Synthesis of a Set of Secure Software Development Controls</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Barabanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Markov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Tsirlov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Theoretical and Applied Information Technology</title>
		<imprint>
			<biblScope unit="volume">88</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="77" to="88" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Approach to Building a Cyber Threat Prevention System</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">N</forename><surname>Biryukov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Lomako</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Problems of Information Security</title>
				<meeting><address><addrLine>St. Petersburg, Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="13" to="19" />
		</imprint>
		<respStmt>
			<orgName>Computer systems ; Publishing house of Polytechnic University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<author>
			<persName><forename type="first">Petrenko</forename><surname>Sergei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Cyber Resilience</title>
		<title level="s">Series in Security and Digital Forensics</title>
		<imprint>
			<publisher>River Publishers</publisher>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page">207</biblScope>
		</imprint>
	</monogr>
	<note>Ebook. 1st ed</note>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation</title>
		<author>
			<persName><forename type="first">Petrenko</forename><surname>Sergei</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-79036-7©2018</idno>
		<ptr target="https://doi.org/10.1007/978-3-319-79036-7©2018" />
		<imprint>
			<date type="published" when="2018">2018</date>
			<publisher>Springer Nature</publisher>
			<biblScope unit="page">249</biblScope>
		</imprint>
		<respStmt>
			<orgName>Nature Switzerland AG</orgName>
		</respStmt>
	</monogr>
	<note>XXVII. 93 illus</note>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Cyber Security Innovation for the Digital Economy: A Case Study of the Russian Federation</title>
		<author>
			<persName><forename type="first">Petrenko</forename><surname>Sergei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Series in Security and Digital Forensics</title>
		<imprint>
			<biblScope unit="page">490</biblScope>
			<date type="published" when="2018">2018</date>
			<publisher>River Publishers</publisher>
		</imprint>
	</monogr>
	<note>Ebook. 1st ed</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Cyber-resilience concept for Industry 4.0 digital platforms in the face of growing cybersecurity threats</title>
		<author>
			<persName><forename type="first">Sergei</forename><surname>Petrenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elvira</forename><surname>Khismatullina</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-29852-4</idno>
		<ptr target="https://www.springer.com/gp/book/9783030298517" />
	</analytic>
	<monogr>
		<title level="m">Software Technology: Methods and Tools, 51st International Conference, TOOLS 2019</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Mazzara</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J.-M</forename><surname>Bruel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Meyer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Petrenko</surname></persName>
		</editor>
		<meeting><address><addrLine>Innopolis, Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">October 15-17, 2019</date>
		</imprint>
	</monogr>
	<note>Proceedings. Editors. Softcover</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Method of improving the Cyber Resilience for Industry 4.0. Digital platforms</title>
		<author>
			<persName><forename type="first">Sergei</forename><surname>Petrenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elvira</forename><surname>Khismatullina</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-29852-4</idno>
		<ptr target="https://www.springer.com/gp/book/9783030298517" />
	</analytic>
	<monogr>
		<title level="m">Software Technology: Methods and Tools, 51st International Conference, TOOLS 2019</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Mazzara</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J.-M</forename><surname>Bruel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Meyer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Petrenko</surname></persName>
		</editor>
		<meeting><address><addrLine>Innopolis, Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">October 15-17, 2019</date>
		</imprint>
	</monogr>
	<note>Proceedings. Editors. Softcover</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Method of Ensuring Cyber Resilience of Digital Platforms Based on Catastrophe Theory</title>
		<author>
			<persName><forename type="first">S</forename><surname>Petrenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">E</forename><surname>Vorobieva</surname></persName>
		</author>
		<idno type="DOI">10.1109/SCM.2019.8903658</idno>
	</analytic>
	<monogr>
		<title level="m">XXII International Conference on Soft Computing and Measurements (SCM)</title>
				<meeting><address><addrLine>St. Petersburg, Russia</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">N</forename><surname>Biryukov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proc. SPIIRAS</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">40</biblScope>
			<biblScope unit="page" from="55" to="76" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Approach to the processing of knowledge in the memory of an intellectual system</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">N</forename><surname>Biryukov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Glukhov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Pilkevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">R</forename><surname>Sabirov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Natural and technical sciences</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="455" to="466" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Advancing Cyber Resilience Analysis with Performance-Based Metrics from Infrastructure Assessment</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Vugrin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Turgeon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Cyber Behavior: Concepts, Methodologies, Tools, and Applications</title>
				<meeting><address><addrLine>Hershey, PA</addrLine></address></meeting>
		<imprint>
			<publisher>IGI Global</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="2033" to="2055" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">The appearance of anticipatory systems to prevent the risks of cyber threat realization</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">N</forename><surname>Biryukov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lomako</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><forename type="middle">G</forename><surname>Rostovtsev</surname></persName>
		</author>
		<idno type="DOI">10.15622/sp.39.1</idno>
		<idno>DOI:</idno>
		<ptr target="http://dx.doi.org/10.15622/sp.39.1" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of SPIIRAS</title>
				<meeting>SPIIRAS<address><addrLine>Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="5" to="25" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Approach to constructing a consistent theory of synthesis of scenarios of anticipatory behavior in a conflict</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">N</forename><surname>Biryukov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">G</forename><surname>Rostovtsev</surname></persName>
		</author>
		<idno type="DOI">10.15622/sp.38.6</idno>
		<ptr target="https://doi.org/10.15622/sp.38.6" />
	</analytic>
	<monogr>
		<title level="j">Proc. SPIIRAS</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">38</biblScope>
			<biblScope unit="page" from="94" to="111" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Advancing Cyber Resilience Analysis with Performance-Based Metrics from Infrastructure Assessment</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Vugrin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Turgeon</surname></persName>
		</author>
		<idno type="DOI">10.4018/jsse.2013010105</idno>
	</analytic>
	<monogr>
		<title level="m">Cyber Behavior: Concepts, Methodologies, Tools, and Applications</title>
				<meeting><address><addrLine>Hershey, PA</addrLine></address></meeting>
		<imprint>
			<publisher>IGI Global</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="2033" to="2055" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">IRGC Resource Guide on Resilience</title>
		<idno type="DOI">10.5075/epfl-irgc-262527</idno>
		<editor>Florin, M. V., &amp; Linkov, I.</editor>
		<imprint>
			<date type="published" when="2016">2016</date>
			<publisher>EPFL International Risk Governance Council (IRGC</publisher>
			<pubPlace>Lausanne</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
