<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Safety Monitoring of the Automated City Water Supply Management System Based on PSIM and SIEM Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Dmitrii</forename><surname>Orel</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">North Caucasus Federal University</orgName>
								<address>
									<addrLine>Pushkina st., 1</addrLine>
									<postCode>355017</postCode>
									<settlement>Stavropol</settlement>
									<country key="RU">Russian Federation</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tatyana</forename><surname>Guseva</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">North Caucasus Federal University</orgName>
								<address>
									<addrLine>Pushkina st., 1</addrLine>
									<postCode>355017</postCode>
									<settlement>Stavropol</settlement>
									<country key="RU">Russian Federation</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Safety Monitoring of the Automated City Water Supply Management System Based on PSIM and SIEM Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">0FA9EE75F27DE624BFB542B50F822EE3</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T18:59+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Security systems integration</term>
					<term>industrial facility</term>
					<term>SIEM system</term>
					<term>PSIM system</term>
					<term>Darvis softwar</term>
					<term>automated process control system</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article is about the integration of monitoring functions of industrial facility security systems based on the PSIM system. The water supply company of a large city acts as an industrial facility. The analysis of the company structure and its security systems, as well as the means of physical security is done. The functionality of SIEM and PSIM systems is considered. At the end of the article, the algorithm for the operation of the Darvis platform, interacting with the video surveillance system and the existing pressure monitoring sensors in the city's water supply, was developed. The integration of the video surveillance system and the Darvis software will allow it use it as a single platform for providing a comprehensive security system and rapid response to incidents at the city's water supply company. Rapid response to accidents in the water supply line or at pumping stations will reduce water losses, which will reduce financial damage to the company.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>According to the report by the Russian company Positive technologies, working in the field of information security, the number of attacks on industrial and energy companies has increased since 2020 (Figure <ref type="figure">1</ref>). The number of such attacks in 2020 increased by 91% compared to 2019. Basically, this industry has been attacked by ransomware operators, in particular RansomExx, Netwalker, Clop, Maze, Ragnar Locker, LockBit, DoppelPaymer, Snake. The last of them removes shadow copies before starting encryption, and has functions that allow to forcibly stopping processes in the automated control system. Due to the attacks, some companies, such as Huber+Suhner and Honda, were forced to suspend production.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Number of attacks on industrial and energy companies</head><p>AISMA-2021: International Workshop on Advanced in Information Security Management and Applications, October 1, 2021, Stavropol, Krasnoyarsk, Russia EMAIL: kde.def@gmail.com (Dmitrii Orel); tatyana.petrova.96@bk.ru (T. M. Guseva) ORCID: 0000-0002-3433-2164 (Dmitrii Orel); 0000-0002-0291-635X (T. M. <ref type="bibr">Guseva)</ref> There is a lot of production infrastructure in Russia, including automated process control systems, and it is of interest to intruders.</p><p>Modern automated process control systems have ceased to be autonomous and are increasingly integrated with information systems, forming unified automated information management systems.</p><p>For example, in this paper we consider an industrial facility -a water supply company of a large city, which is an automated water supply management system integrated with the enterprise information system.</p><p>In such a convergent system, various channels of information transmission are used. All this creates a wide range of threats to the information security of an industrial facility.</p><p>The purpose of the work is to increase the efficiency of industrial facility security systems by creating a security monitoring system. The hypothesis is that combining information from sensors of various security systems will a) reduce the time for making decisions to prevent an incident b) increase the accuracy of management decisions in the field of security c) reduce the number of false notifications about information security incidents.</p><p>To monitor information systems for managing security incidents at the enterprise SIEM systems can be used. They monitor information systems, analyze real-time security events emanating from network devices, information security tools, IT services, system and application infrastructure, and help detect information security incidents. SIEM systems provide limited opportunities for cybersecurity of industrial facilities, they do not allow taking into account data on the infrastructure of industrial facilities, taking into account physical security issues. As a result, an industrial facility is exposed to a greater number of threats that cannot be controlled. Integration of SIEM systems and SCADA dispatch control and data collection systems allows to solve this problem. Integration will allow SIEM systems to receive data generated by systems that allow monitoring of industrial facilities <ref type="bibr" target="#b0">[1]</ref>.</p><p>Information protection in an automated process control system is achieved by taking a set of organizational and technical information protection measures aimed at blocking (neutralizing) threats to information security, the implementation of which may lead to a violation of the normal functioning of the automated control system and the controlled object and (or) process, localization and minimizing the consequences of the possible implementation of threats to information security, restoration of the normal mode of functioning of the automated control system in case of information security threats <ref type="bibr" target="#b1">[2]</ref>.</p><p>Thus, the integrated security system of industrial facilities, in addition to monitoring the safety of production processes, should also monitor threats related to information security.</p><p>It should be pointed that the integration of SIEM and SCADA requires the creation of a complex model that allows describing incidents and incident response algorithms based on data obtained from heterogeneous information systems. In this paper, it is proposed to develop an algorithm for integrating the video surveillance system of an industrial facility of a water supply enterprise with the Darvis software product.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Analysis of the structure and security systems of an industrial facility</head><p>The water supply company operates in the field of housing and communal services of a large city. The main types of services provided by the company are cold water supply and sanitation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Analysis of the organizational structure of the company</head><p>The functions of the company are presented on Figure <ref type="figure" target="#fig_0">2</ref>. Modern water supply and sewerage systems are a set of structures, mechanisms and equipment, all parts of which must work together accurately and without failures. These include water intake structures, water treatment plants, water supply and sewerage networks with their servicing devices, pumping stations, as well as internal water supply and sewerage systems of buildings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">The need to integrate industrial facility security systems</head><p>The company manages complex and geographically distributed processes for water supply and sanitation in the city. Radio channel communication is used to transmit information from sensors to dispatch control and data collection systems. The exchange between the SCADA system and the operator's ARM takes place over an Ethernet network.</p><p>Automated process control systems have two actual threats that allow to disrupt and intercept the management of the enterprise:</p><p>1. The threat of disruption of the technological / production process due to time delays introduced by the means of protection. 2. The threat of interception of control by an automated process control system. Information protection in an automated process control system is achieved by adopting, within the framework of the automated control system protection system, a set of organizational and technical information protection measures aimed at blocking information security threats, the implementation of which may lead to a violation of the normal functioning of the automated control system and the controlled process, to localize and minimize the consequences of the possible implementation of information security threats, restoration of the normal mode of functioning of the automated control system in case of information security threats.</p><p>To ensure the full operation of the enterprise, as well as the ability to eliminate the implementation of security threats, the integration of physical security means of the enterprise's automated control system with a SIEM system that allows analyzing security events in real time coming from network devices, information security tools will help.</p><p>Using the Methodology for assessing information security threats, three negative consequences that may occur from the implementation (occurrence) of information security threats were identified. The objects of influence: operator's workstation, database, controller for process control, controller for water treatment process control, programmable logic controller (PLC) for pumping station control. The main categories of violator (internal, external), the type of violator and possible goals of information security threats are considered.</p><p>The following categories of people can be identified as actual violators (Table <ref type="table" target="#tab_0">1</ref>): </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Analysis of the automated process control system of the water supply company</head><p>Significant difficulties of technological management at the enterprise arise as a consequence of the geographical remoteness of the objects of control and management from each other: technological objects are arbitrarily located throughout the city and beyond. Therefore, management tasks, first of all, require the creation of an effective system for collecting and transmitting information about the parameters and operating modes of technological equipment at various remote facilities. An automated control system (automated process control system) is used to control and conveniently manage the technological processes of the enterprise. The automated process control system allows:</p><p>• Create dispatching control of the technological process of water supply and sanitation;</p><p>• Provide centralized control of parameters;</p><p>• Predict and prevent emergency situations related to the operation of technological equipment;</p><p>• Control technological processes, optimize and improve the efficiency of work at the pumping station;</p><p>• Minimize the impact of the human factor on the technological process;</p><p>• To carry out automatic transmission of the agreed information to the control room of the water supply company;</p><p>• Keep commercial records of pumped water, energy carriers and electricity;</p><p>• Extend the service life of the units;</p><p>• Reduce personnel labor costs by automating control and management functions;</p><p>• Increase the safety of the technological process for personnel and the environment. The automated process control system combines several levels of hardware:</p><p>1. Sensors and actuators.</p><p>2. SCADA controllers.</p><p>3. Computer connecting the operator's workstation and SCADA controllers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.">Analysis of the means of physical security of the water supply company</head><p>As means of physical security at the enterprise are provided:</p><p>• Access control and management system for the territory and individual premises of the enterprise;</p><p>• Security and fire alarm system; • Video surveillance system. All security features have events recorded in special logs. Appropriate security personnel are assigned to each means of protection. Actually, they can view service information in the event logs. Figure <ref type="figure" target="#fig_1">3</ref> shows the general structure of the location of the physical security facilities of the water supply company.   <ref type="figure" target="#fig_1">3</ref> shows that in order to fully assess the security status of an industrial facility, a security officer must first visit all the points in order to present a picture of what is happening in the building. The lack of interconnection between the means of physical security will complicate the work of the employee and complicates the possibility of early prevention or rapid response in the event of information security attacks affecting the performance of technological processes of the enterprise.</p><p>By enabling a security service specialist to see the interconnected state of physical and information security of an enterprise, it is possible to significantly simplify its work and improve its quality. The specialist will not have to spend time collecting information from various journals, and conduct a long analysis. He will be able to react in a timely manner or even in advance to the incident, preventing an emergency or a malfunction of the enterprise. This problem will be solved by the introduction of a SIEM system at the enterprise, which will monitor the information system, analyze security events in real time coming from network devices, information security tools. It will be necessary to integrate the existing means of physical security of the enterprise with the installed SIEM system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Analysis of ways to integrate security systems</head><p>To date, the number of enterprises that use SIEM systems in their information security management centers to ensure cybersecurity is increasing. Information security management centers use a variety of means to protect important information, which in most cases keep a log of all incidents.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Functional analysis of the SIEM system</head><p>Every year the number of means of protection increases, and it becomes more difficult for information security specialists to process accumulated records in incident logs. At the same time, if you do not analyze emerging threats in a timely manner and do not try to prevent them, then any protection system will be useless. Under these conditions, you should think about using Security Information and Event Management (SIEM) class systems. As a rule, in serious companies with a mature information security function, there are monitoring and response centers where SIEM systems are used <ref type="bibr" target="#b2">[3]</ref>. There are often situations when attackers use complex and distributed methods of accessing information, while security tools may not react to such incidents, considering them frivolous. However, if you analyze all the minor incidents, you can form a more visual picture that will indicate a serious attack. It is precisely these properties that characterize modern SIEM systems, they are able to detect attacks by post-analysis of events, by minor incidents, as well as anomalous phenomena in the system.</p><p>Consider the generally accepted definition of a SIEM system <ref type="bibr" target="#b2">[3]</ref>. SIEM (Security Information and Event Management) -solutions that monitor information systems, analyze real-time security events originating from network devices, information security tools, IT services, system and application infrastructure, and help detect information security incidents. SIEM are provided by providers as hardware devices, software or services and are used to collect and process events, alerts, generate reports and visualize information security violations. It should be noted right away that SIEM systems are designed to monitor and respond to incidents, but do not allow you to protect yourself from threats or prevent negative events <ref type="bibr" target="#b3">[4]</ref>. As a rule, these systems appeared much earlier than their application was in demand.</p><p>SIEM systems are used to solve the following tasks <ref type="bibr" target="#b2">[3]</ref>:</p><p>• Data consolidation, collection of information security events from various sources (network devices and IT services, security systems, operating systems, databases, business applications);</p><p>• Storing security events from various sources in historical order for retrospective analysis and identification of chains of actions that caused security incidents;</p><p>• Correlation and processing of security events, the use of various techniques to compare audit data from various sources and identify significant information;</p><p>• Providing tools for expert analysis of events and analysis of security incidents with the ability to search through a variety of parameters and build models of the relationship of events with each other;</p><p>• Contextual enrichment of incidents with information about the belonging of the data affected in the IB events to certain business applications, employees of the organization and processes, their criticality for business or vulnerability to threats based on information from security systems and vulnerability scanners;</p><p>• Automatic notification of the security administrator via the SIEM interface through integration with the application accounting system, as well as by e-mail, SMS, etc.</p><p>Examples of Russian SIEM systems:</p><p>• COMRADE; • Garda Analytics; • MaxPatrol.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Analysis of the PSIM system functionality</head><p>It should be noted that SIEM systems, like others, evolve over time. As a result of this development, SIEM systems have subclasses with various functional extensions: SOAR, COM, PSIM. In particular, PSIM systems allow not only to collect incident data from network devices, like classic SIEM systems, but also to work with physical security systems and automated process management systems, while PSIM systems not only collect data and generate warnings, but also have the ability to monitor the operation of equipment.</p><p>Since it is important for an industrial facility to control the situation using a video surveillance system, PSIM systems are considered in the work.</p><p>For the most part, SIEM systems work as network hosts (information system). PSIM systems are used to work with physical security systems and automated control systems.</p><p>One of the main additions of PSIM systems is working with video information, which is very important for monitoring the situation at industrial facilities, since the video surveillance system at such facilities is an integral part of physical security. They have connectors to hundreds of models of physical security devices, the rules system allows you to send only important information to the SIEM system, and video data can be transmitted to the SIEM system as a link to the PSIM interface.</p><p>Examples of PSIM systems:</p><p>• Darvis; • ESM -PSIM;</p><p>• CoordCom. One of the representatives of the PSIM system is the Darvis software product developed by Infocom-S LLC. The main task of Darvis is the qualitative integration of all existing systems of the facility to ensure full control and management without the use of additional technical units and with minimal participation of employees <ref type="bibr" target="#b4">[5]</ref>. Therefore, we will choose it as an integrated system for a water supply company. Below we will consider the algorithm for handling security incidents of the Darvis platform.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">The algorithm of integration of the video surveillance system of the water supply company and the software product "Darvis"</head><p>As part of the work, the algorithm for the operation of the Darvis platform will be developed, interacting with the video surveillance system and the existing pressure monitoring sensors in the city's water supply.</p><p>Figure <ref type="figure" target="#fig_3">4</ref> shows an interface for creating an event management algorithm for the Darvis platform. The algorithm for processing an emergency situation will be developed in such a way that it will allow to form a division of alerts into:</p><p>• The presence of a high level of danger of an incident that has occurred, which requires immediate notification of the responsible person, and requires an ultra-fast response to eliminate. In this case, the notification to the employee can come in the form of SMS messages, e-mail messages and information output to the computer monitor through integration with the SIEM system, as well as information output to the dashboard;</p><p>• The presence of a situation that is not so dangerous, and does not need urgent elimination and response. The alert does not require immediate attention, so it will be implemented only on the workplace monitor.</p><p>The response algorithm should be developed taking into account the following aspects of the company's work:</p><p>1. Sensors measuring water pressure in water pipes are placed at water supply and discharge sites, pumping stations; 2. There are automatically controlled valves for the supply or emergency shutdown of water in the city; 3. In the chambers and pumping stations within the radius of the placement of sensors, video surveillance of what is happening is conducted; 4. Any changes in the water pressure level are recorded and transmitted to the operator's workstation, after which the operator analyzes the surveillance cameras in the relevant areas and takes measures to eliminate the situation.</p><p>The developed algorithm assumes automating point 4, presented above. Until the operator finds the necessary sensor in the video surveillance system, examines the picture of the accident on the line, and then contacts the head of the emergency repair team, and until the employees arrive at the accident site, a long period of time will pass.</p><p>The Darvis system will allow you to automatically monitor these emergency situations and promptly respond to the resolution of the situation, depending on the actions laid down in the algorithm. For example, with a significant decrease in pressure, the system itself will display an image from the surveillance cameras of the area where the deviation from the norm occurred on the operator's monitor. In the case when the pressure in the pipeline has significantly decreased or has become zero at all, the system will determine this situation as a burst of the pipeline and immediately automatically take action to close the valves on this section of the line. Thus preventing damage caused to the city (blurring of roads, etc.), to individuals (flooding of the yard territory of private houses, causing harm to the health of passers-by, due to the release of a huge amount of water under high pressure, etc.), as well as the loss of a large amount of water for the organization itself. The above algorithm can be represented as follows (Figure <ref type="figure" target="#fig_4">5</ref>). The work on the integration of the video surveillance system and the Darvis software will allow it to be used as a single platform for providing a comprehensive security system and rapid response to incidents. Rapid response to accidents in the water supply line or at pumping stations will reduce water losses, which will reduce material damage to the enterprise.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Functions of water supply company</figDesc><graphic coords="3,72.43,72.00,450.15,215.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: The general structure of the location of physical security facilities of the water company</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure</head><label></label><figDesc>Figure3shows that in order to fully assess the security status of an industrial facility, a security officer must first visit all the points in order to present a picture of what is happening in the building. The lack of interconnection between the means of physical security will complicate the work of the employee and complicates the possibility of early prevention or rapid response in the event of information security attacks affecting the performance of technological processes of the enterprise.By enabling a security service specialist to see the interconnected state of physical and information security of an enterprise, it is possible to significantly simplify its work and improve its quality. The specialist will not have to spend time collecting information from various journals, and conduct a long</figDesc><graphic coords="5,113.80,370.07,367.39,263.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Interface for creating an algorithm for managing events of the Darvis platform</figDesc><graphic coords="8,109.25,72.00,375.84,191.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: The general structure of the location of the physical security facilities of the water supply company</figDesc><graphic coords="9,71.99,72.46,451.05,585.13" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Current threats and violators of information security</figDesc><table><row><cell>#</cell><cell>Type of violator</cell><cell>Cat. of the violator</cell><cell cols="2">Object of influence Available interfaces</cell><cell>Methods of implementation</cell></row><row><cell></cell><cell>Persons</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>providing the</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>functioning of</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>1.</cell><cell>systems and networks or providing the operator's systems</cell><cell>internal</cell><cell>Information system database</cell><cell>Web user interface for accessing the information system database</cell><cell>Exploiting Database Management System configuration vulnerabilities</cell></row><row><cell></cell><cell>(administration</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>, security,</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>cleaners, etc.)</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>2.</cell><cell>System Administrators and Security Administrators</cell><cell>internal</cell><cell>Operator's computer</cell><cell>Access via the organization's local area network</cell><cell>Introduction of malicious software</cell></row><row><cell>3.</cell><cell>Former employees (users)</cell><cell>external</cell><cell>Information system database</cell><cell>Web user interface for accessing the information system database</cell><cell>Exploiting Database Management System configuration vulnerabilities</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Controller for</cell><cell></cell><cell>Data modification in</cell></row><row><cell>4.</cell><cell>Terrorist, extremist groupings</cell><cell>external</cell><cell>controlling technological processes of water purification Programmable logic controller (PLC) for control of pumping stations</cell><cell>Remote controller control channel Remote controller control channel</cell><cell>communication channel Introduction of malware Data modification in communication channel Introduction of malware</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Acknowledgements</head><p>The work was carried out using the equipment of the Center for Collective Use of North-Caucasus Federal University with financial support from the Ministry of Science and Higher Education of Russian Federation, unique project identifier RF ----2296.61321X0029 (agreement no. 075-15-2021-687).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">On Industrial Safety of Hazardous Production Facilities</title>
		<imprint>
			<date type="published" when="1997">1997</date>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page">116</biblScope>
		</imprint>
	</monogr>
	<note>Federal Law</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Host-based Method and System for Detecting Anomalies in Network Traffic for a Robotic System</title>
		<author>
			<persName><forename type="first">Elena</forename><surname>Basan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maria</forename><surname>Lapina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dmitry</forename><surname>Orel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Young Scientist&apos;s Third International Workshop on Trends in Information Processing (YSIP3 2019)</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<meeting>the Young Scientist&apos;s Third International Workshop on Trends in Information Processing (YSIP3 2019)<address><addrLine>Stavropol</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">September 17th to 20th, 2019. 2019</date>
			<biblScope unit="volume">2500</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Analysis of the problem of ensuring cybersecurity of industrial facilities based on SIEM systems</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">M</forename><surname>Guseva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Badun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Collection of materials of the II International Conference</title>
				<meeting><address><addrLine>Ufa</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="61" to="67" />
		</imprint>
	</monogr>
	<note>Innovation in the modern world: experience, problems and prospects for development</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The principle of operation and the typical structure of information security event management tools</title>
		<author>
			<persName><forename type="first">Alexey</forename><surname>Zolotukhin</surname></persName>
		</author>
		<author>
			<persName><surname>Vitalievich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alexander</forename><surname>Timokhovich</surname></persName>
		</author>
		<author>
			<persName><surname>Stepanovich</surname></persName>
		</author>
		<ptr target="https://cyberleninka.ru/article/n/printsip-raboty-i-tipovaya-struktura-sredstv-upravleniya-sobytiyami-bezopasnosti-informatsii" />
	</analytic>
	<monogr>
		<title level="j">Academy</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">25</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">The</forename><surname>Darvis Platform</surname></persName>
		</author>
		<ptr target="https://darvis.pro" />
		<title level="m">PSIM is a platform for managing and monitoring the security subsystems of an object</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<ptr target="https://strojdvor.ru/vodosnabzhenie/rascet-rashoda-vody/" />
		<title level="m">Calculation of water by pipe diameter and pressure: factors and methods</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Automated cyber and privacy risk management toolkit</title>
		<author>
			<persName><forename type="first">G</forename><surname>Gonzalez-Granadillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Menesidou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Papamartzivanos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Xenakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Romeu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Navaroo-Liobert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Okoh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nifakos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Xenakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Panaousis</surname></persName>
		</author>
		<idno type="DOI">10.3390/s21165493</idno>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">16</biblScope>
			<biblScope unit="page">549</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A method of forming code sets for CDMA in communication, navigation and control systems</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">V</forename><surname>Orel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Zhuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">P</forename><surname>Zhuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Luganskaia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2nd Young Scientist&apos;s International Workshop on Trends in Information Processing</title>
				<meeting><address><addrLine>YSIP2</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017-05">2017. May 2017</date>
			<biblScope unit="page" from="16" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">CEUR Workshop Proceedings</title>
		<imprint>
			<biblScope unit="volume">1837</biblScope>
			<biblScope unit="page" from="158" to="167" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Secured Access Control in Security Information and Event Management Systems</title>
		<author>
			<persName><forename type="first">L</forename><surname>Rikhtechi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Rafe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rezakhani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Systems and Telecommunication</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">33</biblScope>
			<biblScope unit="page" from="67" to="78" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Security information and event management (SIEM): Analysis, trends, and usage in critical infrastructures</title>
		<author>
			<persName><forename type="first">G</forename><surname>González-Granadillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>González-Zarzosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Diaz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">14</biblScope>
			<biblScope unit="page">4759</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Computer Modeling of Orthogonal in the Amplified Sense Signal</title>
		<author>
			<persName><forename type="first">Aleksandr</forename><surname>Zhuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Viktor</forename><surname>Sazonov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dmitrii</forename><surname>Orel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vladimir</forename><surname>Pashintsev</surname></persName>
		</author>
		<idno type="DOI">10.2991/csit-19.2019.37</idno>
	</analytic>
	<monogr>
		<title level="j">Atlantis Highlights in Computer Sciences</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="215" to="217" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Improved Method of Formation of an Increased Number of Binary Quasi-Orthogonal Code Sequence Systems with the Required Statistical and Correlation Characteristics</title>
		<author>
			<persName><forename type="first">P</forename><surname>Aleksandr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dmitrii</forename><forename type="middle">V</forename><surname>Zhuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Igor</forename><forename type="middle">A</forename><surname>Orel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrey</forename><forename type="middle">V</forename><surname>Kalmykov</surname></persName>
		</author>
		<author>
			<persName><surname>Studenikin</surname></persName>
		</author>
		<idno type="DOI">10.2991/csit-19.2019.36</idno>
	</analytic>
	<monogr>
		<title level="j">Atlantis Highlights in Computer Sciences</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="209" to="214" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise</title>
		<author>
			<persName><forename type="first">S</forename><surname>Eswaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Srinivasan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Honnavalli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Network Security</title>
		<imprint>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="7" to="16" />
			<date type="published" when="2021">2021. 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A concept of the architecture and creation for siem system in critical infrastructure</title>
		<author>
			<persName><forename type="first">R</forename><surname>Berdibayev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yevchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kishchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Studies in Systems, Decision and Control</title>
		<imprint>
			<biblScope unit="volume">346</biblScope>
			<biblScope unit="page" from="221" to="242" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
