<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Mathematical Machines and Systems</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>107</fpage>
      <lpage>117</lpage>
      <abstract>
        <p>In modern conditions of abrupt changes in the military-political situation, the problem of ensuring the security and cyber protection of computer systems of situational centers of critical infrastructure facilities are acquired particular importance. Information systems of situational centers of critical infrastructure need meticulous attention to methods and tools. The paper presents an analysis of the components of cybersecurity and dependability. The research is based on the ontological approach to their mutual impact, determining the features of the complex influence of random errors and deliberate attacks. Based on the analysis of the attributes of dependability and cybersecurity, a game model is proposed. In addition to the cyber-attack entity, the approach considers another allied player entity, accidental factors of artificial and natural origin. However, implementing these factors can destroy the computer system's software and/or hardware platforms. However, it can also significantly affect the level of technical and cryptographic protection of the system. It is shown that it is necessary to ensure trust in the design procedures, configuration management, and safe installation, which are potential steps for implementing loopholes. Using the concept of a tuple of information elements in the framework of the proposed game model, a single criterion of dependability and cybersecurity of the computer (specifically, information) system of the situation center is formulated. A generalized model of dependability and cyber protection of the information system of the situation center of the critical infrastructure facility has been built. The given model allows a complex estimation of the dependability capacity of situational centers. Cybersecurity of the situation center, criterion of dependability, criterion of confidentiality, Emerging Technology Trends on the Smart Industry and the Internet of Things, January 19, 2021, Kyiv, Ukraine ORCID: 0000-0001-6268-3204 (V. Grechaninov); 0000-0001-9131-9233 (H. Hulak); 0000-0002-9349-7946 (V. Sokolov); 0000-0002-77756039 (P. Skladannyi); 0000-0003-2908-970X (N. Korshun)</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>reliability of critical infrastructure.</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        The complex and multifaceted challenges facing Critical Infrastructure Information Center (CIS)
information systems require meticulous attention to methods and tools. Such approaches are used to
provide the necessary services that can be guaranteed to be trusted. Conceptual principles for the
interrelation of dependability and security of information systems are given in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The main attributes
of information systems, such as accessibility, reliability, security, integrity, maintainability, etc., are
defined. In addition to accessibility and integrity, security is also associated with privacy. The main
provisions of the study are supplemented by additional definitions that address threats to reliability and
security (faults, errors, failures), their attributes, and means of achieving them (fault prevention, fault
tolerance, forecasting, and troubleshooting). In particular, the "tree" of the listed essences is proposed
in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], represented in Fig. 1.
      </p>
      <sec id="sec-2-1">
        <title>EMAIL: grechaninov@nas.gov.ua (V.</title>
      </sec>
      <sec id="sec-2-2">
        <title>Grechaninov); h.hulak@kubg.edu.ua (H. Hulak); v.sokolov@kubg.edu.ua (V. Sokolov); p.skladannyi@kubg.edu.ua (P. Skladannyi); n.korshun@kubg.edu.ua (N. Korshun)</title>
        <p>2020 Copyright for this paper by its authors.</p>
        <p>Attributes
y
t
i
l
i
b
a
n
i
a
t
n
i
a
M
y
t
e
f
a
s
l
a
n
o
i
t
c
n
u
F</p>
        <p>Methods of
providing</p>
        <p>Threats</p>
        <p>Threats
y
t
i
l
a
i
t
n
e
d
i
f
n
o
C
y
t
i
r
g
e
t
n
I
n
o
i
t
n
e
v
e
r
P
g
n
i
t
s
a
c
e
r
o
F
l
a
v
o
m
e
R
e
c
n
a
r
e
l
o
T
s
t
l
u
a
F
s
r
o
r
r
E
s
e
r
u
l
i
a
F</p>
        <p>From the tree, it can be seen that dependability includes a whole set of attributes, methods of security,
and threats.</p>
        <p>With the growing power and frequency of cyberattacks, the essential elements for studying the
problems of security and cyber protection are their owners and attackers. Both sides are the subject of
information conflict over computer systems. On the one hand, owners expect these systems to provide
services that can be reasonably trusted. On the other hand, sure attackers or groups, including those
supported by certain political or financial circles, try to harm the owners of computer systems.</p>
        <p>The subjects of information conflict and their interaction remain insufficiently described and
studied. The scientific problem of cybersecurity of critical infrastructure information systems and
situational centers that control the security of such systems remains unresolved. Therefore, research on
the development of the structure of entities involved in information conflict and the formalization of
models of security and cybersecurity is relevant.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>2. Work Review and Problem Statement</title>
      <p>
        Automatic collection, analysis, and preparation of security data are proposed to overcome the
scalability of information systems effectively. The difficulties of this approach are due to the limitations
of autonomous cybersecurity networks. Defining players and their roles will overcome such difficulties.
The paper [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] presents the research results on where and why the human factor seems indispensable.
      </p>
      <p>
        The article [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] presents the structure of intelligent decision support systems based on the situation
center. The intelligent subsystem of the situational center allows solving problems based on various
sources of information, taking into account uncertainty. Nevertheless, the presented block diagram does
not take into account the formalization of the roles of the attacker.
      </p>
      <p>
        Separate issues of security threats to situational centers are presented in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The proposed solutions
only partially help to combat threats. Increasing the capacity of the situation center equipment or
additional training only partially solves the problem of exponential growth in the number of attacks.
      </p>
      <p>
        The work [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] describes a mathematical model for rapid state analysis and forecasting national
security. The proposed method of training specialists in national security seems to be the most adequate
for today's challenges. It allows setting up a learning process for staff of situation centers. However,
still, the method considers the problem one-sidedly and lacks a comprehensive approach.
      </p>
      <p>
        The study builds a model of the state of dependability of a computer system, clarifies certain
concepts and the structure of dependability attributes, formulates the principles of dependability, and
analyzes current issues related to the creation of dependability of computer systems. In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], the analysis
of complex tasks arising at the life cycle stages of dependability of computer systems was carried out.
In particular, the issues of quality assessment of such systems were studied.
      </p>
      <p>
        Similar studies of various aspects of building and evaluating the quality of dependability of computer
systems without a detailed analysis of information security mechanisms [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In particular, the attributive
model of system dependability was studied in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], and also a complex analysis of the essential
attributes and metrics of system dependability was carried out.
      </p>
      <p>
        Ensuring the safety of information security tools, particularly cryptographic computer systems, was
first studied in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. In particular, a method of assessing the reliability of digital signature computer
systems based on elliptical curves is proposed. It is proposed to define the warranty of such systems as
the probability that the signature will not be broken during the mission.
      </p>
      <p>
        For the first time, this paper proposes a quantitative approach to assessing the level of confidentiality
in reputable computer systems that can be applied to information systems for a variety of purposes,
including critical infrastructure. In [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], primary attention is paid to security issues. Moreover, in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]
- the quality of cryptographic transformations in the event of accidental failures, errors, and failures of
hardware and software platforms of cryptographic information security is analyzed. A similar problem
is considered in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], where the issue of ensuring confidentiality is guaranteed systems is considered
without reference to specific mechanisms of information protection.
      </p>
      <p>
        The harmonized standard DSTU ISO / IEC 19790 [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] sets out the security objectives of crypto
modules, which are associated with dependability but are not identified with it. The standard requires
the detection of failures and errors in the module and the prevention of negative consequences of these
adverse events, eliminating the possibility of unauthorized modification of cryptographic functions and
data of the module. There are also additional restrictions: replacement, input, or removal of keys and
other security-critical parameters, ensuring the proper work of the module in the specified mode, and
so on.
      </p>
      <p>
        Regarding scientific research on providing the security and safety of special-purpose information
systems, it is possible to pay attention to the publication [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. In this paper, we consider it an
interdependent factor, but the dependence function is not defined. In [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], special-purpose systems are
also considered, with the components of information system security and characteristics of their
possible defeat in case of attacks on the system.
      </p>
      <p>With the increasing number and growth of cyberattacks, there is a need to ensure the sustainable
operation of unique information systems. Thus, despite the significant number of scientific publications
in the construction and operation of guaranteed information systems and means of information
protection, there is no practical model of counteraction. There is a separate description of the
requirements for information systems used in situational centers of the national security and defense
sectors.</p>
      <p>
        Since the first massive cyberattacks on critical infrastructure, the issue of regulatory norms to ensure
the security of computer systems and information security has become paramount. In particular, the
Resolution of the Cabinet of Ministers [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] defines the organizational and technical requirements for
cyber security in critical infrastructure. It also sets out different requirements for ensuring the
availability and resilience of the components of the relevant systems but does not link this to the broader
concept of “dependability” [
        <xref ref-type="bibr" rid="ref19 ref20 ref21">19–21</xref>
        ].
      </p>
      <p>There is an urgent scientific and practical task of developing general security and cyber protection
model, which would take into account the antagonistic behavior of the system owner, on the one hand,
and the attacker (or random factors), on the other. All this suggests that it is appropriate to conduct a
study on the model of the antagonistic matrix game.</p>
    </sec>
    <sec id="sec-4">
      <title>3. Purpose and Objectives of the Study</title>
      <p>The work aims to analyze the components of cybersecurity and dependability. The research is based
on the ontological approach to their mutual influence. It is meant to determine the features of the
complex impact of random errors and deliberate attacks on the components of the CPC. A separate
issue remains to construct a generalized model for dependability and cyber security of relevant
information systems. This will make it possible to form a criterion for determining the interdependence
of security and dependability factors and minimize the functions of cybersecurity in the design of new
systems. The practical component of the study is aimed at determining the criteria of dependability and
cybersecurity.</p>
      <p>The following tasks were set to achieve this goal:
 To define ontologies of essences of information conflict.</p>
      <p> Build a model of dependability and cyber protection.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Materials and Methods of Research</title>
      <p>The object of study is explained by considering that any image transferring operation through a noisy
medium will corrupt the original image with some unrequired noise; the operation for removing noise
from this corrupted image may take different scenarios and ways. The denoising process is evaluated
using some performance index such as peak signal to noise ratio.</p>
      <p>In this paper it is required to apply a new proposed wavelet based thresholding method for denoising
image and improve its PSNR over other traditional methods. The subject of study is the image denoising
methods used in recent researches and a comparative study among them using some comment
performance index. The purpose of the work is to improve the image quality using wavelet based
denoising method with new proposed thresholding technique known as siny-soft wavelet thresholding.</p>
    </sec>
    <sec id="sec-6">
      <title>5. Problem Statement, Materials, and Methods</title>
      <p>Through most of the image transportation operation the image will face some types of noise, so in
order to keep the original image qualified, it is recommended to denoise the noisy image prior to
impellent further processing on it, in order not to get bad results and conclusions.</p>
      <p>So in this paper a new proposed thresholding method is implemented for image denoising based
wavelet transformation in order to enhance the image quality.</p>
      <p>
        Recent years, many researches deal with new methods for signal and image denoising. Some
researches for image denoising can be summarized as follows. Novel denoising method known as
adaptive non local means with method for noise thresholding, such that image quality can be improved
with about PSNR 33.8 dB [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>
        Other researches in biomedical engineering deals with ultrasound rental images and use curvelet and
contourlet transformations in order to reduce the noise from the corrupted image [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>
        Wavelet based researches play an important rule in the image denoising, one of the recent paper
proposed a self-adaptive hierarchical threshold algorithm and make a comparative study for it with a
global threshold selection algorithm. Self-adaptive method shows a better performance due to tracking
for noise level rate instantiously with threshold selection at each level [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
      </p>
      <p>
        Another authors proposed another techniques for noise reduction in image enhancement. Garrote,
SCAD, mixed and FDR rules are some methods used in their papers for denoising images and signals.
The results for their process are qualified using SNR and MSE performance measures [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>
        Other comparative study for different wavelet based denoising algorithms was introduced by
researchers with several thresholding techniques such as visushrink, sure shrink, Bayes shrink, and
feature adaptive shrinkage. All these techniques are evaluated using PSNR as a quantitate performance
index [
        <xref ref-type="bibr" rid="ref26 ref27">26, 27</xref>
        ].
      </p>
      <p>
        Bivariate shrinkage rule is also proposed by researchers who proposed using the advantage of both
types for dual tree and orthogonal wavelet transform in their complex form to improve the shrinkage
model significantly [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], to define the criteria of multimedia colors [
        <xref ref-type="bibr" rid="ref29 ref30">29, 30</xref>
        ].
      </p>
      <p>The core for any comparison study is the suitable selection for a common performance index and
dimension for evaluated parameters. So in denoising methods PSNR and MSE represent the most
popular performance measure in this field. When considering wavelet denoising technique for image
quality enhancement, there are different threshold selection rules and various thresholding methods in
the literature of wavelet analysis.</p>
      <p>Although the wavelet image denoising procedure can be summarized by three steps:
1. Calculation for wavelet transform coefficient for the image with suitable wavelet mother function,
decomposing level, and simple wavelet or wavelet packet tree technique.</p>
      <p>2. Thresholding the coefficients using some of the thresholding method with proper selected
threshold based on some statistical rules relating to the estimated noise level.</p>
      <p>3. Reconstruct the denoised image using the threshold coefficients and the same used wavelet mother
function and levels.</p>
    </sec>
    <sec id="sec-7">
      <title>6. Experiments</title>
      <p>In this work, at the beginning a simple comparison for various wavelet mother functions based
denoising techniques was established and tabulated in Table 1. After considering these different wavelet
mother functions, Biorthogonal 5.8 wavelet mother function showed the best results among the
compared mother functions when using a peak signal to noise ratio PSNR as a popular performance
index. In this experiment three values for the noise variance are examined which are 10, 20, and 30.
Lena image is used as a test image with 256×256 dimensions, and additive white Gaussian noise
adopted and added to the original signal in order to evaluate the proposed thresholding method.</p>
      <p>Then a proposed wavelet based denoising algorithm is evaluated using siny-soft thresholding with
suitable selected threshold. The PSNR results for some denoising methods in literature are taken from
corresponding researches and tabulated in Table 2 for further comparison with the proposed siny-soft
thresholding.</p>
      <p>In this paper, a new wavelet based thresholding method is suggested as shown in Fig. 1 in order to
improve the quality for the image under test. The proposed method can considered as a manipulation
for the classical soft thresholding method, after addition for sinusoidal signal in the region out of the
dead zone yielding a new siny-soft thresholding function. In addition to that, two fine tuning coefficients
are augmented in the proposed thresholding equation to control the value and scale for the sinusoidal
peaks in the passband region.</p>
      <p>σ</p>
      <p>
        Method
WT [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]
GBFMT [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]
WFRT [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]
ANLMNT [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]
Curvlet [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]
Contourlet [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]
Wavelet hierarchical
threshold [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]
Wavelet global
threshold [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]
Visu hard rule [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]
Visu soft rule [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]
Visu garrote rule [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]
Visu SCAD rule [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]
Visu Mixed rule [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]
Visu hard [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]
Visu soft [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]
B-M hard [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]
B-M soft [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]
Sime-soft [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]
SURE [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]
Bayes [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]
FAS [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]
Mean filtering [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]
Median filtering [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]
ST [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]
HT [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]
POAC [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]
Bayes shrink [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]
Adapt shrink [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]
HMT [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]
Lawmap [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]
Proposed in [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]
Complex [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]
10
      </p>
      <p>20
PSNR Value
24.97
29.23
28.94
30.34
—
—
22.82
21.40
18.55
15.95
16.91
15.95
19.23
34.19
33.71
34.7
34.24
34.31
33.22
35.85
34.73
33.63
32.14
—
—
—
30.17</p>
      <p>—
30.39
30.89
30.73
32.40
30
23.97
27.19
26.71
28.11
—
—
—
—
16.21
14.23
15.6
14.13
17.01
33.64
33.27
33.98
33.85
33.10
33.00
34.97
33.45
32.13
30.62
24.52
24.52
24.53
28.48</p>
      <p>—
28.35
29.05
28.94
30.54
where   is an output signal from wavelet thresholding at level j,   is an input signal to wavelet
thresholding at level j,  is a threshold.</p>
    </sec>
    <sec id="sec-8">
      <title>7. Results</title>
      <p>The simulation results for Matlab program demonstrates that wavelet based siny-soft thresholding
technique improves the noise reduction and denoising performance in term of PSNR.</p>
      <p>Referring to Table 1, three values for noise level are used to artificially corrupt the original image.
Various wavelet mother functions are examined and compared using five decomposing level and
proposed siny-soft thresholding with universal threshold.</p>
      <p>From Table 1 biorthogonal 5.8 wavelet function is succeed as compared to other used functions, so
further analysis for wavelet denoising will use this mother function in order to compare this new
proposed method to other methods listed in the researches and literature.</p>
      <p>Table 2 shows the summarized results for more than 11 references which were used image denoising
with different methods and techniques. Three noise level are considered and PSNR values for about 30
experiment's by other researchers, our proposed method showed a good results for denoising for
different noise level which are PSNR about 37.12, 35.31, and 33.78 dB for noise variance of 10, 20,
and 30 respectively.</p>
      <p>Results for denoising are also demonstrated by Fig. 2–5 which shows the enhancement for Lena
image in three cases for various noise levels.</p>
    </sec>
    <sec id="sec-9">
      <title>8. Discussion</title>
      <p>Results for denoising methods showed many algorithms with different PSNR values, increasing
noise level will degrade the performance of the denoising method as shown in Table 2 when comparing
the results for the same used method at the same row , but with increasing noise level from σ =10 to 30.</p>
      <p>It is recommended for further studies to examine different types for noise with various wavelet
functions and decomposition level, also other performance metric such as MSE can be involved in
conjugation with PSNR for further evaluation emphasis.</p>
    </sec>
    <sec id="sec-10">
      <title>9. Conclusions</title>
      <p>A new proposed wavelet based siny-soft thresholding is proposed in this work. Simulation results
of the present method declared that the denoised images resulted from the proposed algorithm have an
improved PSNR value when they are compared with other denoising method .so based on these result
the proposed thresholding is suited for image denoising when images are corrupted with different types
of noise. It is recommended to use the proposed thresholding for further studies of image or signal
processing, especially for signal and image enhancement using wavelet based denoising or compression
methods. The scientific novelty for the conducted results is that the method for siny_soft thresholding
is firstly proposed. The method shows good results as compared with traditional used methods for image
denoising. Acceptable values for PSNR are achieved when using this new proposed method.</p>
      <p>The practical significance of the achieved results is that the new proposed method can be adopted
deeply in image enhancement problems for further image processing applications. It is recommended
to use wavelet based image denoising with siny_soft thresholding for improving PSNR of an image.</p>
      <p>Prospects for further research are to study the possibility for extended the implementation of the
proposed thresholding for further signal and image applications.
10.Acknowledgements</p>
      <p>The work is supported by the computer communication engineering department at Al-Rafidain
University College represented by its dean Prof. Dr. Mahmood J. Abu-Alshaeer. So I would like to
express my sincere appreciation to Prof. Dr. Mahmood J. Abu-Alshaeer for his help, support, and
encouragement during all the periods of my employment.
11.References</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Grechaninov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>On the Concept of Digital Transformation of the Sphere of National Security and Defense</article-title>
          .
          <source>Technical Sciences and Technology</source>
          ,
          <volume>3</volume>
          (
          <issue>25</issue>
          ),
          <fpage>179</fpage>
          -
          <lpage>186</lpage>
          . doi: https://doi.org/10.25140/
          <fpage>2411</fpage>
          -5363-2021-
          <volume>3</volume>
          (
          <issue>25</issue>
          )
          <string-name>
            <surname>-</surname>
          </string-name>
          179-186
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Grechaninov</surname>
            ,
            <given-names>V. F.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Some issues of improving the network of situational centers of the security and defense sector</article-title>
          .
          <source>Mathematical Machines and Systems</source>
          ,
          <volume>3</volume>
          ,
          <fpage>34</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V. S.</given-names>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>Assurability and Assurable Systems: Elements of the Methodology</article-title>
          .
          <source>Radio Electronic and Computer Systems</source>
          ,
          <volume>5</volume>
          ,
          <fpage>7</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Skopik</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>The limitations of national cyber security sensor networks debunked: Why the human factor matters</article-title>
          .
          <source>Proceedings of the 14th International Conference on Cyber Warfare and Security</source>
          ,
          <volume>405</volume>
          -
          <fpage>412</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Simankov</surname>
            ,
            <given-names>V. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cherkasov</surname>
            ,
            <given-names>A. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buchatskaya</surname>
            ,
            <given-names>V. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teploukhov</surname>
            ,
            <given-names>S. V.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Situational center as an intelligent decision support system taking into account the uncertainty of the source information</article-title>
          .
          <source>Proceedings of the 4th All-Russian Scientific and Practical Conference with International Participation “Distance Learning Technologies</source>
          ,”
          <volume>2834</volume>
          ,
          <fpage>404</fpage>
          -
          <lpage>414</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Janos</surname>
            ,
            <given-names>F. D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dai</surname>
            ,
            <given-names>N. H. P.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Security concerns towards security operations centers</article-title>
          .
          <source>Proceedings of the IEEE 12th International Symposium on Applied Computational Intelligence and Informatics</source>
          , Proceedings,
          <fpage>273</fpage>
          -
          <lpage>278</lpage>
          . doi: https://doi.org/10.1109/SACI.
          <year>2018</year>
          .8440963
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Yandybaeva</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rezchikov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gorschkov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bogomolov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuschnikov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Mathematical models and algorithms for forecasting national security in training situational centers</article-title>
          .
          <source>Proceedings of 2020 13th International Conference Management of Large-Scale System Development</source>
          , doi: https://doi.org/10.1109/MLSD49919.
          <year>2020</year>
          .9247640
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Tesler</surname>
            ,
            <given-names>G. S.</given-names>
          </string-name>
          (
          <year>2006</year>
          ).
          <source>The Concept of Building Guaranteeing Computer Systems. Mathematical Machines and Systems</source>
          ,
          <volume>1</volume>
          ,
          <fpage>134</fpage>
          -
          <lpage>145</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Fedukhyn</surname>
            ,
            <given-names>A. V.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Sespedes</given-names>
            <surname>Harsiya</surname>
          </string-name>
          ,
          <string-name>
            <surname>N. V.</surname>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Attributes and Metrics of Guaranteed Computer Systems</article-title>
          .
          <source>Mathematical Machines and Systems</source>
          ,
          <volume>2</volume>
          ,
          <fpage>195</fpage>
          -
          <lpage>201</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Hlukhov</surname>
            ,
            <given-names>V. S.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Assessing the Security of Cryptographic Computer Systems</article-title>
          . Bulletin of the National University “Lviv Polytechnic,”
          <volume>616</volume>
          ,
          <fpage>66</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Hulak</surname>
            ,
            <given-names>G. N.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Modeling at the Stage of Assessing the Security of Encryptors of Confidential Information</article-title>
          . Modern Special Equipment,
          <volume>1</volume>
          (
          <issue>24</issue>
          ),
          <fpage>73</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Hulak</surname>
            ,
            <given-names>H. M.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Evaluation of Engineering Cryptographic Qualities during Thematic Research of Cryptosystems</article-title>
          .
          <source>Proceedings of the International Scientific and Practical Conference “Mathematical and Simulation Systems Modeling-MODS'</source>
          <year>2018</year>
          ,”
          <fpage>326</fpage>
          -
          <lpage>330</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Sespedes</given-names>
            <surname>Harsiya</surname>
          </string-name>
          ,
          <string-name>
            <surname>N. V.</surname>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Assess the Level of Confidentiality of Guaranteed Computer Systems</article-title>
          .
          <source>Mathematical Machines and Systems</source>
          ,
          <volume>3</volume>
          ,
          <fpage>158</fpage>
          -
          <lpage>164</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>[14] Cabinet of Ministers of Ukraine. (June</source>
          <volume>19</volume>
          ,
          <year>2019</year>
          ).
          <article-title>Resolution “On Approval of the General Requirements for Cyber Protection of Critical Infrastructure</article-title>
          ,”
          <volume>518</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Information</surname>
            <given-names>Technology. Security</given-names>
          </string-name>
          <string-name>
            <surname>Techniques</surname>
          </string-name>
          .
          <article-title>Test and Analysis Methods for Random bit Generators within ISO/IEC 19790</article-title>
          and ISO/IEC 15408.
          <article-title>(</article-title>
          <year>2019</year>
          ). doi: https://doi.org/10.3403/30356052
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Bondaruk</surname>
            ,
            <given-names>A. V.</given-names>
          </string-name>
          , et al. (
          <year>2008</year>
          ).
          <article-title>Guaranteed Integrated Navigation System for Moving Ground Objects. Bulletin of Lviv Polytechnic</article-title>
          .
          <source>Computer Systems and Networks</source>
          ,
          <volume>620</volume>
          ,
          <fpage>24</fpage>
          -
          <lpage>30</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Hulak</surname>
            ,
            <given-names>H. M.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Methodological Ambush and Protection of Guaranteed Information Systems for Remote Learning of Mortgages of Higher Education</article-title>
          .
          <source>Mathematical Machines and Systems</source>
          ,
          <volume>4</volume>
          ,
          <fpage>148</fpage>
          -
          <lpage>162</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Avizienis</surname>
          </string-name>
          , А., et al. (
          <year>2004</year>
          ).
          <article-title>Basic Concepts and Taxonomy of Dependable and Secure Computing</article-title>
          .
          <source>IEEE Trans. on Dependable and Secure Computing</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ),
          <fpage>11</fpage>
          -
          <lpage>33</lpage>
          . doi: https://doi.org/10.1109/TDSC.
          <year>2004</year>
          .2
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>TajDini</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokolov</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buriachok</surname>
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Men-in-the-middle attack simulation on low energy wireless devices using software define radio</article-title>
          .
          <source>Workshop of the 8th International Conference on "Mathematics. Information Technologies. Education": Modern Machine Learning Technologies and Data Science (MoMLeT and DS)</source>
          , vol.
          <volume>2386</volume>
          ,
          <fpage>287</fpage>
          -
          <lpage>296</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Buriachok</surname>
            ,
            <given-names>V</given-names>
          </string-name>
          , et al. (
          <year>2020</year>
          ).
          <article-title>Invasion detection model using two-stage criterion of detection of network anomalies</article-title>
          .
          <source>Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS)</source>
          , vol.
          <volume>2746</volume>
          ,
          <fpage>23</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Vladymyrenko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et al. (
          <year>2019</year>
          ).
          <article-title>Analysis of Implementation Results of the Distributed Access Control System</article-title>
          .
          <source>2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&amp;T)</source>
          , doi: https://doi.org/10.1109/picst47496.
          <year>2019</year>
          .9061376
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Lakhno</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plyska</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Analysis of Models for Selection of Investment Strategies</article-title>
          .
          <source>Proceedings of the 2020 IEEE International Conference on Problems of Infocommunications Science and Technology</source>
          ,
          <volume>43</volume>
          -
          <fpage>46</fpage>
          . doi: https://doi.org/10.1109/PICST51311.
          <year>2020</year>
          .9468024
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Lavrova</surname>
            ,
            <given-names>D. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Solovei</surname>
            ,
            <given-names>R. S.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Ensuring the Information Security of Wireless Dynamic Networks based on the Game-Theoretic Approach</article-title>
          .
          <source>Automatic Control and Computer Sciences</source>
          ,
          <volume>54</volume>
          (
          <issue>8</issue>
          ),
          <fpage>937</fpage>
          -
          <lpage>943</lpage>
          . doi: https://doi.org/10.3103/S0146411620080210
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Montet</surname>
            ,
            <given-names>C. D.</given-names>
          </string-name>
          (
          <year>2003</year>
          ).
          <article-title>Serra Game Theory and Economics</article-title>
          . Red Globe Press.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , et al. (
          <year>2021</year>
          ).
          <article-title>A Differential Game View of Antagonistic Dynamics for Cybersecurity</article-title>
          .
          <source>Computer Networks</source>
          ,
          <volume>200</volume>
          . doi: https://doi.org/10.1016/j.comnet.
          <year>2021</year>
          .108494
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <article-title>Information technology</article-title>
          .
          <article-title>Security techniques. Guidelines for cybersecurity</article-title>
          .
          <source>ISO 27032</source>
          .
          <article-title>(</article-title>
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Dibaji</surname>
            ,
            <given-names>S. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hussain</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ishii</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>A Tutorial on Security and Privacy Challenges in CPS</article-title>
          . doi: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -83236-
          <issue>0</issue>
          _
          <fpage>5</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Ghosh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jaillet</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>An Iterative Security Game for Computing Robust and Adaptive Network Flows</article-title>
          .
          <source>Computers and Operations Research</source>
          ,
          <volume>138</volume>
          . doi: https://doi.org/10.1016/j.cor.
          <year>2021</year>
          .105558
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Yi</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , et al. (
          <year>2021</year>
          ).
          <article-title>A Multi-Stage Game Model for the False Data Injection Attack from Attacker's Perspective</article-title>
          .
          <source>Sustainable Energy, Grids and Networks</source>
          ,
          <volume>28</volume>
          . doi: https://doi.org/10.1016/j.segan.
          <year>2021</year>
          .100541
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Hunt</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agarwal</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhuang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>On the Adoption of New Technology to Enhance Counterterrorism Measures: An Attacker-Defender Game with Risk Preferences</article-title>
          .
          <source>Reliability Engineering and System Safety</source>
          ,
          <volume>218</volume>
          . doi: https://doi.org/10.1016/j.ress.
          <year>2021</year>
          .108151
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Nisioti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al. (
          <year>2021</year>
          ).
          <article-title>Game-Theoretic Decision Support for Cyber Forensic Investigations</article-title>
          . Sensors,
          <volume>21</volume>
          (
          <issue>16</issue>
          ). doi: https://doi.org/10.3390/s21165300
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Myshanov</surname>
            ,
            <given-names>R. O.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Investigation of the Signs, Types, Causes, and Mechanisms of Failures of Microcircuits Made using CMOS Technology</article-title>
          .
          <source>Proceedings of the International Symposium “Reliability and Quality</source>
          ,”
          <volume>2</volume>
          ,
          <fpage>228</fpage>
          -
          <lpage>234</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Vlasova</surname>
            ,
            <given-names>A. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andreev</surname>
            ,
            <given-names>P. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naumova</surname>
            ,
            <given-names>I. Y.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Reliability and Quality of Electronic Equipment</article-title>
          .
          <source>Proceedings of the International Symposium “Reliability and Quality</source>
          ,”
          <volume>1</volume>
          ,
          <fpage>313</fpage>
          -
          <lpage>314</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>