<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Models for Cloud System Availability Assessment Considering Attacks on CDN and ML Based Parametrization</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yuriy</forename><surname>Ponochovnyi</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Poltava State Agrarian University</orgName>
								<address>
									<addrLine>1/3, Skovorody str</addrLine>
									<postCode>36003</postCode>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleg</forename><surname>Ivanchenko</surname></persName>
							<email>ivanchenko.o.v@nmu.one</email>
							<affiliation key="aff1">
								<orgName type="institution">Dnipro University of Technology</orgName>
								<address>
									<addrLine>Dmytra Yavornytskogo Ave. 19</addrLine>
									<postCode>49005</postCode>
									<settlement>Dnipro</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vyacheslav</forename><surname>Kharchenko</surname></persName>
							<email>v.kharchenko@csn.khai.edu</email>
							<affiliation key="aff2">
								<orgName type="institution">National Aerospace University &quot;Kharkiv Aviation Institute&quot;</orgName>
								<address>
									<addrLine>17, Chkalova str</addrLine>
									<postCode>61000</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Iryna</forename><surname>Udovyk</surname></persName>
							<email>udovyk.i.m@nmu.one</email>
							<affiliation key="aff1">
								<orgName type="institution">Dnipro University of Technology</orgName>
								<address>
									<addrLine>Dmytra Yavornytskogo Ave. 19</addrLine>
									<postCode>49005</postCode>
									<settlement>Dnipro</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Eduard</forename><surname>Baiev</surname></persName>
							<email>edbaev@gmail.com</email>
							<affiliation key="aff3">
								<orgName type="department">Yalantis</orgName>
								<address>
									<addrLine>bul. Slavy, 56</addrLine>
									<postCode>49156</postCode>
									<settlement>Dnipro</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff4">
								<orgName type="department">International Conference on Computational Linguistics and Intelligent Systems</orgName>
								<address>
									<addrLine>May 12-13</addrLine>
									<postCode>2022</postCode>
									<settlement>Gliwice</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Models for Cloud System Availability Assessment Considering Attacks on CDN and ML Based Parametrization</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">7D1B49ECD0230FA53D21EDC06620864F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T12:54+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Availability assessment, multifragment markov models, cloud system, reliability block diagrams, attack on content delivery network, machine learning for model parametrization 0000-0002-6856-2013 (Y. Ponochovnyi)</term>
					<term>0000-0002-5921-5757 (O. Ivanchenko)</term>
					<term>0000-0001-5352-077X (V. Kharchenko)</term>
					<term>0000-0002-5190-841X (I. Udovyk)</term>
					<term>0000-0002-6707-3170 (E. Baiev)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article proposes a method for assessing the availability of the cloud system taking into account the variable dynamics of attacks on vulnerabilities Content Delivery Network (CDN). The architecture of the cloud system for video hosting services is detailed, on the basis of which an example of simulation in the conditions of cyberattacks, software and hardware failures is given. An availability model based on the Reliability Block Diagram (RBD), a Markov model (MMC) with constant parameters of failure and recovery rates, and a multifragment (MFM) model with a variable parameter that estimates the probability of attacks have been developed and studied. Two scenarios of events that affect the availability of the system are considered: the first -in the absence of attacks on the CDN component; the second -in attacks that cause an increase in the CDN failure rate to the limit level. A comparative analysis of RBD, MMC and MFM and assessment of discrepancies in the simulation results were performed. The use of Big Data analytics and ML tools is proposed for parametrization of models. The obtained simulation results can be used not only by users of cloud systems, but also by Cloud Service Providers (CSP) to improve planning procedures and risk assessment of failures.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Modern technological developments have increased the need to use web technologies, which, in particular, as a computer paradigm with the appropriate capabilities: greater flexibility and affordability at a low cost. Effective implementation of modern information technologies: Web, Cloud, IoT (Internet of Things), etc. it is impossible without the corresponding normative documents describing legal norms, problems, risks and ways of their minimization. Convenient and secure use of web and Cloud services is based on the principles of trust between service providers and users, but trust is not possible without the support and provision of service level agreements (SLAs). Another factor in guaranteeing such trust is the comprehensive provision of regulatory standards at the international and national levels.</p><p>Demand for cloud computing is growing every year due to their key characteristics, which have been most comprehensively and fundamentally described by the European Union Agency for Cyber Security (ENISA) <ref type="bibr" target="#b0">[1]</ref> and the National Institute of Standards and Technology (NIST) <ref type="bibr">[2]</ref>. However, the use of cloud technologies alone does not minimize the risks of accidents, catastrophes, cyberattacks and component failures, which is especially important for critical infrastructure. To minimize such risks, it is necessary to maintain not only the support and counteracting system, but to close the foundations of fault tolerance, availability and resistance in the early stages of planning and design. That is why the development of a methodology for the development and maintenance of cloud systems of high availability for critical infrastructure is an urgent issue.</p><p>Currently, the industrial provision of services provided by various cloud service providers (CSP) and among them the largest Amazon, Microsoft and Google <ref type="bibr" target="#b1">[3]</ref>. CSPs provide users with flexible plans for renting and maintaining virtual cloud infrastructure and services based on IaaS, PaaS, SaaS and others. According to these user requirements for the availability of the cloud system and its elements, which are usually supported by simple model calculations (such as methods of the Reliability Block Diagram (RBD) or failure tree analysis (FTA)), various internal and external factors or the dynamics of their changes may not be taken into account. On the other hand, the use of a Markov <ref type="bibr" target="#b2">[4]</ref> or semi-Markov <ref type="bibr" target="#b3">[5]</ref> models should be justified, requiring time and computing resources. We propose to perform a comparative analysis of availability models of cloud architecture (on the example of a video hosting system). The paper considers a simple model based on RBD, a Markov model with constant parameters, and a Multifragment model with a variable parameter. The discrepancy of simulation results is estimated. The obtained simulation results can be used not only by users of cloud systems, but also by CSP service personnel to improve the planning and failure risk assessment procedure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Works</head><p>The issue of assessing the quality of cloud services is relevant and widely covered in scientific works. When calculating the reliability and availability of most authors <ref type="bibr" target="#b4">[6]</ref> use models based on RBD and failure trees <ref type="bibr" target="#b5">[7]</ref>. The issues of calculating the input parameters for such models are covered in <ref type="bibr" target="#b6">[8]</ref> (the assessment of the availability of the virtualized environment for different scenarios of their use).</p><p>The study <ref type="bibr" target="#b7">[9]</ref> also evaluated the input parameters for a specific pattern -the cloud mobile system.</p><p>Complex models based on the Markov approach have been considered in subsequent publications. In <ref type="bibr" target="#b8">[10]</ref>, the Stochastic Reward Nets was created. Works <ref type="bibr" target="#b9">[11]</ref><ref type="bibr" target="#b10">[12]</ref> contain queuing models and case, based on Markov reward models.</p><p>In <ref type="bibr" target="#b11">[13]</ref> authors describe the approach based on the use of Semi-Markov models to assess availability of a cloud infrastructure with multiple pools. Unlike Markov, the Semi-Markov models are utilized by researchers when the system operated at diverse modes on different intervals in time.</p><p>In <ref type="bibr" target="#b12">[14]</ref> the analysis of software failure data was performed in order to determine the optimal laws of time distribution between expected failures. The study <ref type="bibr" target="#b13">[15]</ref> analyzed a sample of data on vulnerabilities of software servers based on an open repository <ref type="bibr" target="#b14">[16]</ref>. Since these studies do not specify an analysis tool, it can be concluded that manual data processing was performed.</p><p>The approach proposed in this article has already been approved in a study <ref type="bibr" target="#b15">[17]</ref>, which compared the results of modeling Markov and semi-Markov models of cloud service. The research performed here is a logical continuation <ref type="bibr" target="#b15">[17]</ref>, as it was specified values of input parameters and results by using the Markov and Multifragment models.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Methodology</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Approach and stages of modelling and assessment</head><p>Research methodology is based on the use of the principles of systems analysis <ref type="bibr" target="#b16">[18]</ref><ref type="bibr" target="#b17">[19]</ref> in setting and solving research problems. This is manifested in <ref type="bibr" target="#b16">[18]</ref>:</p><p>-determining the stages of solving tasks and the logical sequence of their implementation; -the choice of adequate mathematical apparatus, research methods and their correlation with the tasks of individual stages;</p><p>-formal presentation of types, procedures, indicators and parameters that describe the functioning of the cloud system and external influences on it; -decomposition of the cloud system architecture into components and study of their relationships in the tasks of analysis, evaluation and ensuring availability;</p><p>-establishing and studying the relationship between the resulting indicators of cloud system availability, obtained using various mathematical models, taking into account the peculiarities of their operation, maintenance and use.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Architecture of system modelled: CVS</head><p>To model the processes that accompany the operation of the cloud architecture (failures and restored component systems, attacks on nah, installation of patches) was created cloud architecture model. The cloud system is a complex multilevel and distributed system that can be represented by a diagram of different levels of nesting <ref type="bibr" target="#b6">[8,</ref><ref type="bibr" target="#b8">10]</ref>. The cloud architecture model describes a three-level client-server network architecture that includes three networks (mobile, CDN and primary virtual network) to service groups of end devices. Thus, the common elements for a typical cloud system are a group of end devices (DSM), a physical access network (MNT), elements of a virtual access network (VPN and SGR) and load balancing (LB). Cloud application services (API, Calls, Autoscaling) are special for video hosting services. An important element, such as CDN, should be singled out, as the use of such a network allows in part unload regional cloud services. CDN also provides protection against DDoS-type cyberattacks, but this element is the most accessible for criminal activities. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Availability models</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">RBD availability model</head><p>The failure of any unreserved element of the cloud system architecture (Figure <ref type="figure" target="#fig_0">1</ref>) will cause unavailability in customer service. Based on this, the Reliability Block Diagram (RBD) of the cloud system (Figure <ref type="figure">2</ref>) will include seven consecutive elements, each of which characterizes the serviceability of the corresponding elements of the architecture. Elements of architecture: WiFi and MNT, SGR and VPN form parallel links in RBD. The developed model does not describe redundant service configuration, but both web servers (LB, QS) and application servers (APS) can be reserved through a high availability cluster, in which case RBD will contain additional redundant components.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2: RBD for CVS</head><p>Also developed RBD can be detailed, because each service is primarily implemented as a clientserver distributed structure (respectively, it is characterized by failures and restores the client and server page) <ref type="bibr" target="#b8">[10]</ref>. Secondly, services are created on the basis of hardware and software systems (respectively, they are characterized by failures of hardware and software) <ref type="bibr" target="#b10">[12]</ref>. However, in the developed model it was decided to limit certain values of failures due to physical and design defects and attacks on the vulnerability of the component.</p><p>According to the method, as recommended in <ref type="bibr" target="#b2">[4]</ref>, the calculation of the availability of the system with a mixed connection of elements is performed by formula <ref type="bibr" target="#b0">(1)</ref> ,</p><p>where , .</p><p>(</p><p>The availability values obtained by formulas (1) and (2) are stationary. This greatly simplifies the model, but does not allow to study the dynamics of changes in availability function over time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Markov availability model</head><p>The graph of states and transitions of the Markov model of the cloud system (Figure <ref type="figure" target="#fig_1">3</ref>) includes one serviceable state S1, four operational states S4, S6, S10, S12 and nine inoperable states S2, S3, S5, S7, S8, S9, S11, S13, S14. This Markov model describes the functioning of the cloud system in terms of manifestation of only hardware and software defects under the condition of averaging the failure rates and recovery of components of the architecture, performed on the basis of the method <ref type="bibr" target="#b2">[4]</ref>. The model does not describe changes in the intensity of design defects (for example, during attacks on components). However, using repeated reproduction of the model experiment, you can get the dynamics of changes in the resulting indicator when changing one or more input parameters.</p><p>The system of Kolmogorov-Chapman differential equations constructed for the graph of the model in Figure <ref type="figure" target="#fig_1">3</ref> is represented by formula <ref type="bibr" target="#b1">(3)</ref>.    </p><formula xml:id="formula_2">WiFi MNT SGR VPN APS3 APS2 LB QS APS1 CDN DSM CVS DSM CDN WM APS 1 QS LB APS 3 APS 2 A A A A A A A A A =        ( ) ( ) WM Wi Fi MNT A 1 1 A 1 A − = − − − ( ) ( ) VS VPN SGR A 1 1 A 1 A = − − −</formula><formula xml:id="formula_3">( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( )</formula><formula xml:id="formula_4">                         − − = − + + + + + + + + + + + + + + + + + + + + + + + = − + =− ( )<label>( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) (</label></formula><formula xml:id="formula_5">                 − − − − − − + = − + + + = − + + + = − + + + = − + = − + = − + ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( )<label>LB</label></formula><formula xml:id="formula_6">                 =     = − + + + = − + + + = − + + + = − + = − + =                                               (4)</formula><p>To obtain single solution to this system additions in the form of initial conditions were applied (4). Modeling the change of the input parameter requires the introduction of an additional cycle, in which when changing the parameter each time the Markov model is recalculated. A code for such operations has the following form. In the given code fragment for storage of availability function values the array Ag is used, and the resulting indicator is defined by the formula (5).</p><p>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Multifragment availability model considering attacks on CDN</head><p>The multifragment model of cloud system availability allows taking into account the change of input parameters in one model step. This complicates the marked digraph of the functioning of the system, as shown in Fig. <ref type="figure" target="#fig_3">4</ref>. The process of functioning of the cloud system is as follows. Initially, the system implements all planned functions and is in state S1. In the process of functioning, the failures of the system components are manifested, as a result of which it passes into the state S2..S14 and is restored (the system returns to the state S1). To simplify the perception of the model, in digraph (Fig. <ref type="figure" target="#fig_3">4</ref>) all transitions not related to the attack on the CDN are hidden in the superstates S(1..14 *) (for the first fragment) and S(15..28 *) (for the second fragment).</p><p>After a certain time interval, the system fails due to an attack on the vulnerability of the CDN component, and it goes into state S3. If the attacker succeeds (the CDN attack was successful), the system moves to a new part of the model (state S17), and if the attack fails, it returns to state S1. The probability of success of the attacker is weighted by the parameter a∈ [0..1]. After several successful attacks (usually Nf = [8..12], the intensity of the attack reaches its maximum (because for technical reasons, the attacker can not speed them up).    </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Results of modelling</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Models assumptions and ML based parametrization</head><p>When building availability models of cloud system, the following assumptions were made <ref type="bibr" target="#b2">[4,</ref><ref type="bibr" target="#b3">5]</ref>. a) For the RBD availability model: -the availability of each of the components of the cloud architecture in equation ( <ref type="formula" target="#formula_0">1</ref>) is determined by the formula μi/(μi+λi), where the values of μi and λi are the input parameters averaged by method <ref type="bibr" target="#b2">[4]</ref> for each element of the cloud system. b) For the Markov model of the cloud system:</p><p>-the flow of events that translates the system from one functional state to another has the properties of stationary, ordinariness and absence of aftereffects, respectively, the input parameters of the model λі, μi are assumed to be constant;</p><p>-each element of the cloud system at any time may be in working order or inoperable states. c) For the multifragment cloud system model: after elimination of CDN vulnerability in F1 fragment, the intensity of attack on CDN is specified as λCDN j+1 , and is defined as:</p><formula xml:id="formula_8">, (<label>7</label></formula><formula xml:id="formula_9">)</formula><p>the of attack on CDN component (for technical reasons) is limited by the maximum λCDN max .</p><p>Parametrization of input data for the proposed models was performed using Machine Learning tools <ref type="bibr" target="#b19">[21]</ref>. In particular, utilized machine learning operations MLlib based on the use of Spark Big Data Platform were used <ref type="bibr" target="#b20">[22]</ref>. Statistical processing and evaluation of data characterizing the reliability of the components of the cloud video system was implemented by sequentially performing operations to create Resilient Distributed Datasets, (RDD). In doing on, RDDs were formed from tuples of data that contained statistics on the reliability of CVS components. Next, the formed RDD datasets were transformed into matrix constructs, which were subjected to the operation of statistical testing of hypotheses (Hypothesis Testing) in accordance with the criterion of xi-square (Chi-square test). Figure <ref type="figure" target="#fig_6">5</ref> shows the solutions' scheme using operations of RDDs and Machine Learning. The primary input parameters of RBD, Markov and Multifragment models were determined on the basis of research and certification data <ref type="bibr" target="#b4">[6,</ref><ref type="bibr" target="#b6">8,</ref><ref type="bibr" target="#b7">9]</ref> for the analog versions CVS samples. Their values are presented in Table <ref type="table" target="#tab_5">1</ref>. To study the availability of the system, variable values of the input parameter λCDN j were adopted, which are substantiated in <ref type="bibr" target="#b9">[11]</ref> and summarized in Table <ref type="table" target="#tab_6">2</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Simulation and comparative analysis</head><p>Comparison of RBD and Markov models is performed under the condition t→∞ (for stable Availability). Under this condition, the solution of the Markov model is reduced to a system of linear (non-differential) equations. The results of the calculations are shown in Table <ref type="table" target="#tab_7">3</ref>.</p><p>The simulation results showed that the difference between the cloud system availability indicators determined by RBD and Markov models have differences, not exceeding ΔA=0,0034. The weakest element in the architecture in the absence of attacks are end-user devices (DSM).</p><p>Figure <ref type="figure">6</ref>,a illustrates the decrease in availability with increasing input parameter λCDN j within the interval of Table <ref type="table">.</ref>2. Estimates obtained using RBD and Markov models with increasing CDN failure rate increase the discrepancy from ΔA = 0.0034 to ΔA = 0.0051.</p><p>To solve systems of differential equations constructed according to the Kolmogorov-Chapman matrix, in the paper using the ode15s function <ref type="bibr" target="#b18">[20]</ref>. The simulation results are shown in Figure <ref type="figure">6</ref>   The results of availability modeling using a multifragment model are illustrated in Figure <ref type="figure">7</ref>. Graphs in Figure <ref type="figure">7</ref>,a allow you to compare the results of Markov and multifragment models. The availability function obtained by the MFM method reaches a stationary value after t = 8000 hours of operation, and the specified value of stationary availability is A = 0.9189. This indicator can be determined by a simpler Markov model, taking the value of the input parameter λCDN equal to λCDN max .</p><p>Figure <ref type="figure">7</ref>,b illustrates the influence of the input parameter α on the dynamics of changes in the availability function. The mechanism of influence of this parameter is as follows. As the parameter α increases, the time of transition of the availability function to stationary mode decreases, so for α = 0.5 t = 8000 hours; for α = 0.9 t = 4000 hours (that is twice as fast).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>In the article, we presented the results of modeling to assess the availability of the cloud system. Two scenarios of events affecting system availability were considered: the first -in the absence of attacks on the CDN component; the second is in the case of attacks that cause an increase in the CDN failures rate to the limit level λCDN max .</p><p>Parametrization of input data for the proposed models was performed using Machine Learning tools. In doing on, RDDs were formed from tuples of data that contained statistics on the reliability of CVS components. Next, the formed RDD datasets were transformed into matrix constructs, which were subjected to the operation of statistical testing of hypotheses (Hypothesis Testing) in accordance with the criterion of xi-square (Chi-square test).</p><p>A comparative analysis of RBD, Markov and Multifragment models was performed. The obtained results showed that the discrepancy between the stationary availability of RBD and Markov models is ΔA = 0.0034. As the CDN failure rate increases by an order of decimal order, this discrepancy increases to ΔA = 0.0051 (with the RBD model underestimating availability).</p><p>The conducted researches allowed to compare the results of Markov and multifragment models. The availability function obtained by the MFM method reaches a stationary value after t = 8000 hours of CVS operation, and the specified value of stationary availability is A = 0.9189. This indicator can be determined by a simpler Markov model, taking the value of the input parameter λCDN equal to λCDN max . The influence of the input parameter α (probability of successful attack on the CDN component) on the dynamics of change of the availability function was also investigated with the help of a multifragment model. As the parameter α increases, the time of transition of the availability function to stationary mode decreases, so for α = 0.5 t = 8000 hours; for α = 0.9 t = 4000 hours (that is twice as fast).</p><p>Therefore, the choice of model strongly influences the assessment of the accuracy of the CVS stationary availability level and the time of transition of the availability function to the steady state. The presented results can be used by both developers and DevOps engineers to ensure effective functioning of the high available CVS. Future research directions can be connected with analysis of cloud multiversion architectures by use of DevOps tools.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Architecture of CVS</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Digraph of the cloud system Markov model</figDesc><graphic coords="5,156.50,72.00,281.95,227.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>la_cdn_n = [0.001388889: 0.004027778: 0.041666667]; Ag=[]; P0=[1 zeros(1, size(V1,1)-1)]; for j=1:length(la_cdn_n) la_cdn = la_cdn_n(j); E1=[E1; 1 3 la_cdn]; A=matrixA(V1,E1); [t1,P1] = ode15s(@stiff, taim_interval,P0,options); Ag=[Ag P1(:,1)+P1(:,4)+P1(:,6)+P1(:,10)+P1(:,12)]; end;</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Orgraph of multifragment availability models CVS</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>.</head><label></label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>(</head><label></label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Solutions' scheme using operations of RDDs and Machine Learning</figDesc><graphic coords="7,86.20,521.85,442.05,194.38" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head></head><label></label><figDesc>,b. The change in time of the availability indicator, illustrated by the Markov model, shows the asymptotic direction of the function to a stationary value during the first t = 200 hours of CVS operation.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 6 :Figure 7 :</head><label>67</label><figDesc>Results of RBD and Markov models (a) and Markov model (b) for different value λCDN a) b) Results of Markov and Multifragment models (a) and Multifragment model (b) for different value α</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>)</figDesc><table><row><cell></cell><cell>DN 3 P t</cell><cell cols="2">CDN 1 P t ;</cell><cell></cell><cell></cell></row><row><cell>4 dP t dt</cell><cell>Wi Fi</cell><cell>MNT</cell><cell>4 P t</cell><cell>Wi Fi 1 P t</cell><cell>MNT 5 P t ;</cell></row><row><cell>5 dP t dt</cell><cell>Wi Fi</cell><cell>MNT</cell><cell>5 P t</cell><cell>Wi Fi 4 P t</cell><cell>MNT 6 P t ;</cell></row><row><cell>6 dP t dt</cell><cell>Wi Fi</cell><cell>MNT</cell><cell>6 P t</cell><cell>MNT 1 P t</cell><cell>Wi Fi 5 P t ;</cell></row><row><cell>7 dP t dt</cell><cell>APS 1 7 P t</cell><cell cols="2">APS 1 1 P t ;</cell><cell></cell><cell></cell></row><row><cell>8 dP t dt</cell><cell>QS 8 P t</cell><cell cols="2">QS 1 P t ;</cell><cell></cell><cell></cell></row><row><cell>9 dP t dt</cell><cell>LB 9 Pt</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 1</head><label>1</label><figDesc>Constant values of simulation processing input parameters for RBD and Markov models #</figDesc><table><row><cell></cell><cell>Name of Systems</cell><cell>Failure</cell><cell>Value (1/h)</cell><cell>Repair</cell><cell>Value (1/h)</cell></row><row><cell></cell><cell>Components</cell><cell>rate</cell><cell></cell><cell>Rate</cell><cell></cell></row><row><cell>1</cell><cell>Desktop and Mobile (DSN)</cell><cell cols="3">la_dsm 0,000925926 mu_dsm</cell><cell>0,02083</cell></row><row><cell>2</cell><cell>Content Delivery Network</cell><cell cols="3">la_cdn 0,001388889 mu_cdn</cell><cell>1</cell></row><row><cell></cell><cell>Service (CDN)</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>3</cell><cell>Wi-Fi</cell><cell cols="3">la_wifi 0,001488095 mu_wifi</cell><cell>0,04167</cell></row><row><cell>4</cell><cell>Mobile Network (MNT)</cell><cell cols="3">la_mnt 0,000462963 mu_mnt</cell><cell>0,5</cell></row><row><cell>5</cell><cell>App Service (API)</cell><cell cols="3">la_aps1 0,002083333 mu_aps1</cell><cell>1,5</cell></row><row><cell>6</cell><cell>Queue Service (QS)</cell><cell>la_qs</cell><cell>0,001302083</cell><cell>mu_qs</cell><cell>1</cell></row><row><cell>7</cell><cell>Load Balancer (LB)</cell><cell>la_lb</cell><cell>0,001190476</cell><cell>mu_lb</cell><cell>1</cell></row><row><cell>8</cell><cell>SignalR Socket Service (SGR)</cell><cell>la_sgr</cell><cell cols="2">0,001666667 mu_sgr</cell><cell>1</cell></row><row><cell>9</cell><cell>VPN Gateway</cell><cell cols="3">la_vpn 0,001736111 mu_vpn</cell><cell>1</cell></row><row><cell cols="2">10 App Service (Calls)</cell><cell cols="3">la_aps2 0,00245098 mu_aps2</cell><cell>0,66667</cell></row><row><cell cols="2">11 Autoscaling Service</cell><cell cols="3">la_aps3 0,002777778 mu_aps3</cell><cell>1</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_6"><head>Table 2</head><label>2</label><figDesc>Variable values of simulation processing input parameters for Multifragment model</figDesc><table><row><cell>#</cell><cell>Systems Name</cell><cell>Matlab</cell><cell>Value (1/h)</cell></row><row><cell></cell><cell></cell><cell>variable</cell><cell></cell></row><row><cell>1</cell><cell>Minimum value of CDN failure rate due to hacker attack</cell><cell cols="2">la_cdn_min 0,001388889</cell></row><row><cell>2</cell><cell>Maximum value of CDN failure rate due to hacker attack</cell><cell cols="2">la_cdn_max 0,041666667</cell></row><row><cell>3</cell><cell>Delta of change CDN failure rate</cell><cell cols="2">delta_la_cdn 0,004027778</cell></row><row><cell>4</cell><cell>Probability of successful attack</cell><cell>alpha</cell><cell>0..1</cell></row><row><cell>5</cell><cell>Number of fragments in Multifragment model</cell><cell>nf</cell><cell>10</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_7"><head>Table 3</head><label>3</label><figDesc>Comparison of results of RBD and Markov models # state</figDesc><table><row><cell></cell><cell>Element of system</cell><cell>Markov model</cell><cell>RBD model</cell><cell>Δ</cell></row><row><cell></cell><cell></cell><cell>Pi</cell><cell>Ai</cell><cell>|Pi-(1-Ai)|</cell></row><row><cell>1</cell><cell>-</cell><cell>0,895362266</cell><cell>-</cell><cell>-</cell></row><row><cell>2</cell><cell>dsm</cell><cell>0,039793882</cell><cell>0,957446805</cell><cell>0,002759313</cell></row><row><cell>3</cell><cell>cdn</cell><cell>0,001243559</cell><cell>0,998613037</cell><cell>0,000143404</cell></row><row><cell>4</cell><cell>wifi</cell><cell>0,031977218</cell><cell>0,965517247</cell><cell>0,002505535</cell></row><row><cell>5</cell><cell>wifi / mnt</cell><cell>6,66E-04</cell><cell>0,99929627</cell><cell>3,75376E-05</cell></row><row><cell>6</cell><cell>mnt</cell><cell>0,018653381</cell><cell>0,979591837</cell><cell>0,001754783</cell></row><row><cell>7</cell><cell>aps1</cell><cell>0,001243559</cell><cell>0,998613038</cell><cell>0,000143404</cell></row><row><cell>8</cell><cell>qs</cell><cell>0,001165836</cell><cell>0,99869961</cell><cell>0,000134554</cell></row><row><cell>9</cell><cell>lb</cell><cell>1,07E-03</cell><cell>0,99881094</cell><cell>0,000123153</cell></row><row><cell>10</cell><cell>sgr</cell><cell>0,001492271</cell><cell>0,998336106</cell><cell>0,000171623</cell></row><row><cell>11</cell><cell>sgr/vpn</cell><cell>2,59E-06</cell><cell>0,999997116</cell><cell>2,9295E-07</cell></row><row><cell>12</cell><cell>vpn</cell><cell>0,001554448</cell><cell>0,998266898</cell><cell>0,000178654</cell></row><row><cell>13</cell><cell>aps2</cell><cell>0,003291773</cell><cell>0,996336997</cell><cell>0,000371231</cell></row><row><cell>14</cell><cell>aps3</cell><cell>0,002487118</cell><cell>0,997229917</cell><cell>0,000282966</cell></row><row><cell>ACVS</cell><cell>CVS</cell><cell>0,949039584</cell><cell>0,945631343</cell><cell>0,003408241</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="https://www.enisa.europa.eu/publications/eucs-cloud-service-scheme" />
		<title level="m">European Union Agency for Cybersecurity</title>
				<imprint>
			<publisher>ENISA</publisher>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note>EUCS -CLOUD SERVICES SCHEME</note>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">Lionel</forename><surname>Sujay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vailshery</forename></persName>
		</author>
		<idno>vendor. 2022</idno>
		<ptr target="https://www.statista.com/statistics/540511/worldwide-cloud-computing-revenue-share-by-vendor/" />
		<title level="m">Distribution of cloud computing (IaaS, PaaS, SaaS) market revenues worldwide from 2015 to</title>
				<imprint>
			<date type="published" when="2021-06">June 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Trivedi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bobbio</surname></persName>
		</author>
		<idno type="DOI">10.1017/9781316163047</idno>
		<title level="m">Reliability and Availability Engineering. Modeling, Analysis and Applications</title>
				<meeting><address><addrLine>Cambridge, United Kingdom</addrLine></address></meeting>
		<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The Mercury Environment: A Modeling Tool for Performance and Dependability Evaluation</title>
		<author>
			<persName><forename type="first">T</forename><surname>Pinheiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Oliveira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Matos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Silva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Pereira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Melo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Maciel</surname></persName>
		</author>
		<idno type="DOI">10.3233/AISE210075</idno>
	</analytic>
	<monogr>
		<title level="j">Ambient Intelligence and Smart Environments</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="16" to="25" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Vehicular cloud computing networks: availability modelling and sensitivity analysis</title>
		<author>
			<persName><forename type="first">G</forename><surname>Araújo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Rodrigues</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Oliveira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Fé</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Silva</surname></persName>
		</author>
		<idno type="DOI">10.1504/IJSNET.2021.117229</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Sensor Networks</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="125" to="138" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Non-Markovian state-space models in dependability evaluation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Distefano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Trivedi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Quality and Reliability Engineering International</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="225" to="239" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A dependability and cost optimization method for private cloud infrastructures</title>
		<author>
			<persName><forename type="first">D</forename><surname>Oliveira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Dantas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Maciel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Matos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Brinkmann</surname></persName>
		</author>
		<idno type="DOI">10.1504/IJWGS.2019.103222</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Web and Grid Services</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="367" to="393" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Availability Analysis of IP Multimedia Subsystem in Cloud Environments</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">Di</forename><surname>Mauro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Galatro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Longo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Postiglione</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tambasco</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICSRS48664.2019.8987674</idno>
	</analytic>
	<monogr>
		<title level="m">4th International Conference on System Reliability and Safety (ICSRS)</title>
				<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="111" to="115" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Models for dependability analysis of cloud computing architectures for eucalyptus platform</title>
		<author>
			<persName><forename type="first">J</forename><surname>Dantas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Matos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Araujo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Maciel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Transactions on Systems Science and Applications</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="13" to="25" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A Fault-Tolerant Model for Performance Optimization of a Fog Computing System</title>
		<author>
			<persName><forename type="first">P</forename><surname>Zhang</surname></persName>
		</author>
		<idno type="DOI">10.1109/JIOT.2021.3088417</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet of Things Journal</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="1725" to="1736" />
			<date type="published" when="2022">1 Feb.1, 2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A novel virtual machine placement algorithm using RF element in cloud infrastructure</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Farzaneh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Fatemi</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11227-021-03863-9</idno>
	</analytic>
	<monogr>
		<title level="j">J Supercomput</title>
		<imprint>
			<biblScope unit="volume">78</biblScope>
			<biblScope unit="page" from="1288" to="1329" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Semi-Markov&apos;s models for availability assessment of an Infrastructure as a Service Cloud with multiple pools of physical and virtual machines</title>
		<author>
			<persName><forename type="first">O</forename><surname>Ivanchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Moroz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Kabak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Smoktii</surname></persName>
		</author>
		<idno type="DOI">10.1109/DESSERT.2018.8409107</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)</title>
				<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="98" to="102" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Transient in the Software Systems. Untraditional Approach to Software Reliability</title>
		<author>
			<persName><forename type="first">D</forename><surname>Maevsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Maevskaya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bojko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Besarab</surname></persName>
		</author>
		<idno type="DOI">10.1109/InfoTech.2019.8860879</idno>
	</analytic>
	<monogr>
		<title level="m">2019 International Conference on Information Technologies (InfoTech)</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">CPE and CVE based Technique for Software Security Risk Assessment</title>
		<author>
			<persName><forename type="first">R</forename><surname>Ushakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Doynikova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Novikova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kotenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/IDAACS53288.2021.9660968</idno>
	</analytic>
	<monogr>
		<title level="m">11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</title>
				<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="353" to="356" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<ptr target="https://nvd.nist.gov" />
		<title level="m">National vulnerability database (NVD)</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Availability Assessment of a Cloud Server System: Comparing Markov and Semi-Markov Models</title>
		<author>
			<persName><forename type="first">O</forename><surname>Ivanchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Moroz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ponochovnyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Degtyareva</surname></persName>
		</author>
		<idno type="DOI">10.1109/IDAACS53288.2021.9661052</idno>
	</analytic>
	<monogr>
		<title level="m">11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</title>
				<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Systems Theory and Systems Analysis. Systems Engineering</title>
		<author>
			<persName><forename type="first">D</forename><surname>Novikov</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-27397-6_4</idno>
	</analytic>
	<monogr>
		<title level="j">Cybernetics. Studies in Systems, Decision and Control</title>
		<imprint>
			<biblScope unit="volume">47</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<ptr target="https://www.sebokwiki.org/w/images/sebokwiki-farm!w/2/24/SEBoKv2.5.pdf" />
		<title level="m">Systems Engineering Body of Knowledge (SEBoK)</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">2</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">Solve stiff differential equations and DAEs -variable order method -MATLAB ode15s</title>
		<ptr target="https://www.mathworks.com/help/matlab/ref/ode15s.html" />
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Machine Learning Methods for Reliable Resource Provisioning in Edge-Cloud Computing: A Survey</title>
		<author>
			<persName><forename type="first">T</forename><surname>Duc</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Leiva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Casari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P.-O</forename><surname>Östberg</surname></persName>
		</author>
		<idno type="DOI">10.1145/3341145</idno>
	</analytic>
	<monogr>
		<title level="j">ACM Comput. Surv</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="1" to="39" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Spark for Data Science</title>
		<author>
			<persName><forename type="first">S</forename><surname>Duvvuri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Singhal</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
			<publisher>Packt Publishing Ltd</publisher>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
