<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Algorithm for Assessing the Degree of Information Security Risk of a Cyber Physical System for Controlling Underground Metal Constructions</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Yuzevych</surname></persName>
							<email>yuzevych@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Karpenko Physico-mechanical Institute of the NAS of Ukraine</orgName>
								<address>
									<addrLine>5 Naukova str</addrLine>
									<postCode>79060</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Stepana Bandery str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Anatoliy</forename><surname>Obshta</surname></persName>
							<email>obshta2002@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Stepana Bandery str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ivan</forename><surname>Opirskyy</surname></persName>
							<email>iopirsky@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Stepana Bandery str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleh</forename><surname>Harasymchuk</surname></persName>
							<email>garasymchuk@ukr.net</email>
							<affiliation key="aff1">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Stepana Bandery str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Algorithm for Assessing the Degree of Information Security Risk of a Cyber Physical System for Controlling Underground Metal Constructions</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">0D2587C7D22AE19B008CB2EB7AB51EEE</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:23+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Underground metal structures (UMC), cyber-physical system (CFS), optimization algorithm, quality criterion, neural networks, risk level, information security, protection system, sensors, communication environment.1 (O. Harasymchuk), 0000-0001-5244-1850 (V. Yuzevych)</term>
					<term>0000-0001-5151-312X (A. Obshta)</term>
					<term>0000-0002-8461-8996 (J. X. Ceur), 0000-0002-8742-8872 (O. Harasymchuk),</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>A procedure for monitoring the functioning of the "underground metal structure (UMC) -aggressive environment (AE)" system has been developed, taking into account the methods of monitoring information on the detection and localisation of product leaks, methods for assessing the life of the corresponding cyber-physical system, as well as optimisation criteria related to the life of metal structural elements, risk assessment units and cryptographic information security system. A system for assessing the value of information for the procedure of integral diagnosis of the CPS cyberphysical system has been developed, taking into account the division of the components of the value of the diagnosis D into two parts, where one part corresponds to incidents and the other to vulnerabilities, taking into account the Vaadin, Spring, AnyLogic, OptQuest frameworks A compromise function has been developed that can be used to ensure the functioning of a cyberphysical system with given values of risk, the value of information about incidents, the value of information related to CPS vulnerabilities, as well as the strength of structural elements and parameters characterizing the quality of the cryptography algorithm. The proposed approach uses elements of graph theory and takes into account the interdependencies of vulnerabilities. The result obtained with the help of criterion ratios makes it possible to: propose a new methodology for assessing the degree of risk of information security of CFS, taking into account the index of probability of a successful attack on the system and the index of adjustment, which provides feedback Some results have been obtained: modelling of the main processes and links in the CFS; a procedure for identifying vulnerabilities in the physical space (at the sensor level), in cyberspace, and in the communication environment; an algorithm for calculating the degree of information security risk for the CFS using the neural network method and taking into account the quality functionality and quality criterion.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>In the process of a comprehensive analysis of the functioning of the underground metal structures (UMC) system, it is necessary to take into account modern technologies for selecting, storing and processing information obtained by the cyber-physical system (CFS) in the process of control and the corresponding information security risks related to corrosion defects. In this context, the research subject is the procedure for assessing the level of information security risk of a cyber-physical system (CFS) for underground metal structures (UMC), which is implemented in the form of an approach that considers the interdependence of vulnerabilities.</p><p>This work aims to develop a methodology for assessing the functioning of the underground metal structures system and the degree of information security risk of the Cyber Physical System (CFS), which would ensure the reliability, confidentiality, completeness, value, and authenticity of information, as well as reduce the ambiguity of determining informative parameters. By the goal, the following tasks need to be performed: 1а) to develop an approach to the design of a monitoring complex for the underground metal structure (UMC) -aggressive environment (AE) system, taking into account information monitoring methods, methods for assessing the life of the relevant cyber-physical system, and optimisation criteria; 2b) to develop a system for assessing the value of information for the procedure of integral diagnosis of the CPS cyber-physical system, taking into account the division of the components of the value of the diagnosis D into two parts, where one part C_Inz (D) corresponds to incidents, and the second C_Vnz (D) -to vulnerabilities: 3с) to develop a compromise function that can be used to ensure the functioning of a cyberphysical system with the specified values of risk, the value of information about incidents, the value of information about vulnerabilities related to CPS vulnerabilities, as well as the strength of structural elements and a high-quality cryptography algorithm.</p><p>UMCs are often subject to terrorist attacks and vandalism <ref type="bibr" target="#b0">[1]</ref>, which can lead to environmental problems of environmental pollution, hydrocarbon decomposition, and significant economic losses. It is necessary to control (monitor) UMCs, but the relevant process requires significant material costs and is also often dangerous. Therefore, it is advisable to use remote wireless monitoring of the UMC, taking into account the threshold values of informative parameters, in particular: temperature, relative humidity pressure around the UMC, dew point of the environment, carbon monoxide volume, number of liquefied petroleum gas leaks, human movement around the facility, fire and smoke <ref type="bibr" target="#b1">[2]</ref>. There are safety regulations and documents, safety guidelines, and industry standards and regulations, compliance with which increases the likelihood of preventing system security failures, the ability to protect the engineering facility from an incident, and ensures the integrity of UMC structural elements <ref type="bibr" target="#b2">[3]</ref>.</p><p>Wireless sensor networks, together with microcontrollers, sensor devices, and communication interfaces, allow users to measure and select the necessary information, as well as respond to phenomena in the monitored UMC environment <ref type="bibr" target="#b3">[4]</ref>.</p><p>The relevance of UMC system risk research is related to the issues of hardware and software information protection. In this context, two important factors should be noted. Firstly, the risks of CFS hardware components are related to the fact that these components are not always certified and this affects the energy consumption and performance in the final version <ref type="bibr" target="#b4">[5]</ref>. Secondly, fuzzy logic and neural networks (NNs) are applied to the risks of UMC software, as the combination of these two methods provides the highest efficiency and adaptability to nonnumerical data <ref type="bibr" target="#b5">[6]</ref>. It should be noted that the relevance of this type of research is also because IT risk may also be the risk of loss that originates from computer software malfunction, such as a manufacturer's software license expiration or glitches, and the ways it affects corporate activities <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">A model for diagnosing underground metal constructions concerning the quality criterion</head><p>We will build a diagram of the process of diagnosing an underground metal structure taking into account the quality criterion in the BPWin Process Modeller program using the IDEF0 module. Information about BPWin Process Modeller and the IDEF0 module is given in <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10]</ref>. The corresponding model diagram is shown in Fig. <ref type="figure">1</ref>, which displays information for monitoring underground metal structures.</p><p>The input to the monitoring system (Fig. <ref type="figure">1</ref>) is the information denoted by the set of parameters M(P) and obtained using sensors for UMC <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref>: electric current density, voltage, polarisation potential, soil moisture, and temperature. To verify the reliability of the input parameters, we use regulatory documents (standards, regulations, instructions). To organise the information on M(P) for UMC, we use databases, knowledge bases, and appropriate algorithms (Fig. <ref type="figure">1</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Monitoring system for underground metal constructions</head><p>The decomposition scheme of the model presented in Fig. <ref type="figure">1</ref> is shown in Fig. <ref type="figure">2</ref>. To implement the model decomposition procedure, we used the relevant principles similarly to those in <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b17">17]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2: Decomposition monitoring model for underground metal constructions</head><p>Decomposition is a scientific method that uses the structure of a problem and allows replacing the solution of one large problem with a series of smaller problems, taking into account data availability, clarity, and the level of model complexity <ref type="bibr" target="#b17">[17]</ref>. To organize the information about M(P) for UMC in the decomposition process, we use databases, knowledge bases, as well as strength and quality criteria for each individual task. The complexity and categoricality of decomposition tasks are assessed by seven indicators of the component tasks similarly to <ref type="bibr" target="#b17">[17]</ref>. This allows us to specify the quantitative description of the model, taking into account clear criteria and the peculiarities of the fact that structures are located underground. Such specification reduces the uncertainty and ambiguity of qualitative judgments, facilitating the assessment of the tasks of the model elements. The appropriate distribution of the categories of tasks of the UMC monitoring model is based on the experience of the authors of the scientific article <ref type="bibr" target="#b17">[17]</ref> and the experience of the authors of this publication.</p><p>The block diagram of the new system, which corresponds to the technology of monitoring information on electrophysical parameters for underground metal structures with regard to the aggressive environment, is shown in Fig. <ref type="figure" target="#fig_0">3</ref>. Monitoring of the "UMC -Aggressive Environment (AE)" system details information on data acquisition from measuring devices (currents, voltages, soil moisture, temperature), processing of input data, data storage in the database, and decision-making in the context of optimizing informative parameters and physical characteristics of contacting media (soil, dielectric coating, metal).</p><p>A block diagram of the cyber-physical system (CPS) and the corresponding decision-making system for the operation of the CPS is shown in Fig. <ref type="figure" target="#fig_1">4</ref>. The block diagram in Fig. <ref type="figure" target="#fig_1">4</ref>. contains 6 blocks, of which blocks 1-2 characterize the information and measurement system (IMS) for measuring electrophysical parameters. Blocks 3 and 4 are the basis of the information processing system for the CPS, obtained by sensors and non-destructive testing devices. Units 3 and 4 are used to organize and clarify the information received by the information monitoring system (Fig. <ref type="figure" target="#fig_0">3</ref>). The methods of functioning of blocks 1-4, taking into account the methods of using neural networks, are described in detail in articles <ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref>.</p><p>We will introduce an integral indicator of the effectiveness of the ER functioning of the underground pipeline monitoring system similar to <ref type="bibr" target="#b17">[17]</ref> with the addition of the parameters of the quality management system (QMS) <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref> and the cryptographic information protection system <ref type="bibr" target="#b20">[20,</ref><ref type="bibr" target="#b21">21]</ref>:</p><formula xml:id="formula_0">ER= f(F(R), M(P), F(Z), F(Q), F(It, Pw))  opt (1)</formula><p>Here 𝐹(𝑅) is the effectiveness of the monitoring system and the corresponding algorithm in the context of the risk-based corrosion model 𝑅; 𝐹(𝑍) is the effectiveness of the information security structural units; 𝐹(𝑄) is the effectiveness of the algorithm taking into account the QMS; 𝐹(𝐼𝑡, 𝑃𝑤) is a function of performance and the effectiveness of the algorithm in the context of personnel functioning; It is the index of creativity, qualification and loyalty of employees; 𝑃𝑤 is a set of parameters that characterizes the behaviour of personnel, including qualitative and quantitative factors 𝑃𝑤𝑖. (𝑖 = 1, 2, . . . 𝑛 𝑠 ; 𝑛 𝑠 is the total number of parameters of the corresponding model).</p><p>To optimize the information flows 𝐽 𝑛 (𝑀(𝑃), 𝑃𝑤𝑖) in the cyber-physical system monitoring system and improve the corrosion protection system of underground metal structures, we use the quality functionality with feedback similar to <ref type="bibr" target="#b13">[14]</ref>:</p><formula xml:id="formula_1">0 ( ( ( ), ), , ( ( ), )) ( , , ) k t n i i t J M P Pw R FB M P Pw f y u dt opt   =  <label>(2)</label></formula><p>where 𝑦 -vector of specified influences (𝑦 𝑗 (𝑡) -components of the vector, 𝑗 = 1,2, . . . , 𝑛 𝑡 ); 𝑢vector of controls; 𝜉 -vector of uncertain disturbances; [𝑡 0 , 𝑡 𝑘 ] -time interval in which the process is considered (formation of optimal values of information and financial flows 𝐽 𝑛 (𝑃𝑤 𝑖 ); 𝑛 = 1,2, . . . , 𝑚; 𝑖 = 1,2, . . . , 𝑛 𝑆 ; 𝑚 -total number of parameters); 𝑓(𝑦, 𝑢, 𝜉) -a function that reflects the quality indicator; 𝐹𝐵(𝑀(𝑃), 𝑃𝑤 𝑖 ) -a function that characterizes the feedback between the flows 𝐽 𝑛 (𝑀(𝑃), 𝑃𝑤 𝑖 ), taking into account the regulatory documents on information security and expert opinions. Here, the symbol opt corresponds to the condition of optimality of the functional (2).</p><p>It is worth noting that relation ( <ref type="formula" target="#formula_1">2</ref>) is written in the form of a quality criterion for the corresponding cyber-physical system (CPS). It is worth noting that the inverse relationship 𝐹𝐵(𝑀(𝑃), 𝑃𝑤 𝑖 ) is related to the risks 𝑅 and the conditions of operation of the cryptographic information security system. To optimize the risks, we will take into account the following factors <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b20">20,</ref><ref type="bibr" target="#b21">21]</ref>: quality and reliability, information capacity, and risk factors 𝑅 associated with the software that provides cryptographic encoding.</p><p>For the functioning of the algorithm for assessing the degree of risk of CPS information security, i.e., for the control of underground metal structures, we use the structural elements of the Vaadin, Spring, AnyLogic, and OptQuest frameworks, which together provide a reliable database that ensures effective protection of CPS, as well as the cathodic protection system metal structures (CPSMS) <ref type="bibr" target="#b22">[22]</ref><ref type="bibr" target="#b23">[23]</ref><ref type="bibr" target="#b24">[24]</ref><ref type="bibr" target="#b25">[25]</ref>.</p><p>Vaadin offers a server-oriented architecture based on Java Enterprise Edition (JEE) <ref type="bibr" target="#b25">[25]</ref>. Using JEE allows you to execute the bulk of the program logic in the context of the server, and also allows you to interact with the user, taking into account the capabilities of desktop applications <ref type="bibr" target="#b25">[25]</ref>. To display user interface (UI) elements and interact with the server on the client side, Vaadin uses its own set of web components <ref type="bibr" target="#b25">[25]</ref>. An important feature of the Vaadin framework is that the interaction between the server and the browser is fully automated, and this connection allows developers to create web interfaces efficiently and quickly without having to manually code HTML (HyperText Markup Language) and CSS (Cascading Style Sheets) elements <ref type="bibr" target="#b24">[24]</ref>.</p><p>The Vaadin Framework simplifies the process of creating and maintaining high-quality web user interfaces and is structured as a server API, a client API, a set of UI components on both sides, a theme engine for designing the interface, and a data model that allows you to link server components directly to data <ref type="bibr" target="#b25">[25]</ref>.</p><p>The server part of the Vaadin application runs on any servlet or portlet container, accepts HTTP requests from the user and interprets them as events of a specific session <ref type="bibr" target="#b25">[25]</ref>. Events associated with client interface components are delivered to those event listeners that appear in the application and the corresponding UI logic is accompanied by changes to the UI components on the server side, this procedure provides the process of obtaining an image with a model response for display in a web browser <ref type="bibr" target="#b25">[25]</ref>.</p><p>The Vaadin Framework corresponds to two models of web application development: for the client (browser) and the server side, respectively, and the client layer of the Vaadin interface includes two types of components: basic UI components and application components <ref type="bibr" target="#b25">[25]</ref>.</p><p>The UI component library of the Vaadin framework contains a set of pre-built, tested, and welldocumented user interface (UI) components that can be easily reused in the UI of a product <ref type="bibr" target="#b25">[25]</ref>. This ensures that the final product has a user-friendly appearance, promotes efficiency and scalability in its operation, and allows users to perform actions and monitor processes and events <ref type="bibr" target="#b25">[25]</ref>. The noted components of the Vaadin interface are quite general and can be introduced into various programs since they do not violate the logic of the computer program and can be successfully used to control R risks.</p><p>The purpose of the Spring Boot project is to simplify the creation of Spring-based programs and to create web applications with minimal effort from designers in terms of configuration and code writing <ref type="bibr" target="#b23">[23]</ref>. The Spring framework provides comprehensive support for web application infrastructure for developing Java programs <ref type="bibr" target="#b23">[23]</ref>.</p><p>Spring Boot is focused on extending the Spring environment with Spring, Spring Boot, and Spring Cloud components, eliminates some of the template configurations required to set up a Spring application, and provides a fairly fast and efficient system for developing various partial tasks that are useful for cybersecurity <ref type="bibr" target="#b23">[23]</ref>.</p><p>Spring Framework is a universal, widespread application framework that focuses on the corporate development of complex programs in the Java environment and provides a modular approach, as well as allows for the implementation of aspect-oriented programming (AOP) dependencies and rational data access <ref type="bibr" target="#b23">[23]</ref>.</p><p>Aspect-oriented programming (AOP) complements object-oriented programming (OOP) by specifying information about the program structure <ref type="bibr" target="#b23">[23]</ref>. The key unit of modularity in OOP is the class, while in AOP the unit of modularity is the aspect, and the set of aspects and classes makes it possible to implement modules in procedures such as transaction management that combine several types and objects <ref type="bibr" target="#b23">[23]</ref>. In the literature, problems such as transaction management with AOP are related to the structure of AOP and are often called cross-cutting problems <ref type="bibr" target="#b23">[23]</ref>.</p><p>That is, AOP can be a kind of tool for solving problems that are not directly related to Spring logic but allows you to modify the behaviour of existing Spring code without changing its functionality <ref type="bibr" target="#b23">[23]</ref>. Spring has its own AOP framework that complements OOP by introducing a new technique for achieving modularity and greater code cleanliness that is conceptually easy to understand and allows you to effectively solve most practical problems in enterprise Java applications <ref type="bibr" target="#b23">[23]</ref>.</p><p>Since Spring AOP is implemented in the object-oriented Java programming language, there is no need for a special compilation procedure. When using Spring AOP, there is no need to manage the class loader hierarchy, because Spring AOP creates the conditions for use in a Servlet container or application server <ref type="bibr" target="#b23">[23]</ref>.</p><p>Spring AOP primarily supports method composition points and in this case, provides recommendations for method execution on Spring components <ref type="bibr" target="#b23">[23]</ref>. Field capture operations (sensitive information) are often not implemented, although support for field capture can be added without breaking the core Spring AOP APIs <ref type="bibr" target="#b23">[23]</ref>. If the user needs to advise access to the field and update the connection points, then it is worth considering an additional task in the AspectJ programming language <ref type="bibr" target="#b23">[23]</ref>.</p><p>Spring AOP's approach to AOP differs from most other AOP frameworks <ref type="bibr" target="#b23">[23]</ref>. The goal in this context is not to provide the complete AOP implementation (although Spring AOP is quite capable of doing so); rather, it is to ensure tight integration between the AOP implementation and Spring IoC to help provide effective algorithms for solving typical cybersecurity problems in enterprise applications <ref type="bibr" target="#b23">[23]</ref>.</p><p>The functionality of the AOP Spring Framework is usually used in conjunction with the Spring IoC (Inversion of Control) container, and the characteristics of the corresponding implementation of the cybersecurity program are configured using the bean-component definition syntax, and the corresponding approach allows to implement effective "auto proxy" capabilities and this technique provides a significant difference from other AOP implementations <ref type="bibr" target="#b23">[23]</ref>. The experience of the conducted research shows that Spring AOP provides a rational and successful solution to most of the tasks in enterprise Java programs that are subject to AOP. However, the Spring IoC container is independent of AOP, that is, the user does not need to use AOP if he does not want to <ref type="bibr" target="#b23">[23]</ref>. AOP does not compete with AspectJ to provide comprehensive problem-solving with AOP, and at the same time complements Spring IoC to provide sufficiently efficient solutions to applied cybersecurity problems with middleware <ref type="bibr" target="#b23">[23]</ref>.</p><p>It is known that proxy-based frameworks such as Spring AOP and full-scale frameworks such as AspectJ are valuable and that they complement each other rather than compete <ref type="bibr" target="#b23">[23]</ref>. Spring seamlessly integrates Spring AOP and IoC with AspectJ to provide the full capabilities of AOP in a coherent Spring-based application architecture <ref type="bibr" target="#b23">[23]</ref>. This integration does not affect Spring AOP: that is, Spring AOP remains backwards compatible <ref type="bibr" target="#b23">[23]</ref>.</p><p>Spring Boot is built on top of the traditional Spring Framework, which is widely used to develop REST APIs and is characterized by standalone applications with a built-in server, standalone productivity applications, simplified configuration, and selective defaults <ref type="bibr" target="#b23">[23]</ref>.</p><p>The Spring Framework Inversion of Control (IoC) components codify formalized design patterns as first-class objects that users can integrate into their applications, provide a formalized means of combining different components, and build on this basis fully working applications that are ready to use <ref type="bibr" target="#b23">[23]</ref>. The Spring Framework always offers choices and the user has the freedom to make an informed decision about which option is best suited for their particular use case or scenario, and modifies formalized design patterns as separate cybersecurity objects that the user can integrate into their applications <ref type="bibr" target="#b23">[23]</ref>.</p><p>AnyLogic integrates the leading OptQuest optimizer and is based on sophisticated analytical algorithms that allow finding optimal parameter values when solving cybersecurity problems using modeling tools and help users make informed decisions <ref type="bibr" target="#b24">[24]</ref>.</p><p>The system for protecting a metal structure element in an aggressive soil environment, taking into account the Vaadin, Spring, AnyLogic, and OptQuest frameworks, will be linked to the RS(R) resource for the safe operation of a material with a damaged insulating coating in a corrosive environment, and the corresponding ratios will be written in a form similar to that in <ref type="bibr" target="#b25">[25]</ref>:</p><formula xml:id="formula_2">( ) ( ); Sw R R R w R = ( ) (</formula><p>).</p><formula xml:id="formula_3">w w P R R K R R =<label>(3)</label></formula><p>Here, RP(R), and w(R) are the design and relative service life of the metal structure material in the air, respectively; KW=KW(NP, NS) is the coefficient of influence of the aggressive environment on the durability of the metal structure material; NP, NS is the durability of the metal structure material in the air and aggressive environment; Rw= Rw(M(P), Pwi) is the service life of the metal structure material with a damaged insulation coating underground under the condition of contact with the soil. The influence of an aggressive environment on the parameters characterizing the service life of a metal structure is characterized using the methods given in <ref type="bibr" target="#b26">[26,</ref><ref type="bibr" target="#b27">27]</ref>. The effect of an aggressive environment on the service life and protection system of a metal structure is characterized using the methods given in <ref type="bibr" target="#b21">[21,</ref><ref type="bibr" target="#b28">28]</ref>.</p><p>The effectiveness of UMC protection depends on the intensity of corrosion processes on the surface. Relevant engineering objects are protected by coatings and cathodic protection equipment (CPE). The UMC surface is covered with defects such as cracks and pittings. The corrosion inhibition coefficient and information security risks of the relevant cyber-physical system (CPS) depend on the state of the defects <ref type="bibr" target="#b29">[29,</ref><ref type="bibr">30]</ref>.</p><p>Let us consider the diagnostic value of information CDi(kj) for the CPS system, which includes UMC, CPE, and the sensor system <ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b29">29]</ref>. The diagnostic value CDi(kj) for a feature kj for a state (diagnosis) Di is the amount of information about incidents and vulnerabilities (including frameworks) (incidents (In) and vulnerabilities (Vn)) contributed by all variants of the corresponding feature implementation in establishing the corresponding state <ref type="bibr" target="#b29">[29]</ref>. We propose to write the expression CDi(kj) for the m -bit feature in the same way as in <ref type="bibr" target="#b29">[29]</ref>: </p><formula xml:id="formula_4">( ) ( ) ( ) ( ) ( ) 1 1 / , /<label>log</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>P k D C k D P k D C D C D P D P k D</head><formula xml:id="formula_5">= = = = +    (4)</formula><p>Here, in (4), the feature kj has several values kjs for a given object, and these values together form the realization of the feature kj; P(kjs/Di) is the probability of the state (diagnosis) Di, provided that the feature kj has received the value kjs; P(Di) is the a priori probability of the diagnostic state.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Let us write down the ratio of the integral value of information CD(D,CPS) for the procedure of integral diagnosis D=D(R) of the CPS system, taking into account the division into two components CInz(D), CVnz(D), where the CInz(D) component corresponds to incidents and CVnz(D)</head><p>to vulnerabilities:</p><formula xml:id="formula_6">( ) , ( , ) ( , ). D Inz Vnz C D CPS C D R C D R =+ (5)</formula><p>To ensure a high level of security of a cyber-physical system (CPS), we use a cryptography algorithm (ACR), which is characterized by quality, stability, and reliability. It is formed using elements of the AES and RSA algorithms, as well as a system for testing, encrypting, and decrypting information using software that operates with the NetBeans program <ref type="bibr">[31]</ref>. The proposed approach (5) takes into account the interdependencies of vulnerabilities and uses elements of graph theory. The method of randomization and encryption based on the method of matrix operations (MORE) was used to train neural networks using encrypted data <ref type="bibr">[32]</ref>. It was found that the use of a neural network approach, as well as training a neural network using MORE, improves the accuracy, running time, and performance of CPS, as well as the appropriate level of privacy compared to other state-of-the-art methods <ref type="bibr">[32,</ref><ref type="bibr">33]</ref>. The quality of a cryptography algorithm QCz(RA,TC,SC,AR) is characterized by four parameters [31, 32]: reliability RA, time complexity TC, spatial complexity SC, accuracy AR, i.e., the level of ensuring the correct result.</p><p>Let's write down the criterion relations for the functional dependencies CInz(D), CVnz(D), QCz(RA, TC, SC, AR), as well as for the structural strength SS: ( , ) min;</p><p>( , ) mi n; ( , , , , ) ma x ;</p><formula xml:id="formula_7">Inz Vnz Cz A C C R C D R C D R Q R T S A R   <label>1 ( ) ( , , , , , ) max.</label></formula><formula xml:id="formula_8">Sz Sz S S CV PL C S S W K W K R   = <label>(6)</label></formula><p>Here, WS, S are the surface energy and tension of the structural material, respectively; KCV is the impact toughness of the material; WPL is the surface plastic strain energy of the material; K1C is the fracture toughness of the material <ref type="bibr">[33]</ref>.</p><p>Let us convert the functional dependencies CInz(D), CVnz(D), QCz(RA,TC,SC,AR), SCz() to a dimensionless form, in particular:</p><formula xml:id="formula_9">( ) ( ) / ( ( )) ; ( ) ( ) / ( ( )) ; In Inz Inz CP Vn Vnz Vnz CP C D C D C D C D C D C D == (7) ( , )<label>( , , , ) ( , , , ) / ( ( , , , )) ;</label></formula><formula xml:id="formula_10">C C A C C R Cz A C C R Cz A C C R CP Q D Q R T S A Q R T S A Q R T S A = = (8) 1 ( , )<label>( , , , , ), S</label></formula><formula xml:id="formula_11">S S S CV PL C S D S W K W K  = 11 ( , )<label>( , , , , ) / ( ( , , , , ))</label></formula><formula xml:id="formula_12">S Sz S S CV PL C Sz S S CV PL C CP S D S W K W K S W K W K  = .<label>(9)</label></formula><p>Here ( ( ))</p><formula xml:id="formula_13">Inz CP CD ,<label>( ( ))</label></formula><p>Vnz CP CD , ( ( , , , ))</p><formula xml:id="formula_14">Cz A C C R CP Q R T S A , 1<label>( ( , , , , )</label></formula><p>)</p><formula xml:id="formula_15">Sz S S CV PL C CP S W K W K</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>-values of the relevant functions at critical (special) points. These can be, for example, the maximum possible values of the relevant factors.</p><p>Since the factors (functions) C In (D), C Vn (D), Q C (,D), S S (,D) in relations ( <ref type="formula">7</ref>)-( <ref type="formula" target="#formula_12">9</ref>) are dimensionless, then they can be used to formulate a trade-off function FQ(D,R) (Trade-off function) and, with its help, the optimization criterion, since the first two of them should tend to decrease in terms of safety, and the third and fourth in absolute value should increase:</p><formula xml:id="formula_16">( , )<label>( ) ( ) ) ( , ( , ) ,</label></formula><formula xml:id="formula_17">Q In Vn C S F D R C D C D Q D S D opt     =  + +   +    <label>(10)</label></formula><p>where CIn(D), CVn(D), QC(,D), SS(,D) -functional dependencies that we establish based on the experiment; , , ,  -weighting coefficients, which are determined on the basis of a computational experiment, taking into account information of the type presented in Fig. <ref type="figure" target="#fig_1">4</ref>, as well as criteria (1), ( <ref type="formula" target="#formula_1">2</ref>), <ref type="bibr" target="#b4">(5)</ref>. The result obtained using <ref type="bibr" target="#b9">(10)</ref> makes it possible to: propose a new methodology for assessing the degree of risk of CFS information security, taking into account the index of the probability of a successful attack on the system and the index of adjustment, which provides feedback. As a result, taking into account the quality criteria (2), ( <ref type="formula">5</ref>), parameters characterizing the resource (3), and the corresponding optimization algorithm based on the trade-off function <ref type="bibr" target="#b9">(10)</ref>, it is possible to assess the risk degree R of the metal structure and increase the efficiency of the CPS protection system against unauthorized influences and threats.</p><p>Example. The results of testing the leak detection system (LDS) on the linear part of the main oil pipeline "section 43" station "5C" -station "1K" from 0 km to 231 km were used <ref type="bibr" target="#b0">[1]</ref>. The tests were carried out with full verification of the system operation algorithms, by the design decisions, by organising oil product discharges from the pipeline according to the approved programme and testing methodology of the IHS <ref type="bibr" target="#b0">[1]</ref>. A partial result of a series of tests conducted using pressure sensors according to the methodology <ref type="bibr" target="#b0">[1]</ref> is shown in Table <ref type="table">2</ref>. To check the performance of the IED, oil product discharges were organised at 2-3 points of the protected section of the oil pipeline "section 43", 0-231 km, with different intensity, leakage development time and for different modes of operation of the pipeline <ref type="bibr" target="#b0">[1]</ref>.</p><p>In the course of the work, the following were performed <ref type="bibr" target="#b0">[1]</ref>: verification of functional requirements for the IED; verification of the IED characteristics; checking the system for stability; and checking the accuracy and reliability of leakage detection within the protected area.</p><p>At the time of testing, the complete set of software and hardware was provided, as well as the completeness of permits and technical documentation following norms and standards for all supplied equipment <ref type="bibr" target="#b0">[1]</ref>. Before the start of the tests, the readiness of the material, technical and metrological support facilities was checked to ensure that the conditions and test modes were created under the programme <ref type="bibr" target="#b0">[1]</ref>. The tests were carried out to determine the appropriate size of the minimum recorded leakage for a given oil pipeline in the following modes of operation <ref type="bibr" target="#b0">[1]</ref>: maximum, minimum, and one of the intermediate modes.</p><p>The tests were carried out at each of the modes of operation of the oil pipeline with the following leakage development time <ref type="bibr" target="#b0">[1]</ref>: up to 1 s, -from 1 to 10 s, more than 10 s.</p><p>The tests were carried out in series of 2-3 showers for each leak, taking into account the following conditions <ref type="bibr" target="#b0">[1]</ref>: 4 series of experiments were carried out; the first -three experiments, the second -three, the third -two, the fourth -three experiments. The mean values and standard deviations for each series of experiments were calculated. So, if we sum all errors in determining the leak coordinate and divide them by the total number of tests, we should get an average (mean) value, which should be less than ±300m (k = 1,2,…11).</p><p>A refined leakage test was carried out using the BVS-K non-contact current meter and the VPP-M polarisation potential meter for non-destructive testing of metal surfaces according to the methodology presented in <ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr">34</ref>]. As a result, the average error value Errors2= 2 m was obtained. The relative value of Errors3= 2/300 = 0.007. It is irrational to control leaks only with the help of BVS-K and VPP-M devices. It is more rational to conduct leakage control based on pressure sensors at the first stage and obtain results similar to those in Table <ref type="table" target="#tab_1">1</ref>, and at the second stage, it is possible to clarify the locations of leaks (depressurisation) using remote monitoring devices BVS-K and VPP-M. In actual pipeline operation conditions, it is necessary to take into account the possibility of corrosion defects such as pitting, cavities, and cracks, which change their size over time and eventually become fracture sites. We describe their evolution using relations (1)-( <ref type="formula" target="#formula_17">10</ref>), taking into account the monitoring system, which is based on a cyber-physical system (CPS) for modelling the electrophysical parameters of the system "underground metal structure -external aggressive environment", taking into account the risk assessment unit and the cryptographic information security system (Fig. <ref type="figure" target="#fig_1">4</ref>).</p><p>To diagnose defects on the surface of the pipe and places of depressurisation (leakage) of the pipeline using: pressure sensors and non-destructive testing devices, which measure potentials and corrosion currents, an information and computer technology has been developed, the structural diagram of which is presented in [34] (Fig. <ref type="figure" target="#fig_2">5</ref>) for the underground pipeline (UP)pumping station (PS) system.</p><p>The scheme in Fig. <ref type="figure" target="#fig_2">5</ref> contains 7 blocks, of which blocks 2, 3, 4 correspond to the information and measurement system (IMS) for measurements. Blocks 5, 6, 7 are the basis of the system for processing information received by sensors and non-destructive testing devices (IMS). The methods of operation of units 5, 6, 7 are partially described in articles <ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr">34]</ref>.</p><p>The scheme in Fig. <ref type="figure" target="#fig_2">5</ref> contains 7 blocks from which blocks 2, 3, 4 answer the informativemeasuring system (IMS) for realisation of measurement. Blocks 5, 6, 7 are the basis of the information processing system received by sensors and non-destructive control devices (IMS). Methodologies of functioning of blocks 5, 6, 7 are partially described in articles <ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr">34]</ref>.</p><p>For the cyber-physical system (CPS) (Fig. <ref type="figure" target="#fig_1">4</ref>) and information and computer technology (Fig. <ref type="figure" target="#fig_2">5</ref>), we use the Vaadin, Spring, AnyLogic, OptQuest frameworks, as well as the principles of cryptographic encoding and decoding of information</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusions</head><p>The basics of the method and a variant of the methodology for improving the efficiency of the CPS protection system of an underground metal structure against unauthorized influences and threats, taking into account the corrosive effect on the life and strength of the material, quality criteria <ref type="bibr" target="#b1">(2,</ref><ref type="bibr" target="#b4">5)</ref> and the corresponding optimization algorithm based on the trade-off function and the Vaadin, Spring, AnyLogic, OptQuest frameworks, are presented.</p><p>1) An approach to monitoring the system "underground metal structure (UMC) -aggressive environment (AE)" was developed, taking into account information monitoring methods, methods for assessing the life of the corresponding cyber-physical system, as well as optimization criteria related to the life of metal structural elements, risk assessment units, and cryptographic information security system.</p><p>2) A system for assessing the value of information for the procedure of integral diagnosis of a cyber-physical system CPS was developed, taking into account the division of the components of the value of the diagnosis D into two parts, where one part CInz(D) corresponds to incidents, and the second CVnz(D) -to vulnerabilities, taking into account the Vaadin, Spring, AnyLogic, OptQuest frameworks.</p><p>3) A compromise function has been developed that can be used to ensure the functioning of a cyber-physical system with given values of risk, the value of information about incidents, the value of information related to CPS vulnerabilities, as well as the strength of structural elements, and parameters that characterize the quality of the cryptography algorithm.</p><p>Using the trade-off function, options for methods of improving the efficiency of the CPS protection system, and the initial values of the parameters M(P), specific partial tasks can be formulated and the corresponding risk values can be determined.</p><p>For the functioning of the optimization algorithm for assessing the degree of risk of information security of a cyber-physical system and, in this context, to ensure the conditions for controlling the protection system of underground metal structures, we use the structural elements of the Vaadin, Spring, AnyLogic, OptQuest frameworks, as well as the principles of cryptographic encoding and decoding of information.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Block diagram of information monitoring for the system "underground metal construction (UMS) -aggressive environment (AE)"</figDesc><graphic coords="4,177.70,56.70,253.80,92.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Block diagram of a cyber-physical system (CPS) for modelling the electrophysical parameters of the system "underground metal structure -external aggressive environment"</figDesc><graphic coords="4,186.82,277.66,235.55,314.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Block diagram of informatively-computer technology for underground pipelines (UP) taking into account the informatively-measuring system (IMS) (2, 3, 4) for control of corrosive processes [34]</figDesc><graphic coords="10,72.00,378.92,451.00,309.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="1,0.00,191.12,595.00,459.77" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="3,86.20,56.70,421.19,212.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="3,86.20,333.23,418.41,227.15" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 Abbreviated table of system test results [1]</head><label>1</label><figDesc></figDesc><table><row><cell>Tests</cell><cell>Date</cell><cell>The</cell><cell></cell><cell>The</cell><cell>The</cell><cell>The fact</cell><cell>Actual</cell><cell>System</cell><cell>Errork,</cell></row><row><cell>Results</cell><cell>and</cell><cell cols="2">duration</cell><cell>size</cell><cell>magnitude</cell><cell>of</cell><cell>coordinate</cell><cell>leakage</cell><cell>m</cell></row><row><cell></cell><cell>Time</cell><cell>of</cell><cell>the</cell><cell>of</cell><cell>of the leak</cell><cell>detecting</cell><cell>of</cell><cell>coordinate,</cell></row><row><cell></cell><cell></cell><cell cols="2">leak ∆T,</cell><cell>the</cell><cell>∆P, mPa</cell><cell>a leak</cell><cell>selection,</cell><cell>km</cell></row><row><cell></cell><cell></cell><cell>s</cell><cell></cell><cell>leak</cell><cell>(out/in)</cell><cell></cell><cell>km</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>Q, l</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>1</cell><cell>2</cell><cell></cell><cell>3</cell><cell>4</cell><cell>5</cell><cell>6</cell><cell>7</cell><cell>8</cell></row><row><cell>1</cell><cell>12.02</cell><cell>1</cell><cell></cell><cell>1</cell><cell>0.02/*</cell><cell>Yes</cell><cell>23.4</cell><cell>23.55</cell><cell>150</cell></row><row><cell></cell><cell>12:00</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>2</cell><cell>12.02</cell><cell>1</cell><cell></cell><cell>2</cell><cell>0.03/*</cell><cell>Yes</cell><cell>23.4</cell><cell>23.15</cell><cell>250</cell></row><row><cell></cell><cell>12:10</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>3</cell><cell>12.02</cell><cell>1</cell><cell></cell><cell>2</cell><cell>0.03/*</cell><cell>Yes</cell><cell>23.4</cell><cell>23.2</cell><cell>200</cell></row><row><cell></cell><cell>12:20</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>4</cell><cell>12.02</cell><cell>10</cell><cell></cell><cell>15</cell><cell cols="2">0.07/0.024 Yes</cell><cell>56.1</cell><cell>56.4</cell><cell>300</cell></row><row><cell></cell><cell>13:30</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>5</cell><cell>12.02</cell><cell>10</cell><cell></cell><cell>15</cell><cell cols="2">0.07/0.024 Yes</cell><cell>56.1</cell><cell>56.35</cell><cell>250</cell></row><row><cell></cell><cell>13:40</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Cyber-Physical System for Diagnostic Along the Controlled Section of the Oil Pipeline</title>
		<author>
			<persName><forename type="first">Anatoliy</forename><surname>Obshta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yurii</forename><surname>Biliak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vladyslav</forename><surname>Shugai</surname></persName>
		</author>
		<idno type="DOI">10.23939/acps2023.01.066</idno>
	</analytic>
	<monogr>
		<title level="j">Advances in Cyber-Physical Systems</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="66" to="73" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
	<note>Language: EN</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Remote Pipeline Monitoring Security System</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">V</forename><surname>Ngonadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ajiroghene</surname></persName>
		</author>
		<idno type="DOI">10.32628/CSEIT217631</idno>
		<ptr target="https://doi.org/10.32628/CSEIT217631" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Scientific Research in Computer Science, Engineering and Information Technology</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="135" to="145" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m">Pipeline Security and Incident Recovery Protocol Plan / Transportation Security Administration</title>
				<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page">58</biblScope>
		</imprint>
		<respStmt>
			<orgName>U. S. Departament of Homeland Security</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Pipeline Infrastructure Vandalism Monitoring using Wireless Sensor Networks Technique</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Kefas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">O</forename><surname>Sunday</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Bashir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Abraham</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Science and Telecommunications</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="39" to="42" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Run-time prediction and preemption of configuration attacks on embedded process controllers</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">W</forename><surname>Lerner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Farag</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">D</forename><surname>Patterson</surname></persName>
		</author>
		<idno type="DOI">10.1145/2490428.2490447</idno>
		<ptr target="https://doi.org/10.1145/2490428.2490447" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the First International Conference on Security of Internet of Things</title>
				<meeting>the First International Conference on Security of Internet of Things</meeting>
		<imprint>
			<date type="published" when="2012-08">August 2012. 2012</date>
			<biblScope unit="page" from="135" to="144" />
		</imprint>
	</monogr>
	<note>SecurIT &apos;12</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method</title>
		<author>
			<persName><forename type="first">M.-C</forename><surname>Lee</surname></persName>
		</author>
		<idno type="DOI">10.5121/ijcsit.2014.6103</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Science &amp; Information Technology (IJCSIT)</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="29" to="45" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Software Safety and Security Risk Mitigation in Cyber-physical Systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Biro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mashkoor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Sametinger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Seker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Software</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="24" to="29" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">F</forename><surname>Hu</surname></persName>
		</author>
		<title level="m">Cyber-Physical Systems: Integrated Computing and Engineering Design</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>CRC Press</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page">398</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Design and validation of a C++ code generator from abstract state machines specifications / S Bonfanti, A Gargantini, A Mashkoor</title>
	</analytic>
	<monogr>
		<title level="j">Journal of Software: Evolution and Process</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page">e2205</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The efficient use of enterprise information for strategic advantage: A data envelopment analysis</title>
		<author>
			<persName><forename type="first">E</forename><surname>Bendoly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Rosenzweig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">K</forename><surname>Stratman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Operations Management</title>
		<imprint>
			<biblScope unit="issue">27</biblScope>
			<biblScope unit="page" from="310" to="323" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Construction Site Monitoring Data Processing Based on Detecting Anomalies and Improved Variational Mode Decomposition</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Shaoa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Anb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Qic</surname></persName>
		</author>
		<idno type="DOI">10.2991/978-94-6463-312-2_27</idno>
		<ptr target="https://doi.org/10.2991/978-94-6463-312-2_27" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2023 5th International Conference on Structural Seismic and Civil Engineering Research (ICSSER 2023)</title>
				<editor>
			<persName><forename type="first">W</forename><surname>Liu</surname></persName>
		</editor>
		<meeting>the 2023 5th International Conference on Structural Seismic and Civil Engineering Research (ICSSER 2023)</meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="258" to="269" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A survey of network anomaly detection techniques</title>
		<author>
			<persName><forename type="first">M</forename><surname>Ahmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Mahmood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jnca.2015.11.016</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Network and Computer Applications</title>
		<imprint>
			<biblScope unit="volume">60</biblScope>
			<biblScope unit="page" from="19" to="31" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Improving the diagnostics of underground pipelines at oil-and-gas enterprises based on determining hydrogen exponent (ph) of the soil media applying neural networks</title>
		<author>
			<persName><forename type="first">L</forename><surname>Yuzevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Skrynkovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Yuzevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lozovan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pawlowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yasinskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Ogirko</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2019.174488</idno>
		<idno>-4061.2019.174488</idno>
		<ptr target="https://doi.org/10.15587/1729" />
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="56" to="64" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Forming the toolset for development of a system to control quality of operation of underground pipelines by oil and gas enterprises with the use of neural networks</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lozovan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Skrynkovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Yuzevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yasinskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pawlowski</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2019.161484</idno>
		<idno>doi:</idno>
		<ptr target="http://dx.doi.org/10.15587/1729-4061.2019.161484" />
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="41" to="48" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Improvement of the toolset for diagnosing underground pipelines of oil and gas enterprises considering changes in internal working pressure</title>
		<author>
			<persName><forename type="first">L</forename><surname>Yuzevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Yankovska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sopilnyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Yuzevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Skrynkovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Koman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Yasinska-Damri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Heorhiadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dzhala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yasinskyi</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2019.18</idno>
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="23" to="29" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Detection of specific features in the functioning of a system for the anti-corrosion protection of underground pipelines at oil and gas enterprises using neural networks // Eastern-European</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lozovan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dzhala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Skrynkovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Yuzevych</surname></persName>
		</author>
		<idno type="DOI">10.15587/1729-4061.2019.154999</idno>
		<ptr target="https://doi.org/10.15587/1729-4061.2019.154999" />
	</analytic>
	<monogr>
		<title level="j">Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="20" to="27" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Task decomposition and level of complexity to select the content of underground utility network model // The International Archives of the Photogrammetry</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pouliot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Hubert</surname></persName>
		</author>
		<idno type="DOI">10.5194/isprs-archives-XLVIII-4-W4-2022-21-2022</idno>
		<ptr target="https://doi.org/10.5194/isprs-archives-XLVIII-4-W4-2022-21-2022" />
	</analytic>
	<monogr>
		<title level="m">Remote Sensing and Spatial Information Sciences</title>
				<meeting><address><addrLine>Sydney, Australia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2022-10-21">19-21 October 2022. 2022</date>
			<biblScope unit="volume">XLVIII</biblScope>
			<biblScope unit="page" from="21" to="27" />
		</imprint>
	</monogr>
	<note>-4/W4-2022 17th 3D GeoInfo Conference</note>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Global Quality Management System (G-QMS) in Systems of Systems (SoS)-Aspects of Definition, Structure and Model</title>
		<author>
			<persName><forename type="first">N</forename><surname>Agmon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kordova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shoval</surname></persName>
		</author>
		<idno type="DOI">10.3390/systems10040099</idno>
		<ptr target="https://doi.org/10.3390/systems10040099" />
	</analytic>
	<monogr>
		<title level="j">Systems</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">99</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m">ISO 9004:2018 Quality Management-Quality of an Organization-Guidance to Achieve Sustained Success</title>
				<meeting><address><addrLine>ISO; Geneva, Switzerland</addrLine></address></meeting>
		<imprint>
			<publisher>International Organization of Standardization</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Cryptographic protection of classified information in military radio communication faced with threats from quantum computers</title>
		<author>
			<persName><forename type="first">R</forename><surname>Wicik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Borowski</surname></persName>
		</author>
		<idno type="DOI">10.1117/12.2565467</idno>
	</analytic>
	<monogr>
		<title level="m">Radioelectronic Systems Conference</title>
				<imprint>
			<date type="published" when="2019-02-11">2019. 11 February 2020</date>
			<biblScope unit="page">8</biblScope>
		</imprint>
	</monogr>
	<note>Proc. SPIE 11442</note>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Encryption Technology in Information System</title>
		<author>
			<persName><forename type="first">S</forename><surname>Suo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Xi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Cai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Jian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Mechatronics Engineering and Information Technology</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</editor>
		<meeting><address><addrLine>ICMEIT</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="volume">87</biblScope>
			<biblScope unit="page" from="495" to="499" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Building a complete fullstack software development environment</title>
		<author>
			<persName><forename type="first">T</forename><surname>Mattila</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page">112</biblScope>
		</imprint>
		<respStmt>
			<orgName>Turku University of Applied Sciences</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<ptr target="https://docs.spring.io/spring-framework/docs/3.2.x/spring-framework-reference/html/index.html" />
		<title level="m">Spring Framework Reference Documentation</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<ptr target="https://www.anylogic.com/" />
		<title level="m">The official site of the AnyLogic company</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<ptr target="https://github.com/vaadin/docs" />
		<title level="m">vaadin/docs: Official documentation for Vaadin and Hilla</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Corrosion under insulation</title>
		<author>
			<persName><forename type="first">N</forename><surname>Wilds</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Energy Trends in Oil and Gas Corrosion Research and Technologies</title>
				<meeting><address><addrLine>Duxford, UK</addrLine></address></meeting>
		<imprint>
			<publisher>Woodhead Publishing</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="409" to="429" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Severity of corrosion under insulation (CUI) to structures and strategies to detect it</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">O</forename><surname>Eltai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Musharavati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Mahdi</surname></persName>
		</author>
		<idno type="DOI">10.1515/corrrev-2018-0102</idno>
		<ptr target="https://doi.org/10.1515/corrrev-2018-0102" />
	</analytic>
	<monogr>
		<title level="j">Corros Rev</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="553" to="564" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<title level="m" type="main">Safety and Security of Cyber-Physical Systems. Engineering dependable Software using Principle-based Development</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J</forename><surname>Furrer</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-658-37182-1</idno>
		<ptr target="https://doi.org/10.1007/978-3-658-37182-1" />
		<imprint>
			<date type="published" when="2022">2022</date>
			<publisher>Springer Vieweg</publisher>
			<biblScope unit="page">537</biblScope>
			<pubPlace>Wiesbaden</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Intelligent analysis of data systems for defects in underground gas pipeline</title>
		<author>
			<persName><forename type="first">V</forename><surname>Yuzevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Skrynkovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Koman</surname></persName>
		</author>
		<idno type="DOI">10.1109/dsmp.2018.8478560</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2018 IEEE Second International Conference on Data Stream Mining &amp; Processing (DSMP)</title>
				<meeting>the 2018 IEEE Second International Conference on Data Stream Mining &amp; Processing (DSMP)<address><addrLine>Lviv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">August 21-25, 2018</date>
			<biblScope unit="page" from="134" to="138" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Safety and security risk assessment in cyber-physical systems</title>
		<author>
			<persName><forename type="first">X</forename><surname>Lyu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ding</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S.-H</forename><surname>Yang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IET Cyber-Physical Systems: Theory &amp; Applications</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="221" to="232" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance</title>
		<author>
			<persName><forename type="first">S</forename><surname>Pattanavichai</surname></persName>
		</author>
		<idno type="DOI">10.24425/ijet.2022.141263</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Electronics and Telecommunications</title>
		<imprint>
			<biblScope unit="volume">68</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="475" to="481" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Enhanced Security in Cloud Computing Using Neural Network and Encryption</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">U</forename><surname>Sana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Javaid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">B</forename><surname>Liaqat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">U</forename><surname>Ali</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Acces</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="145785" to="145799" />
			<date type="published" when="2021-10">2021. October</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Influence of Mechanical Stresses on the Propagation of Corrosion Cracks in Pipeline Walls</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">M</forename><surname>Yuzevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">P</forename><surname>Lozovan</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11003-022-00576-z</idno>
		<ptr target="https://doi.org/10.1007/s11003-022-00576-z.DOI10.1007/s11003-022-00576-z" />
	</analytic>
	<monogr>
		<title level="j">Materials Science</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="539" to="548" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Determination of the Place Depressurization of Underground Pipelines in the Monitoring of Oil and Gas Enterprises</title>
		<author>
			<persName><forename type="first">V</forename><surname>Yuzevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Horbonos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Rogalskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Yemchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yasinskyi</surname></persName>
		</author>
		<idno type="DOI">10.5281/zenodo.3841287</idno>
		<ptr target="http://doi.org/10.5281/zenodo.3841287" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Recent Technology and Engineering (IJRTE)</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="2274" to="2281" />
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
