<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>June</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Modeling Attacker “Danger” Based on Classification and Cyber-Physical System Security⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Umanskiy</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olha Korol</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Kushnerov</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Laptiev</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrey Sharapata</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kharkiv National Automobile and Highway University</institution>
          ,
          <addr-line>Yaroslava Mudroho str. 25 61002, Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University “Kharkiv Polytechnic Institute”</institution>
          ,
          <addr-line>Kyrpychova 2 61002 Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Sumy State University</institution>
          ,
          <addr-line>Kharkivska 116 40007 Sumy</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska Street 64/13 01601 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>0</volume>
      <fpage>9</fpage>
      <lpage>11</lpage>
      <abstract>
        <p>Assessing the threat level to cyber-physical systems (CPS) requires evaluating the capabilities of potential attackers. This thesis presents a model of attacker “danger” grounded in a detailed classification of attackers for industrial control systems (ICS) and CPS. We categorize both internal and external attackers and assign quantitative weight coefficients to their capabilities. A formal model is developed that incorporates attacker competence, resource availability, time to breach, attack likelihood, and motivation. We derive formulas for an attacker's danger level and its weight coefficient, and we provide tables of criteria for expert evaluation. Using the attacker classification, we map each attacker category to the technical levels of impact on ICS/CPS infrastructure. A methodology is proposed to determine an unknown attacker's category based on observed attack features. The results enable security analysts to rank attackers by danger level and to identify critical threats for each attacker category.</p>
      </abstract>
      <kwd-group>
        <kwd>impact levels</kwd>
        <kwd>attacker modeling</kwd>
        <kwd>cyber risk assessment</kwd>
        <kwd>cyber-physical systems</kwd>
        <kwd>threat assessment 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Modern ICS and CPS face a wide range of security threats. The feasibility and impact of each threat
depend heavily on the capabilities of the adversary. It is thus essential to model the attacker’s
capabilities and danger level as part of threat analysis. The “danger” posed by an attacker is a
function of factors such as the attacker’s skills and resources (“competence”), available time,
motivation, and the likelihood of successful exploitation of system vulnerabilities. By formally
characterizing attacker capabilities and mapping them to potential system impacts, we can better
prioritize security measures. This thesis develops an attacker classification and a quantitative danger
model to support cybersecurity risk assessment for ICS/CPS environments.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Attacker Classification</title>
      <p>
        We propose a comprehensive classification of attackers targeting ICS/CPS, including both insider
and outsider categories. The classification defines attacker categories as follows [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]:
      </p>
      <p>Insiders: including ICS</p>
      <sec id="sec-2-1">
        <title>Users (regular</title>
        <p>operators/users
of the</p>
        <p>ICS
or</p>
        <p>CPS), ICS
Management (executives or administrators), ICS Staff (other internal employees), “At-Risk”
Users (users in vulnerable positions or with risky access), Operational Personnel (engineering
•
•
•
•
•
•
•
•
•
•
and control room staff), and Technical Support Personnel (maintenance and support staff).
These are trusted insiders with varying levels of access.</p>
        <p>External Attackers: persons not employed by the ICS operator. These
include Cyberterrorists, State Special Services (nation-state or intelligence
actors), Hackers (skilled individual outsiders), Cybercriminals (organized cyber-crime
groups), Competitors (industrial or corporate espionage agents), Organized
Crime (“criminal” entities in the classification), and Vandals (opportunistic or hobbyist
attackers).</p>
        <p>Each attacker category is associated with certain capability levels. Insiders generally have
legitimate access to the system but limited malicious resources, whereas external groups vary widely
in resources and skills. For example, ICS users or staff may inadvertently or intentionally cause harm
but typically lack advanced cyber skills, whereas cyberterrorists or state-sponsored actors possess
extensive resources and expertise. This classification allows us to define a set of attacker categories
{Hj}, and to map each category to the technical levels of impact on an ICS/CPS. The levels of impact
correspond to layers of the system and network that an attacker can affect:
Н0: Technical channels (physical signal and wiring level)
Н1: Physical layer of the TCP/IP stack
Н2: Data link layer (TCP/IP)
Н3: Network layer (TCP/IP)
Н4: Transport layer (TCP/IP)
Н5: Malicious software (malware) level
Н6: Hardware backdoor (implanted device) level
Н7: Application layer (TCP/IP and software applications)
Н8: Information protection (security system) level</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Attacker "Danger" Modelling</title>
      <p>
        An attacker’s danger level quantifies the risk they pose to a system. We define a formal model for
attacker danger   that incorporates the attacker’s category and capabilities. We express the
attacker’s danger as a function of their ability to carry out threats against system assets over time[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
In particular, the model below considers the attacker’s category i, their capability weights for ICS
and CPS (   and    Р ), the time T available for attack, the probability   of realizing at least one
threat to asset j, and the attacker’s motivation  motiv:
  
= {   ,   
∈ {   } ,    Р ∈ {   Р } ,   ,  motiv,  }
(1)
      </p>
      <p>To instantiate this model, we must assign values to the various factors. We employ an expert
evaluation approach to determine the weight coefficients and probabilities. Table 1 (below)
summarizes the baseline quantitative values for each factor at five qualitative levels of attacker
capability: critical, high, medium, low, and very low. At the critical level (the most dangerous
attacker), all factors are set to 1 (indicating maximum threat likelihood, full motivation, daily attack
frequency, and effectively unlimited resources). At the very low level (minimal attacker capability),
factors are as low as 0.001 (indicating negligible probability or resources). Intermediate levels (high,
medium, low) are assigned scaled values (0.75, 0.5, 0.25) for each factor. These values serve as initial
criteria for weighting an attacker’s danger. For example, a “high”-capability attacker would have</p>
      <p>= 0.75 (a 75% chance to realize a given threat),  motiv = 0.75 (high motivation), and so on. By
using these baseline values, experts can estimate the weight coefficients   
and    Р for each
attacker category. In practice, an attacker category like Cyberterrorist might be rated “critical” on all
factors, whereas an insider staff might be rated “low” or “medium” on technical resources and
motivation (e.g. 0.25–0.5 range).
We next define the attacker danger weight coefficient  
more explicitly. This coefficient
combines the attacker’s resource factors and time factors for both ICS and CPS contexts. We propose
the following formula for the weight coefficient:</p>
      <p>,

  = (  
∪    Р ) ×  
×  
,
(2)
(3)
The coefficient  
These weight coefficients   
where  

=  
weight
coefficients representing the attacker’s effectiveness in the ICS domain and CPS domain respectively.
These factors are assigned values based on attacker category: for instance, 1 for cyberterrorists
(unlimited computing resources), 0.75 for state-sponsored attackers, 0.5$ for cybercriminal groups,
0.25 for ordinary criminals, competitors, or hackers, and 0.001for unsophisticated vandals. Similarly,
the same scaled values for these categories.  
and  
denote the time windows required for a
successful attack on ICS and CPS targets, respectively. We categorize time availability on a scale
where 1 corresponds to attacks feasible within a day, 0.75 within a week, 0.5 within a month, 0.25
within a year, and 0.001 effectively unlimited time (for extremely slow, long-term attacks). Thus,
Equation above accumulates the attacker’s weighted capabilities in both the ICS and CPS realms.</p>
      <p>is higher for attackers with greater resources and who can execute faster
attacks, and it reflects the combined hazard posed to both ICS and CPS components of a system.</p>
      <p>are used in equation 1 to calculate the overall danger level.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Mapping Attacker Categories to Impact Levels.</title>
      <p>Using the attacker classification and danger model, we can construct a mapping between attacker
categories and the levels of impact {Hj}, on the system. Table 2 (below) presents this mapping. Each
row corresponds to an attacker category, and each column Н0 – Н8 corresponds to a level of impact
(defined in the Attacker Classification section). A value of “1” in the table means that attackers of
that category are generally capable of executing attacks at that impact level, whereas “0” means they
typically cannot. This assessment is based on the technical knowledge, access, and resources
associated with each category.</p>
      <p>From Table 2, we observe clear distinctions between attacker types. For instance, ICS insiders
such as regular users, staff, or at-risk users have limited impact—primarily at the application level
Н7 and possibly affecting the information security systems Н8 through misuse of their access
(indicated by “1” in columns Н7 and Н8, and “0” in lower-level columns for those categories).
Management insiders show capability at physical and network-protocol levels (Н0, Н1) due to their
broader access and authority, as well as at higher levels (Н6 – Н8) via directing insider actions (hence
“1” for Н0, Н1, Н6 – Н8 for ICS Management). Operational staff (engineers/operators) can affect almost
all ICS levels (Н0 – Н4 and Н6) but may not launch malware attacks (Н5) or directly manipulate
security systems (Н8) without help. Technical support staff may install unauthorized devices (Н6) or
misuse applications (Н7) but otherwise have little capability (zeros on most other levels).</p>
      <p>External attackers, on the other hand, can often reach deeper into the tack. Cyberterrorists and
state-sponsored actors are assessed as capable of attacks on all levels (1’s across Н0 – Н8) — they have
the expertise and resources to target everything from physical sabotage to advanced cyber intrusion.
Hackers (skilled outsiders) can attack most network and software levels but might not easily breach
dedicated security hardware or procedures (we note a 0 at Н8 for Hackers). Organized cybercriminal
groups, competitors, and organized crime have substantial capabilities (many 1’s), especially in
network and software domains, but might lack the highest-level insider access or physical access in
some cases (reflected by some 0’s, e.g. at Н4 or Н7/ Н8 for those categories). Vandals are very limited,
mainly capable of low-level physical disruption (Н0) or minor malware (Н5) vandalism, but not
advanced attacks (hence 1’s in only a couple of columns for Vandals). This categorical mapping helps
an analyst infer likely attacker types from the nature of observed attacks: for example, an incident
involving sophisticated malware and backdoor devices at multiple levels (Н5, Н6, Н7) would point to
a high-capability external attacker (e.g. state actor or cybercriminal), whereas an attack confined to
misuse of an HMI application (Н7) might point to an insider.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Attacker Category Determination Methodology</title>
      <p>Given an unknown attacker and a set of detected threats, we can determine the most likely attacker
category using the above classification and mapping. We propose a methodology that reduces
attacker identification to an algorithm with the following steps:
3. Construct the Impact Vector: Using the threat tuple and a predefined set of critical threats
(those with highest severity), construct a binary impact vector that indicates which critical
threats have been realized for each asset j. This can be based on an evaluation of the product
of importance coefficients of the attack and attacker (ensuring critical threats are weighted).
4. Identify Maximum Category: Starting from the lowest attacker category, compare the impact
vector to the expected capabilities (Table 2) for each category. The first category whose
capabilities fully explain the observed impact vector (or the highest category reached by the
attack features) is identified as the maximum likely attacker category for this incident. This
is done in increasing order of attacker “danger,” ensuring we pick the smallest category that
can account for all aspects of the attack.</p>
      <p>Using this algorithm, we generate a list of critical threats relevant to the identified attacker
category. For example, if the maximum category determined is Category 6: External Cybercriminal,
we then focus on the critical threats that such attackers are known to pose and ensure those are
mitigated. Furthermore, if we can eliminate certain attacker types (e.g. through insider background
checks or external threat intelligence), we can reduce the maximum attacker category considered
and thereby reduce the number of critical threats to address. This helps prioritize defence measures
against the most probable attackers.</p>
      <p>
        To automate the process of analyzing and categorizing text descriptions of threats, a neural
network-based model was proposed. The basis was taken from the existing cybersecurity classifier
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], which is based on the synergistic threat model and provides extensive functionality for expert
assessment, determination of synergy, hybridity and probability of threat impact. The key goal of
the work was to create a system capable of classifying threats described by the user in arbitrary text
form, according to eight defined categories: criticality level, security status, security services, nature
of targeting, OSI level, social engineering threats, contour and category of the infrastructure object,
returning the corresponding tuple of classes, without the need for prior standardization. It is assumed
that the use of machine learning methods in combination with modern approaches to natural
language processing will allow building an effective tool for assessing cyber threats, which will
increase the practical value of the system for organizations that seek to respond quickly to risks and
form priorities in protective measures. In addition to implementing the classification algorithm, the
process of data preparation is valuable, especially in conditions of limited data quantity, which allows
testing modern data science techniques for this purpose, complementing the existing cybersecurity
classifier [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        The initial data was an analysis table of 220 banking sector threats obtained from the
cybersecurity classifier [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], which contained text descriptions of threats and corresponding
eightcomponent class tuples, as well as coefficients and ratings of security services. Initially, the data were
grouped by threat tuple, so it was necessary to regroup them by description, because the task was to
group them by it. The set did not contain empty or corrupted values, but the threats did not
necessarily contain all classes of each of the components of the tuple. Given the limited volume of
the initial set, 220 unique threats, for each of which an "original" column was added, which is
insufficient for training effective machine learning models capable of generalizing on unknown
examples, were applied using the data augmentation technique [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. This process involves artificially
increasing the training set by creating modified copies of existing data. Paraphrasing and synonymy
techniques were used to increase and diversify the training sample, in particular with the
involvement of models such as “bart-paraphrase”, “paraphrase-MiniLM”, “Rephrase” from the
Hugging Face platform [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The technique of translation through intermediate languages (first into
any language, and then back, sometimes several times or through different languages and
translators), implemented using the “deep_translator” library, turned out to be less effective due to
the specificity of the subject area. Threat descriptions often use professionalisms and abbreviations,
and sometimes are already exhaustive, which made it difficult to obtain natural and meaningful
translation results, since professionalisms often do not have synonyms even in other languages or
are borrowings. In contrast, the paraphrasing technique, which uses synonymy at the level of word
combinations or sentences together with a variation of grammatical forms, gave much better results.
After manual analysis and cleaning of augmented data, removal of duplicates, correction of
descriptions, enclosing descriptions with commas in quotes for correct reading of CSV, the final
dataset consisted of 1078 threat descriptions, where each original threat was represented by 3-5
parallel formulations. Working with tabular data was carried out using the Pandas library.
      </p>
      <p>
        The next step was to develop a classification model. An environment was prepared using Jupyter
and key Python libraries [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6–8</xref>
        ], such as pandas for data processing, sklearn [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] for building machine
learning models, numpy for numerical calculations, matplotlib for visualization, re for working with
regular expressions, and hashlib and functools for optimization through caching. The training and
test data were split using the “original” column to ensure that all 220 unique threats in the test sample
were represented by one of their descriptions, with 17–25% of the data being test, while the
remaining descriptions were used for training, ensuring that all original threats were covered. The
categorical features of the target variables were encoded in a numeric format (from 0 to n-1), and an
uneven distribution of the data across classes was found, which could affect accuracy, as the model
would not be able to learn to assign a threat to a class it had not seen.
      </p>
      <p>For classification, a data processing pipeline was created, which included three main components.</p>
      <p>
        The first component, TextCleaner, was responsible for preprocessing text descriptions:
normalization (conversion to lower case, removal of digits, special characters, and punctuation) and
lemmatization – bringing words to their original dictionary form. For lemmatization of
Ukrainianlanguage texts, the Stanza NLP library [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] developed by Stanford University was used, which uses
neural network approaches for morphological analysis, identification of parts of speech, and
construction of dependencies between words, ensuring accurate lemmatization. To optimize
performance, a two-level caching system for lemmatization results was implemented (on disk in the
lemma_cache.pkl file and in RAM). The second component of the pipeline was the TF-IDF vectorizer
from Scikit-learn [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], which converted texts into numerical vectors, where each document is
represented by a set of numbers reflecting the weight of each word. TF, term frequency, shows how
often a word occurs in a document, and IDF, inverse document frequency, reduces the weight of
common words and strengthens unique ones. The vectorizer also used a list of Ukrainian stop words
to remove terms that did not carry a significant semantic load for classification. The third component
was the MultiOutputClassifier from Scikit-learn [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], which used RandomForestClassifier as the base
algorithm for simultaneous prediction of eight independent classes, chosen due to its resistance to
overfitting and good compatibility with TF-IDF. Model training and hyperparameter optimization
were performed using GridSearchCV from Scikit-learn [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], which uses cross-validation to find the
best combination of parameters to maximize accuracy. The variation of parameters was manually
sorted, and only the best parameters were retained in the final version. The weight of the keywords
“threat”, “danger”, “risk” was also manually changed to reduce their impact on classification, since
they are present in almost every description.
      </p>
      <p>The trained model was evaluated using standard classification metrics such as accuracy,
completeness, and F1-measure, as presented in the classification reports. Analysis of the results
revealed high accuracy on the training data, but also indicated signs of overfitting and the impact of
class imbalance on quality for individual categories. High precision with significantly different
response also indicated overfitting. The uncertainty matrices and learning curves further confirmed
these observations.</p>
      <p>The learning curves showed that the training accuracy is high from the beginning (indicating
insufficient diversity of the training data), while the accuracy on cross-validation is significantly
lower, although it tends to increase, indicating that the model may not have enough data to correctly
classify at the beginning, but the situation is improving. This indicates that the most likely option to
improve the accuracy of the model is to increase and diversify the dataset, in particular by
introducing new expert assessments, since the specificity of the threat description vocabulary limits
the effectiveness of simple synonymy.</p>
      <p>At the final stage, an integrated threat classification system was implemented in the form of the
ThreatClassifier class. This system includes a preliminary stage of analyzing the description entered
by the user for similarity with the threat descriptions already available in the database using the
cosine similarity of vector representations obtained after identical data processing as for the machine
learning model. First, the stored serialized objects are loaded: the trained model, encoding,
dataframes. Then the lemmatizer and TF-IDF vectorizer process the input data. The vector of the
entered description is compared with all the original vectors, and the similarity fraction is compared
with the thresholds for categorization: classified threat, unclassified (requires model processing) or
“not a threat”.</p>
      <p>This approach avoids overburdening the model for known threats and identifies irrelevant
descriptions. For user interaction, a simple console interface was developed to demonstrate the
system: the ThreatClassifier object performs tasks through the predict_threat() function, which
allows for modular implementation.</p>
      <p>In the course of the research, a cyber threat classification system was successfully developed and
implemented, which effectively uses natural language processing methods and machine learning
algorithms. The basis for training was data obtained from an existing threat classifier, which
contained a previously conducted expert assessment of descriptions. The first and essential stage
was thorough data preprocessing, which is a fundamental component of any data science project. A
number of methods were applied to prepare the source data for effective use in the process of training
the model. Faced with the key problem of the limited volume of the initial data set, data augmentation
techniques were investigated and successfully tested, in particular paraphrasing using models from
the Hugging Face platform, which allowed to significantly increase the volume and
representativeness of the training sample. After that, the augmented data underwent a detailed
review and cleaning stage from redundant or irrelevant content, thus ensuring the quality of the
input information for the model.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>We have developed a structured approach to quantify attacker risk (“danger”) by integrating a
detailed attacker classification with a formal danger modelling. By assigning weight coefficients to
attacker capabilities and mapping attacker categories to technical impact levels, security
practitioners can evaluate the threat level more systematically. The attacker classification model
allows the formation of tailored threat sets depending on attacker capability. The formal danger
model (Equations 1-3) provides a quantitative estimate of risk based on measurable criteria
(resources, time, probability, motivation), grounded in expert-defined values (Table 1). The mapping
in Table 2 and the identification algorithm offer a practical method to infer the likely attacker profile
behind observed cyber incidents and to focus on mitigating the most critical threats for that attacker
category. This approach enhances threat analysis for ICS and CPS by linking technical security
events to adversary models, ultimately improving preventive defence by anticipating attacker
behaviour and capabilities.</p>
      <p>In the course of the research, a cyber threat classification system was successfully developed and
implemented, which effectively uses natural language processing methods and machine learning
algorithms. The basis for training was data obtained from an existing threat classifier, which
contained a previously conducted expert assessment of descriptions. The first and essential stage
was thorough data preprocessing, which is a fundamental component of any data science project. A
number of methods were applied to prepare the source data for effective use in the process of training
the model. Faced with the key problem of the limited volume of the initial data set, data augmentation
techniques were investigated and successfully tested, in particular paraphrasing using models from
the Hugging Face platform, which allowed to significantly increase the volume and
representativeness of the training sample. After that, the augmented data underwent a detailed
review and cleaning stage from redundant or irrelevant content, thus ensuring the quality of the
input information for the model.</p>
      <p>Declaration on Generative AI
The authors have not employed any Generative AI tools.</p>
      <sec id="sec-6-1">
        <title>Learning</title>
        <p>[Electronic</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>O.</given-names>
            <surname>Shmatko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Balakireva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vlasov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Zagorodna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Korol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Milov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Petrov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pohasii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Rzayev</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Khvostenko</surname>
          </string-name>
          , “
          <article-title>Development of methodological foundations for designing a classifier of threats to cyberphysical systems,” Eastern-</article-title>
          <source>European Journal of Enterprise Technologies</source>
          , vol.
          <volume>3</volume>
          , no.
          <volume>9</volume>
          (
          <issue>105</issue>
          ), pp.
          <fpage>6</fpage>
          -
          <lpage>19</lpage>
          ,
          <year>2020</year>
          , doi: 10.15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2020</year>
          .
          <volume>205702</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Karpinski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Shmatko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Romashchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Gancarczyk</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Falat</surname>
          </string-name>
          , “
          <article-title>Methodology of the Cyber Security Threats Risk Assessment Based on the Fuzzy-Multiple Approach,”</article-title>
          <source>in Proc. 19th Int. Multidiscip. Sci. GeoConf</source>
          . SGEM, Albena, Bulgaria,
          <year>2019</year>
          , vol.
          <volume>19</volume>
          , issue 2.1, pp.
          <fpage>445</fpage>
          -
          <lpage>452</lpage>
          , doi: 10.5593/sgem2019/2.1/S07.057.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Cybersecurity</given-names>
            <surname>Classifier</surname>
          </string-name>
          [Electronic resource]: https://skl.khpi.edu.ua/threat-analysis
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] What is data augmentation?</article-title>
          [Electronic resource]:https://www.ibm.com/think/topics/dataaugmentation
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Hugging</given-names>
            <surname>Face</surname>
          </string-name>
          [Electronic resource]:https://huggingface.co/
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] Scikit-learn: Machine learn</article-title>
          .org/stable/index.html resource]:https://scikit-
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Stanza</given-names>
            <surname>: A Python Natural Language Processing Toolkit for Many Human Languages</surname>
          </string-name>
          [Electronic resource]:https://arxiv.org/abs/
          <year>2003</year>
          .07082
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Python</given-names>
            <surname>Documentation</surname>
          </string-name>
          [Electronic resource]:https://docs.python.org
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>