<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Application of Assumption Modes and Effects Analysis to XMECA</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the Sixteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 28 – July 2</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Wrocław, Poland</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks </style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">49</style></volume><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;The article presents the state of the art of utilizing unmanned aerial vehicles (UAVs) to monitor critical infrastructures (CI). First, the authors formulate the key CI monitoring tasks and provide examples of multi-UAV system utilization for their performance. The article further presents specifications for reliability-based multi-UAV mission planning, followed by a discussion of respective models. Then it provides a detailed example of planning the monitoring of a nuclear power plant in a post-accident period. Another example includes an analysis of cyberattacks on Internet of Drones (IoD) monitoring systems, with detailed consideration of IoD monitoring systems in view of possible cyberattacks. The potential of implementing artificial intelligence and machine learning methods in UAVs is also discussed. Finally, the authors propose adapting an advanced security assurance case to provide cybersecurity of the multi-UAV mission.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Assumption Modes and Effect Analysis of XMECA: Expert based safety assessment</style></title><secondary-title><style face="normal" font="default" size="100%">2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">77-90</style></pages><abstract><style face="normal" font="default" size="100%">The paper contains the results of the development and implementation of a cybernetic approach to the creation of resilient systems. The architecture of a resilient system contains redundant components compared to a traditional feedback control system. This is primarily due to the need to implement additional channels in the control system to respond to changes in requirements, environment, or unspecified faults and failures. The general structure of a resilient system is based on the principle of dividing control channels for functional and non-functional characteristics. This allows to react to changes in the information component of the environment during attacks on the system to ensure its cybersecurity. The case for a space resilient system with online verification is described. Three scenarios of the system behavior to assure resilience are suggested and the first scenario is explored by the use of Markov model. That allows offering options for improving availability function and other indicators of resilient systems.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">77</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Digital Transformation, Cyber Security and Resilience of Modern Societies</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">125-134</style></pages><abstract><style face="normal" font="default" size="100%">This article presents a Digital Twin (DT) for the logistics system of a manufacturing enterprise using industrial IoT. DT data technology allows to find the required knowledge that can be interpreted and used to support the process of decision-making in the management of the enterprise. The authors propose a classification of DTs for manufacturing and a systematic approach to DT application, as well as its use for simulation of real logistics systems.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">125</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Integration of Security, Functional and Ecology Safety Management Systems: Concept and Industrial Case</style></title><secondary-title><style face="normal" font="default" size="100%">11th IEEE Conference on Dependable Systems, Services and Technologies, DESSERT’2020</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 14-18, 2020</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><pages><style face="normal" font="default" size="100%">470-475</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Integration of Security, Functional and Ecology Safety Management Systems: Concept and Industrial Case</style></title><secondary-title><style face="normal" font="default" size="100%">2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Toward Digital Twin Application in Manufacturing Using of Artificial Intelligence and Industrial IoT</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE 11th International Conference on Dependable Systems, Services and Technologies, DESSERT’2020 </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 14-18, 2020</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><pages><style face="normal" font="default" size="100%">196-201</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Безпека АЕС і велика безпека за часів коронавірусу</style></title><secondary-title><style face="normal" font="default" size="100%">Безпека АЕС і велика безпека за часів коронавірусу</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><volume><style face="normal" font="default" size="100%">3</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">87</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Integrated Cyber Safety and Security Management System: Industry 4.0 Issue</style></title><secondary-title><style face="normal" font="default" size="100%">10th IEEE Dependable Systems, Services and Technologies Conference, DES¬SERT 2019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><pub-location><style face="normal" font="default" size="100%">Leeds, United Kingdom </style></pub-location><pages><style face="normal" font="default" size="100%">197-201</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">305-317</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents analysis of existing knowledge management models and justification for introducing an integrated model of knowledge management for both industry and academia. It is proposed to build such a model using well-known standards of IT security – common criteria and methodology for IT security evaluation. The model of knowledge management is elaborated by analysing the content of the relevant elements of standards and establishing the knowledge content that determines the forms of relations between them. The authors propose the application of an architecture of four-factor models towards the formation of knowledge management models in the organization of the information security management system in accordance with the standards of the series ISO/ IEC 27000.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">305</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Integrated Security Management System for Enterprises in Industry 4.0</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">294-304</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper presents results from the analysis of methodologies and standards aiming to meet the requirements to security management of enterprises implementing Industry 4.0 principles. Key standards such as ISO/IEC 7498, 15408, 18045, 20000, 27000 have been analysed to suggest an approach to the development of integrated security and safety management system structure considering threats of intrusion into physical, information and signal spaces. This system, based on the cybernetic principles of control, is part of the enterprise management system. Security subsystems check and control according to individual and general objectives for physical, information and signal spaces and respective requirements-based models. On that basis the paper presents results and recommendations for enhancing and implementing integrated security management systems. </style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">294</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Internet of Things for Industry and Human Application: Fundamentals and Technologies</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://aliot.eu.org/</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">1</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">PSMECA Analysis of IoT-based Physical Security Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Dependable IoT for Human and Industry: Modeling, Architecting, Implementation</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><publisher><style face="normal" font="default" size="100%">River Publishers</style></publisher><pub-location><style face="normal" font="default" size="100%">Denmark</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">6</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Risk Assessment of Critical Energy Infrastructure Considering Physical and Cyber Assets: Methodology and Models</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">20-21 Sept. 2018</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%"> Lviv, Ukraine </style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%"> Cyber Security Assessment of Component Off-the-Shelf Based NPP I&amp;C System Using IMECA Technique</style></title><secondary-title><style face="normal" font="default" size="100%">25th International Conference on Nuclear Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">July 2–6, 2017</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Shanghai, China</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Methods and Techniques of Security and Resilience SoS Risk Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">Secure and Resilient Computing for Industry and Human Domains: Secure and Resilient Systems, Networks and Infrastructures</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><edition><style face="normal" font="default" size="100%">2</style></edition><publisher><style face="normal" font="default" size="100%">National Aerospace University “N. E. Zhukovsky”</style></publisher><pub-location><style face="normal" font="default" size="100%">Kharkiv</style></pub-location><volume><style face="normal" font="default" size="100%">28</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">System of Systems as an Object of Security Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">Secure and Resilient Computing for Industry and Human Domains: Secure and Resilient Systems, Networks and Infrastructures</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><publisher><style face="normal" font="default" size="100%">National Aerospace University “N. E. Zhukovsky”</style></publisher><pub-location><style face="normal" font="default" size="100%">Kharkiv</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">27</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Diversity for security: case assessment for FPGA-based safety-critical systems</style></title><secondary-title><style face="normal" font="default" size="100%">20th International Conference on Circuits, Systems, Communications and Computers (CSCC 2016) </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">21 October 201</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">76</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Enhanced Education for Cybersecurity and Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">5-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">FMEDA-Based NPP I&amp;C Systems Safety Assessment: Toward to Minimization of Experts’ Decisions Uncertainty</style></title><secondary-title><style face="normal" font="default" size="100%">24th International Conference on Nuclear Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 26–30, 2016</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Charlotte, North Carolina, USA</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Imeca-Based Technique for Security Assessment of Private Communications: Technology and Training</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">99-120</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Nowadays, almost everywhere, there are a huge number of privately owned telephone exchanges that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users in the public telephone network. Such communications cover most vital infrastructures, including hospitals, ministries, police, army, banks, public bodies/authorities, companies, industries and so on. The purpose of this paper is to raise awareness in regards to security and privacy threats present in private communications, helping both users and vendors safeguard their systems.
This article provides an introduction to private branch exchanges (PBXs) and private communications, and a review of relevant threats and vulnerabilities. Finally, one possible approach to assessment of private communications security is presented, along with appropriate taxonomies. Such approach relies on performing gap analysis and is based on the IMECA technique.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">99</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Markov's Modeling of NPP I&amp;C Reliability and Safety: Optimization of Tool-and-Technique Selection</style></title><secondary-title><style face="normal" font="default" size="100%">Second International Symposium on Stochastic Models in Reliability Engineering, Life Science and Operations Management (SMRLO)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">15-18 Feb. 2016 </style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Beer-Sheva, Israel</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Resilience Assurance for Software-Based Space Systems with Online Patching: Two Cases</style></title><secondary-title><style face="normal" font="default" size="100%">Dependability Engineering and Complex Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">470</style></volume><pages><style face="normal" font="default" size="100%">267-278</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Semi-Markov Availability Models for an Infrastructure as a Service Cloud with Multiple Pools</style></title><secondary-title><style face="normal" font="default" size="100%">ICTERI 2016</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 21-24, 2016</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Serein Project: Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">29-48</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents the ongoing EC-funded Tempus project TEMPUS SEREIN (Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains, http://serein.net.ua) executed by consortia of academia and industry partners from Ukraine and EU countries. The state-of-the-art, completed work as well as the next steps of the development of teaching courses of master and doctoral level and in-service training modules on security and resilience for human and industry related domains are described.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">29</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Smart Grid Safety and Security: Educational and Research Activities</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">165-178</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Smart grid safety and security issues are of increasing interest to both researchers and practitioners. Universities invest considerable efforts in changing their curricula, developing new master and bachelor programs to respond to these new challenges. Currently, such courses and programs are not available in Ukraine. This paper presents our practical experience in developing such courses under Tempus projects. These programs might be based on the concept of research cases. The research case is an approach to research that focuses on gaining an in-depth understanding of a particular entity or event at a specific time. It includes the practical task settled by tutor, selection of methods by students, and presentation of results as a training paper. This approach might help to improve the student selfdevelopment, their knowledges and mental capabilities. It might facilitate their possible involvement into research activities focused on solving the problems of smart grid security and safety.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">165</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Green Computing within the Context of Educational and Research Projects</style></title><secondary-title><style face="normal" font="default" size="100%">Recent Advances in Computer Science, Proceedings of the 19th International Conference on Computers (part of CSCC'15)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">16‐20 July 2015</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.inase.org/library/2015/zakynthos/COMPUTERS.pdf</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Zakynthos Island, Greece</style></pub-location><pages><style face="normal" font="default" size="100%">513-518</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Testing-as-a-Service for Mobile Applications: State-of-the-Art Survey</style></title><secondary-title><style face="normal" font="default" size="100%">Dependability Problems of Complex Information Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham</style></pub-location><volume><style face="normal" font="default" size="100%">307</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Analysis of Peculiarities of Innovative Collaboration between Academic Institutions and IT Companies in Areas S2B and B2S</style></title><secondary-title><style face="normal" font="default" size="100%">Technical News − in Ukrainian</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://technicalnews.net.ua/library/2014/15.pdf</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">39-40</style></volume><pages><style face="normal" font="default" size="100%">15-19</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Availability Assessment of Information and Control Systems with Online Software Update and Verification</style></title><secondary-title><style face="normal" font="default" size="100%">Information and Communication Technologies in Education, Research, And Industrial Applications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><volume><style face="normal" font="default" size="100%">469</style></volume><pages><style face="normal" font="default" size="100%">300-324</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">FPGA-based Critical Computing: TEMPUS and FP7 Projects Issues</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 10th European Workshop on Microelectronics Education</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><pages><style face="normal" font="default" size="100%">74-79</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Nuclear Power Plant Instrumentation and Control Systems for Safety and Security</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">IGI Global</style></publisher><pub-location><style face="normal" font="default" size="100%">Hershey, PA</style></pub-location><pages><style face="normal" font="default" size="100%">470</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Security Informed Safety Assessment of Industrial FPGA-Based Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Probabilistic Safety Assessment and Management PSAM 12</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2014</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Honolulu, Hawaii</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cloud Testing for Mobile Software Systems: Concept and Prototyping</style></title><secondary-title><style face="normal" font="default" size="100%">ICSOFT 2013 - 8th International Joint Conference on Software Technologies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Green computing and communications in critical application domains: Challenges and solutions</style></title><secondary-title><style face="normal" font="default" size="100%">The International Conference on Digital Technologies 2013</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">25 July 2013 </style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Zilina, Slovakia </style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Security Assessment and Green Issues of FPGA-Based Information and Control Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the IEEE Conference Digital Technologies DT2013</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">29-31 May 2013</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Žilina, Slovakia</style></pub-location><pages><style face="normal" font="default" size="100%">85-90</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Editorial: Critical Infrastructures Safety and Security. Trends in the Context of Information Technology Development</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">5-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In this Editorial of volume 28 of Information &amp;amp; Security Prof. Kharchenko outlines key trends in the field of Critical Infrastructures Safety and Security,emphasising the role of advanced information technologies.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Formalizing Power Grid Influence to Assess the Safety of Nuclear Power Plants</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">65-78</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">After the Fukushima nuclear accident the problem of safe interaction between a nuclear power plant and the power grid requires urgent attention. The Ukrainian power grid is the backbone for stable development of all dependent infrastructures. Nuclear power plants can be seen as elements interacting with the system for power distribution. There are five nuclear power plants (NPP) in Ukraine. The NPP safety depends on the reliability of its subsystems, components, etc., as well as on the safety levels of other power grid subsystems. There are various interdependencies among NPPs and the power grid, which impact the safety levels of both. The balance of these mutual influences is considered as a basis for the stability of any infrastructure. The change of influences could lead to violation of the balance, that in turn may lead to a change in the subsystem’s state. This paper presents an approach for formalization of different types of influences between dependent infrastructures. This approach supports the analysis of the behaviour of infrastructure subsystems and the prediction of their safety levels, considering the change of states. Two metrics are proposed to evaluate the influences: linguistic and numerical. The influence formalization enhances the understanding of risk proliferation and the assurance of NPP safety.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Gap-and-IMECA-based Assessment of I&amp;C Systems Cyber Security</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Intelligent and Soft Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Berlin Heidelberg</style></pub-location><pages><style face="normal" font="default" size="100%">149-164</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Intrusion-Avoidance via System Diversity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">13</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">154-158</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper discusses a generic intrusion-avoidance architecture allowing the system architects to decrease the risk of intrusions. The architecture employs software diversity at various system levels and dynamically reconfigures the deployment environment to avoid intrusions. This solution reduces the so-called system’s days-of-risk which is a period of an increased security risk between the time when a vulnerability is publicly disclosed to the time when a patch is available to fix it. To select the less vulnerable system configuration we propose metrics estimating security risks by accounting a number of not-fixed vulnerabilities and their severity.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Management of Critical Infrastructures Based on Technical Megastate</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">37-51</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The provision for effective operation of critical infrastructures (CI) is approached by taking into account priorities for their safety and reliability. This paper substantiates practical aspects of introducing CI management based on technical megastate. It presents relevant mathematical models based on the principles of analysis and assessment of infrastructure systems safety.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Multi-Fragmental Availability Models of Critical Infrastructures with Variable Parameters of System Dependability</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">20</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">248-265</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper presents the development of the MFMC-based methodology and technique for modelling and quantitative availability assessment of critical IT-infrastructure consisting of maintained and partially unmanned systems. It takes into consideration a variation of system and component parameters and, in particular, variation of failure rates caused by detection and elimination of design faults.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Study of Orbital Carrier Rocket and Spacecraft Failures: 2000-2009</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">15</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">179-198</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Aerospace industry has become one of the most important and dynamically developed sectors of the world economy in the last decades. It brings in billions of US dollars due to commercialization of space projects, especially by provisioning telecommunications services, Earth observation and navigation, weather monitoring, etc. Space projects belong to so-called mission critical applications, i.e. applications, whose failures cause both material and pecuniary losses (and sometimes, unfortunately, loss of human lives) and also can ruin long-term scientific, military and other important government or commercial programs. Besides, high reliability and safety of rocket-space systems are of an increasing economic importance, since the disasters and space accidents lead not only to missing profits, but also to millions of dollars loss. The purpose of the paper was to analyze the risks of the launch vehicle crashes and spacecraft failures, which occurred during the first decade of the 21st century. In the paper we present orbital carrier rockets and spacecrafts launch statistics from 2000 to 2009. We investigate the causes of launch vehicle crashes and spacecraft failures and also analyze faults in different subsystems resulted in such accidents, focusing mainly on the influence of computer-based control systems, their hardware and software components on reliability and safety of rocket-space systems</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">TEMPUS-SAFEGUARD: National Safety IT-Engineering Network of Centres of Innovative Academia-Industry Handshaking</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">25</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">315-318</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Eugene Babeshko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multistage Reliability and Safety Analysis of Information and Control Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Radioelectronic and Computer Systems 48</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><pages><style face="normal" font="default" size="100%">283-287</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Dependable systems and multi-version computing: aspects of evolution</style></title><secondary-title><style face="normal" font="default" size="100%">Radioelectronic and computer systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://nbuv.gov.ua/UJRN/recs_2009_7_9</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">7</style></volume><pages><style face="normal" font="default" size="100%">46-59</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Extended Dependability Analysis of Information and Control Systems by FME(C)A-technique: Models, Procedures, Application</style></title><secondary-title><style face="normal" font="default" size="100%">Fourth International Conference on Dependability of Computer Systems, 2009, DepCos-RELCOMEX'09</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">30 June - 2 July</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Applying F(I)MEA-technique for SCADA-based Industrial Control Systems Dependability Assessment and Ensuring</style></title><secondary-title><style face="normal" font="default" size="100%">Third International Conference on Dependability of Computer Systems, DepCos-RELCOMEX'08</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">26-28 June 2008</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">FPGA-based NPP Instrumentation and Control Systems: Development and Safety Assessment</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Kirovograd: RPC Radiy</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Chris Phillips</style></author><author><style face="normal" font="default" size="100%">Popov Peter</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">MASTAC: New Curriculum for Master and Doctoral Studies in Critical Software and Computing</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Software Engineering  SEESE Workshop</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><pub-location><style face="normal" font="default" size="100%">Leipzig</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Oleg Odarushchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Modeling Dependable Systems and Networks</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Kharkiv: National Aerospace University</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Dependable Computing Systems in Support of Transformation of the Force Information Infrastructure</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">75-91</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article analyzes the approaches related to dependable computing systems and Force Information Infrastructure creation out of undependable compo­nents (systems). Taxonomies of dependable systems and stages of dependable sys­tems paradigms evolution are discussed. A life-cycle model and principles of de­velopment and assessment of dependable systems by means of multi-version tech­nologies are considered. Some general tasks and methods for providing and man­aging dependability are analyzed. The Models, Techniques and Tools Infrastructure for supporting transformation of the Force Information Infrastructure is proposed. Warfighter Information Network (WIN) development is considered in this article as an example of the principles of using dependable computing systems implementa­tion to support transformation of the Force Information Infrastructure.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author><author><style face="normal" font="default" size="100%">Andriy Volkovoy</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multi-version Information Technologies and Development of Dependable Systems out of Undependable Components</style></title><secondary-title><style face="normal" font="default" size="100%">Dependable Computer Systems DepCoS-RELCOMEX Conference, Szklarska Poreba</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">F(I)MEA-technique of Web Services Analysis and Dependability Ensuring</style></title><secondary-title><style face="normal" font="default" size="100%">Rigorous Development of Complex Fault-Tolerant Systems, Lecture Notes in Computer Science</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><volume><style face="normal" font="default" size="100%">4157</style></volume><pages><style face="normal" font="default" size="100%">153-167</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anatoly Gorbenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Olga Tarasyuk</style></author><author><style face="normal" font="default" size="100%">Alexey Furmanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">F(I)MEA-Technique of Web-services Analysis and Dependability Ensuring</style></title><secondary-title><style face="normal" font="default" size="100%">Rigorous Development of Complex Fault-Tolerant Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anatoly Gorbenko</style></author><author><style face="normal" font="default" size="100%">Peter Popov</style></author><author><style face="normal" font="default" size="100%">Alexander Romanovsky</style></author><author><style face="normal" font="default" size="100%">Artem Boyarchuk</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Development of Dependable Web Services out of Undependable Web Components</style></title><secondary-title><style face="normal" font="default" size="100%">Technical Report CS-TR (Newcastle: School of Computing Science</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Michael Yastrebenetsky</style></author><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Technique and the Experience of Expertise of Software for NPP Instrumentation and Control Systems</style></title><secondary-title><style face="normal" font="default" size="100%">7th International Conference on Probabilistic Safety Assessment and Management</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><pub-location><style face="normal" font="default" size="100%">Berlin</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Boris Konorev</style></author><author><style face="normal" font="default" size="100%">Olga Tarasyuk</style></author><author><style face="normal" font="default" size="100%">Andrey Volkoviy</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Techniques and Tools of Safety-Related Software Requirements Profiling and Assessment</style></title><secondary-title><style face="normal" font="default" size="100%">Advanced Computer Systems and Networks Conference</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><pub-location><style face="normal" font="default" size="100%">Lviv, Ukraine</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Probabilistic Assessment of Survivability and Safety of an Unmanned Control Systems with Multistage Degradation by Use of QD-diagrams</style></title><secondary-title><style face="normal" font="default" size="100%">5th International Conference on Probabilistic Safety Assessment and Management</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><pub-location><style face="normal" font="default" size="100%">Osaka, Japan</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Methods of an Estimation of the Multi-version Safety Systems</style></title><secondary-title><style face="normal" font="default" size="100%">17th International System Safety Conference</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><pub-location><style face="normal" font="default" size="100%">Orlando, FL</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>