<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Ihor Kliushnikov</style></author><author><style face="normal" font="default" size="100%">Herman Fesenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks </style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">advanced security assurance case</style></keyword><keyword><style  face="normal" font="default" size="100%">AI</style></keyword><keyword><style  face="normal" font="default" size="100%">ASAC</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberattacks</style></keyword><keyword><style  face="normal" font="default" size="100%">failures</style></keyword><keyword><style  face="normal" font="default" size="100%">ML</style></keyword><keyword><style  face="normal" font="default" size="100%">multi-UAV mission planning</style></keyword><keyword><style  face="normal" font="default" size="100%">reliability-based model</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">49</style></volume><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;The article presents the state of the art of utilizing unmanned aerial vehicles (UAVs) to monitor critical infrastructures (CI). First, the authors formulate the key CI monitoring tasks and provide examples of multi-UAV system utilization for their performance. The article further presents specifications for reliability-based multi-UAV mission planning, followed by a discussion of respective models. Then it provides a detailed example of planning the monitoring of a nuclear power plant in a post-accident period. Another example includes an analysis of cyberattacks on Internet of Drones (IoD) monitoring systems, with detailed consideration of IoD monitoring systems in view of possible cyberattacks. The potential of implementing artificial intelligence and machine learning methods in UAVs is also discussed. Finally, the authors propose adapting an advanced security assurance case to provide cybersecurity of the multi-UAV mission.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Yuriy Ponochovnyi</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">online verification</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience control system</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">77-90</style></pages><abstract><style face="normal" font="default" size="100%">The paper contains the results of the development and implementation of a cybernetic approach to the creation of resilient systems. The architecture of a resilient system contains redundant components compared to a traditional feedback control system. This is primarily due to the need to implement additional channels in the control system to respond to changes in requirements, environment, or unspecified faults and failures. The general structure of a resilient system is based on the principle of dividing control channels for functional and non-functional characteristics. This allows to react to changes in the information component of the environment during attacks on the system to ensure its cybersecurity. The case for a space resilient system with online verification is described. Three scenarios of the system behavior to assure resilience are suggested and the first scenario is explored by the use of Markov model. That allows offering options for improving availability function and other indicators of resilient systems.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">77</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Olga Morozova</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Sergii Sokolov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Digital Twin</style></keyword><keyword><style  face="normal" font="default" size="100%">DT coverage</style></keyword><keyword><style  face="normal" font="default" size="100%">Industrial IoT</style></keyword><keyword><style  face="normal" font="default" size="100%">industry 4.0</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet of Things</style></keyword><keyword><style  face="normal" font="default" size="100%">Logistics</style></keyword><keyword><style  face="normal" font="default" size="100%">Manufacturing</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">125-134</style></pages><abstract><style face="normal" font="default" size="100%">This article presents a Digital Twin (DT) for the logistics system of a manufacturing enterprise using industrial IoT. DT data technology allows to find the required knowledge that can be interpreted and used to support the process of decision-making in the management of the enterprise. The authors propose a classification of DTs for manufacturing and a systematic approach to DT application, as well as its use for simulation of real logistics systems.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">125</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sergii Dotsenko</style></author><author><style face="normal" font="default" size="100%">Herman Fesenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Valentin Moiseenko</style></author><author><style face="normal" font="default" size="100%">Liudmyla Yermolenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integration of Security, Functional and Ecology Safety Management Systems: Concept and Industrial Case</style></title><secondary-title><style face="normal" font="default" size="100%">11th IEEE Conference on Dependable Systems, Services and Technologies, DESSERT’2020</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 14-18, 2020</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><pages><style face="normal" font="default" size="100%">470-475</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Herman Fesenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Valentin Moiseenko</style></author><author><style face="normal" font="default" size="100%">Liudmyla Yermolenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integration of Security, Functional and Ecology Safety Management Systems: Concept and Industrial Case</style></title><secondary-title><style face="normal" font="default" size="100%">2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Olga Morozova</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Sergii Sokolov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Toward Digital Twin Application in Manufacturing Using of Artificial Intelligence and Industrial IoT</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE 11th International Conference on Dependable Systems, Services and Technologies, DESSERT’2020 </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 14-18, 2020</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><pages><style face="normal" font="default" size="100%">196-201</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Sergiy Kamenskyi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrated Cyber Safety and Security Management System: Industry 4.0 Issue</style></title><secondary-title><style face="normal" font="default" size="100%">10th IEEE Dependable Systems, Services and Technologies Conference, DES¬SERT 2019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><pub-location><style face="normal" font="default" size="100%">Leeds, United Kingdom </style></pub-location><pages><style face="normal" font="default" size="100%">197-201</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Sergii Kamenskyi</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">information technologies</style></keyword><keyword><style  face="normal" font="default" size="100%">IT security</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge management</style></keyword><keyword><style  face="normal" font="default" size="100%">security standards</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">305-317</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents analysis of existing knowledge management models and justification for introducing an integrated model of knowledge management for both industry and academia. It is proposed to build such a model using well-known standards of IT security – common criteria and methodology for IT security evaluation. The model of knowledge management is elaborated by analysing the content of the relevant elements of standards and establishing the knowledge content that determines the forms of relations between them. The authors propose the application of an architecture of four-factor models towards the formation of knowledge management models in the organization of the information security management system in accordance with the standards of the series ISO/ IEC 27000.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">305</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Sergii Kamenskyi</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrated Security Management System for Enterprises in Industry 4.0</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">control system</style></keyword><keyword><style  face="normal" font="default" size="100%">enterprise management system</style></keyword><keyword><style  face="normal" font="default" size="100%">industry 4.0</style></keyword><keyword><style  face="normal" font="default" size="100%">integrated security management system</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">standards</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">294-304</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper presents results from the analysis of methodologies and standards aiming to meet the requirements to security management of enterprises implementing Industry 4.0 principles. Key standards such as ISO/IEC 7498, 15408, 18045, 20000, 27000 have been analysed to suggest an approach to the development of integrated security and safety management system structure considering threats of intrusion into physical, information and signal spaces. This system, based on the cybernetic principles of control, is part of the enterprise management system. Security subsystems check and control according to individual and general objectives for physical, information and signal spaces and respective requirements-based models. On that basis the paper presents results and recommendations for enhancing and implementing integrated security management systems. </style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">294</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Diversity for security: case assessment for FPGA-based safety-critical systems</style></title><secondary-title><style face="normal" font="default" size="100%">20th International Conference on Circuits, Systems, Communications and Computers (CSCC 2016) </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">21 October 201</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">76</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Artem Boyarchuk</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Jüri Vain</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Serein Project: Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">dissemination</style></keyword><keyword><style  face="normal" font="default" size="100%">European project</style></keyword><keyword><style  face="normal" font="default" size="100%">master studies</style></keyword><keyword><style  face="normal" font="default" size="100%">PhD studies</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">29-48</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents the ongoing EC-funded Tempus project TEMPUS SEREIN (Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains, http://serein.net.ua) executed by consortia of academia and industry partners from Ukraine and EU countries. The state-of-the-art, completed work as well as the next steps of the development of teaching courses of master and doctoral level and in-service training modules on security and resilience for human and industry related domains are described.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">29</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Chris Phillips</style></author><author><style face="normal" font="default" size="100%">Jüri Vain</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Green Computing within the Context of Educational and Research Projects</style></title><secondary-title><style face="normal" font="default" size="100%">Recent Advances in Computer Science, Proceedings of the 19th International Conference on Computers (part of CSCC'15)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">16‐20 July 2015</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.inase.org/library/2015/zakynthos/COMPUTERS.pdf</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Zakynthos Island, Greece</style></pub-location><pages><style face="normal" font="default" size="100%">513-518</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Artem Boyarchuk</style></author><author><style face="normal" font="default" size="100%">Chris Phillips</style></author><author><style face="normal" font="default" size="100%">Jüri Vain</style></author><author><style face="normal" font="default" size="100%">Madli Krispin</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">FPGA-based Critical Computing: TEMPUS and FP7 Projects Issues</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 10th European Workshop on Microelectronics Education</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><pages><style face="normal" font="default" size="100%">74-79</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Eugene Brezhnev</style></author><author><style face="normal" font="default" size="100%">Artem Boyarchuk</style></author><author><style face="normal" font="default" size="100%">Vladimir Golovanevskiy</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Informed Safety Assessment of Industrial FPGA-Based Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Probabilistic Safety Assessment and Management PSAM 12</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2014</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Honolulu, Hawaii</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Myhailo Ahtyamov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Assessment and Green Issues of FPGA-Based Information and Control Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the IEEE Conference Digital Technologies DT2013</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">29-31 May 2013</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Žilina, Slovakia</style></pub-location><pages><style face="normal" font="default" size="100%">85-90</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Eugene Babeshko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Choosing FMECA-Based Techniques and Tools for Safety Analysis of Critical Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">decision-support</style></keyword><keyword><style  face="normal" font="default" size="100%">Effects and Criticality Analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Failure Modes</style></keyword><keyword><style  face="normal" font="default" size="100%">FMECA</style></keyword><keyword><style  face="normal" font="default" size="100%">safety analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">22</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">275-285</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">There is no universally valid approach for deciding on a technique for reliability analysis. This paper presents a methodology for assessing safety and choosing the most appropriate FMECA-based technique, as well as tools supporting the implementation of this technique</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Eugene Babeshko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Choice and Complexation of Techniques and Tools for Assessment of NPP I&amp;C Systems Safety</style></title><secondary-title><style face="normal" font="default" size="100%">ICONE’19</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Eugene Babeshko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multistage Reliability and Safety Analysis of Information and Control Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Radioelectronic and Computer Systems 48</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><pages><style face="normal" font="default" size="100%">283-287</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>