<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Eugene Babeshko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">System of Systems as an Object of Security Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">Secure and Resilient Computing for Industry and Human Domains: Secure and Resilient Systems, Networks and Infrastructures</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><publisher><style face="normal" font="default" size="100%">National Aerospace University “N. E. Zhukovsky”</style></publisher><pub-location><style face="normal" font="default" size="100%">Kharkiv</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">27</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Anatoliy Gorbenko</style></author><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author><author><style face="normal" font="default" size="100%">Chris Phillips</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Green computing and communications in critical application domains: Challenges and solutions</style></title><secondary-title><style face="normal" font="default" size="100%">The International Conference on Digital Technologies 2013</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">25 July 2013 </style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Zilina, Slovakia </style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security of Safety-Critical Infrastructures: A Case Study for Nuclear Facilities</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">complexity</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">information security standards</style></keyword><keyword><style  face="normal" font="default" size="100%">NPP</style></keyword><keyword><style  face="normal" font="default" size="100%">nuclear power plant</style></keyword><keyword><style  face="normal" font="default" size="100%">Stuxnet.</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">8</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">98-107</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Computers have become crucial to the operations of government and business. Critical infrastructure protection policy has evolved since the mid-1990’s. Since 11 September 2001, the critical link between cyberspace and physical space has been increasingly recognized. Presently, critical infrastructure sectors face various cyber threats. In particular, the electrical power infrastructure is the most critical infrastructure upon which other infrastructures depend. Cyber attacks on energy production and distribution systems could endanger public health and safety, damage the environment, and have serious financial implications, such as loss of production, generation, or distribution of public utilities; compromise proprietary information; or bring liability issues.  Government and private sector computer security is affected by various laws, but not all laws reflect newly emerging challenges. At the same, time poor systems management can be costly and disruptive. This paper presents an approach allowing to implement, manage and maintain cyber security program for Instrumentation and Control (I&amp;C) systems of Nuclear Power plants (NPP). It is based on existing standards’ requirements consideration of issues specific to the security of Field Programmable Gates Arrays (FPGA).</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Anton Andrashov</style></author><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author><author><style face="normal" font="default" size="100%">Andriy Kovalenko</style></author><author><style face="normal" font="default" size="100%">Olexandr Siora</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Gap-and-IMECA-based Assessment of I&amp;C Systems Cyber Security</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Intelligent and Soft Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Berlin Heidelberg</style></pub-location><pages><style face="normal" font="default" size="100%">149-164</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">FPGA-based NPP Instrumentation and Control Systems: Development and Safety Assessment</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Kirovograd: RPC Radiy</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author><author><style face="normal" font="default" size="100%">Oleg Odaruschenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Dependable Computing Systems in Support of Transformation of the Force Information Infrastructure</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">3M-Conception</style></keyword><keyword><style  face="normal" font="default" size="100%">Dependable Computing System</style></keyword><keyword><style  face="normal" font="default" size="100%">Force Information Infrastructure</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">75-91</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article analyzes the approaches related to dependable computing systems and Force Information Infrastructure creation out of undependable compo­nents (systems). Taxonomies of dependable systems and stages of dependable sys­tems paradigms evolution are discussed. A life-cycle model and principles of de­velopment and assessment of dependable systems by means of multi-version tech­nologies are considered. Some general tasks and methods for providing and man­aging dependability are analyzed. The Models, Techniques and Tools Infrastructure for supporting transformation of the Force Information Infrastructure is proposed. Warfighter Information Network (WIN) development is considered in this article as an example of the principles of using dependable computing systems implementa­tion to support transformation of the Force Information Infrastructure.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author><author><style face="normal" font="default" size="100%">Andriy Volkovoy</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multi-version Information Technologies and Development of Dependable Systems out of Undependable Components</style></title><secondary-title><style face="normal" font="default" size="100%">Dependable Computer Systems DepCoS-RELCOMEX Conference, Szklarska Poreba</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Michael Yastrebenetsky</style></author><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Technique and the Experience of Expertise of Software for NPP Instrumentation and Control Systems</style></title><secondary-title><style face="normal" font="default" size="100%">7th International Conference on Probabilistic Safety Assessment and Management</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><pub-location><style face="normal" font="default" size="100%">Berlin</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>