<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Yuriy Ponochovnyi</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">online verification</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience control system</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">77-90</style></pages><abstract><style face="normal" font="default" size="100%">The paper contains the results of the development and implementation of a cybernetic approach to the creation of resilient systems. The architecture of a resilient system contains redundant components compared to a traditional feedback control system. This is primarily due to the need to implement additional channels in the control system to respond to changes in requirements, environment, or unspecified faults and failures. The general structure of a resilient system is based on the principle of dividing control channels for functional and non-functional characteristics. This allows to react to changes in the information component of the environment during attacks on the system to ensure its cybersecurity. The case for a space resilient system with online verification is described. Three scenarios of the system behavior to assure resilience are suggested and the first scenario is explored by the use of Markov model. That allows offering options for improving availability function and other indicators of resilient systems.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">77</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Sergii Kamenskyi</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrated Security Management System for Enterprises in Industry 4.0</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">control system</style></keyword><keyword><style  face="normal" font="default" size="100%">enterprise management system</style></keyword><keyword><style  face="normal" font="default" size="100%">industry 4.0</style></keyword><keyword><style  face="normal" font="default" size="100%">integrated security management system</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">standards</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">294-304</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper presents results from the analysis of methodologies and standards aiming to meet the requirements to security management of enterprises implementing Industry 4.0 principles. Key standards such as ISO/IEC 7498, 15408, 18045, 20000, 27000 have been analysed to suggest an approach to the development of integrated security and safety management system structure considering threats of intrusion into physical, information and signal spaces. This system, based on the cybernetic principles of control, is part of the enterprise management system. Security subsystems check and control according to individual and general objectives for physical, information and signal spaces and respective requirements-based models. On that basis the paper presents results and recommendations for enhancing and implementing integrated security management systems. </style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">294</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Artem Boyarchuk</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Jüri Vain</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Serein Project: Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">dissemination</style></keyword><keyword><style  face="normal" font="default" size="100%">European project</style></keyword><keyword><style  face="normal" font="default" size="100%">master studies</style></keyword><keyword><style  face="normal" font="default" size="100%">PhD studies</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">29-48</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents the ongoing EC-funded Tempus project TEMPUS SEREIN (Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains, http://serein.net.ua) executed by consortia of academia and industry partners from Ukraine and EU countries. The state-of-the-art, completed work as well as the next steps of the development of teaching courses of master and doctoral level and in-service training modules on security and resilience for human and industry related domains are described.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">29</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anatoliy Gorbenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Olga Tarasyuk</style></author><author><style face="normal" font="default" size="100%">Alexander Romanovsky</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Intrusion-Avoidance via System Diversity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">diversity</style></keyword><keyword><style  face="normal" font="default" size="100%">intrusion avoidance.</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">13</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">154-158</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper discusses a generic intrusion-avoidance architecture allowing the system architects to decrease the risk of intrusions. The architecture employs software diversity at various system levels and dynamically reconfigures the deployment environment to avoid intrusions. This solution reduces the so-called system’s days-of-risk which is a period of an increased security risk between the time when a vulnerability is publicly disclosed to the time when a patch is available to fix it. To select the less vulnerable system configuration we propose metrics estimating security risks by accounting a number of not-fixed vulnerabilities and their severity.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>