<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oleksii Starov</style></author><author><style face="normal" font="default" size="100%">Sergiy Vilkomir</style></author><author><style face="normal" font="default" size="100%">Anatoliy Gorbenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Testing-as-a-Service for Mobile Applications: State-of-the-Art Survey</style></title><secondary-title><style face="normal" font="default" size="100%">Dependability Problems of Complex Information Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham</style></pub-location><volume><style face="normal" font="default" size="100%">307</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Anatoliy Gorbenko</style></author><author><style face="normal" font="default" size="100%">Vladimir Sklyar</style></author><author><style face="normal" font="default" size="100%">Chris Phillips</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Green computing and communications in critical application domains: Challenges and solutions</style></title><secondary-title><style face="normal" font="default" size="100%">The International Conference on Digital Technologies 2013</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">25 July 2013 </style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Zilina, Slovakia </style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anatoliy Gorbenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Olga Tarasyuk</style></author><author><style face="normal" font="default" size="100%">Alexander Romanovsky</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Intrusion-Avoidance via System Diversity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">diversity</style></keyword><keyword><style  face="normal" font="default" size="100%">intrusion avoidance.</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">13</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">154-158</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper discusses a generic intrusion-avoidance architecture allowing the system architects to decrease the risk of intrusions. The architecture employs software diversity at various system levels and dynamically reconfigures the deployment environment to avoid intrusions. This solution reduces the so-called system’s days-of-risk which is a period of an increased security risk between the time when a vulnerability is publicly disclosed to the time when a patch is available to fix it. To select the less vulnerable system configuration we propose metrics estimating security risks by accounting a number of not-fixed vulnerabilities and their severity.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anatoliy Gorbenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Olga Tarasyuk</style></author><author><style face="normal" font="default" size="100%">Sergiy Zasukha</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Study of Orbital Carrier Rocket and Spacecraft Failures: 2000-2009</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">computer systems reliability</style></keyword><keyword><style  face="normal" font="default" size="100%">Reliability and safety of rocket-space systems</style></keyword><keyword><style  face="normal" font="default" size="100%">risks of orbital carrier rockets and spacecraft failures</style></keyword><keyword><style  face="normal" font="default" size="100%">software faults.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">15</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">179-198</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Aerospace industry has become one of the most important and dynamically developed sectors of the world economy in the last decades. It brings in billions of US dollars due to commercialization of space projects, especially by provisioning telecommunications services, Earth observation and navigation, weather monitoring, etc. Space projects belong to so-called mission critical applications, i.e. applications, whose failures cause both material and pecuniary losses (and sometimes, unfortunately, loss of human lives) and also can ruin long-term scientific, military and other important government or commercial programs. Besides, high reliability and safety of rocket-space systems are of an increasing economic importance, since the disasters and space accidents lead not only to missing profits, but also to millions of dollars loss. The purpose of the paper was to analyze the risks of the launch vehicle crashes and spacecraft failures, which occurred during the first decade of the 21st century. In the paper we present orbital carrier rockets and spacecrafts launch statistics from 2000 to 2009. We investigate the causes of launch vehicle crashes and spacecraft failures and also analyze faults in different subsystems resulted in such accidents, focusing mainly on the influence of computer-based control systems, their hardware and software components on reliability and safety of rocket-space systems</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iraj Elyasi Komari</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Eugene Babeshko</style></author><author><style face="normal" font="default" size="100%">Anatoliy Gorbenko</style></author><author><style face="normal" font="default" size="100%">Alexander Siora</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Extended Dependability Analysis of Information and Control Systems by FME(C)A-technique: Models, Procedures, Application</style></title><secondary-title><style face="normal" font="default" size="100%">Fourth International Conference on Dependability of Computer Systems, 2009, DepCos-RELCOMEX'09</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">30 June - 2 July</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Eugene Babeshko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Anatoliy Gorbenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Applying F(I)MEA-technique for SCADA-based Industrial Control Systems Dependability Assessment and Ensuring</style></title><secondary-title><style face="normal" font="default" size="100%">Third International Conference on Dependability of Computer Systems, DepCos-RELCOMEX'08</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">26-28 June 2008</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anatoliy Gorbenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Olga Tarasyuk</style></author><author><style face="normal" font="default" size="100%">Alexey Furmanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">F(I)MEA-technique of Web Services Analysis and Dependability Ensuring</style></title><secondary-title><style face="normal" font="default" size="100%">Rigorous Development of Complex Fault-Tolerant Systems, Lecture Notes in Computer Science</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><volume><style face="normal" font="default" size="100%">4157</style></volume><pages><style face="normal" font="default" size="100%">153-167</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>