<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Ihor Kliushnikov</style></author><author><style face="normal" font="default" size="100%">Herman Fesenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks </style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">advanced security assurance case</style></keyword><keyword><style  face="normal" font="default" size="100%">AI</style></keyword><keyword><style  face="normal" font="default" size="100%">ASAC</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberattacks</style></keyword><keyword><style  face="normal" font="default" size="100%">failures</style></keyword><keyword><style  face="normal" font="default" size="100%">ML</style></keyword><keyword><style  face="normal" font="default" size="100%">multi-UAV mission planning</style></keyword><keyword><style  face="normal" font="default" size="100%">reliability-based model</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">49</style></volume><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;The article presents the state of the art of utilizing unmanned aerial vehicles (UAVs) to monitor critical infrastructures (CI). First, the authors formulate the key CI monitoring tasks and provide examples of multi-UAV system utilization for their performance. The article further presents specifications for reliability-based multi-UAV mission planning, followed by a discussion of respective models. Then it provides a detailed example of planning the monitoring of a nuclear power plant in a post-accident period. Another example includes an analysis of cyberattacks on Internet of Drones (IoD) monitoring systems, with detailed consideration of IoD monitoring systems in view of possible cyberattacks. The potential of implementing artificial intelligence and machine learning methods in UAVs is also discussed. Finally, the authors propose adapting an advanced security assurance case to provide cybersecurity of the multi-UAV mission.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sergii Dotsenko</style></author><author><style face="normal" font="default" size="100%">Herman Fesenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Valentin Moiseenko</style></author><author><style face="normal" font="default" size="100%">Liudmyla Yermolenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integration of Security, Functional and Ecology Safety Management Systems: Concept and Industrial Case</style></title><secondary-title><style face="normal" font="default" size="100%">11th IEEE Conference on Dependable Systems, Services and Technologies, DESSERT’2020</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 14-18, 2020</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><pages><style face="normal" font="default" size="100%">470-475</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Herman Fesenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Valentin Moiseenko</style></author><author><style face="normal" font="default" size="100%">Liudmyla Yermolenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integration of Security, Functional and Ecology Safety Management Systems: Concept and Industrial Case</style></title><secondary-title><style face="normal" font="default" size="100%">2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>