Main Article Content
The rapid development of mobile Internet technologies LTE (Long-Term Evolution) not only predetermined the further development of cyber-physical systems, which are based on the synthesis of technologies of classical computer systems and LTE technologies, as well as integration with Internet-of-Things technologies. As a result, the emergence of sociocyberphysical systems predetermines further development based on this integration. The creation of mesh- and sensor networks also allows the development of smart technologies and systems based on their conglomeration. The development and creation of a quantum computer, on the one hand, will make it possible to make a technical breakthrough in computing resources, use artificial intelligence, and on the other hand, it can lead to “chaos” in ensuring the security of modern technologies and systems. So, based on the algorithms of Shor and Grover quantum cryptography, symmetric cryptosystems based on traditional cryptography algorithms, as well as asymmetric cryptosystems, including systems based on elliptic curve cryptography, can be broken. The paper proposes to use a new approach to building security systems based on the concept of internal and external security contours. At the same time, security contours of continuous business processes are considered. This approach provides an objective assessment of the current state of security of the socio-cyber system as a whole.
Gryshchuk, RV and Danyk, Yu. G. (2016), Fundamentals of cyber security, ZhNAEU, Zhytomyr, 2016, 636 p.
Yevseiev, S., Ryabukha, Yu., Milov, O., Milevskyi, S., Pohasii, S., Ivanchenko, Ye., Ivanchenko, I., Melenti, Ye., Opirskyy, I. and Pasko, I. (2021), “Development of a method for assessing forecast of social impact in regional communities”, Eastern-European Journal of Enterprise Technologies, 6/2 (114), pp. 30–47.
Feng, Xia and Jianhua, Ma (2011), “Building smart communities with cyber-physical systems”, SCI '11: Proceedings of 1st international symposium on From digital footprints to social and community intelligence, September 2011, pp. 1–6, DOI: https://doi.org/10.1145/2030066.2030068.
Guo, B., Yu, Z. and Zhou, X. (2015), “A Data-Centric Framework for Cyber-Physical-Social Systems”, IT Prof., 17, pp. 4–7, availble at: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7332207.
Kuang, L., Yang, L. and Liao, Y. (2015), “An Integration Framework on Cloud for Cyber Physical Social Systems Big Data”, IEEE Trans. Cloud Comput., availble at: https://ieeexplore.ieee.org/document/7364232.
Lin, C.C., Deng, D.J. and Jhong, S.Y. (2017), “A Triangular NodeTrix Visualization Interface for Overlapping Social Community Structures of Cyber-Physical-Social Systems in Smart Factories”, IEEE Trans. Emerg. Top. Comput., DOI: https://dl.acm.org/doi/10.1145/2030066.2030068.
(2017), Cyber–Physical–Social Frameworks for Urban Big Data Systems: A Survey, DOI: http://dx.doi.org/10.3390/app7101017.
Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021), Synergy of building cybersecurity systems, РС ТЕСHNOLOGY СЕNTЕR, Kharkiv, 188 p., DOI: http://doi.org/10.15587/978-617-7319-31-2.
Shmatko, O., Balakireva, S., Vlasov, А., Zagorodna, N., Korol, О., Milov, O., Petrov, O., Pohasii, S., Rzayev, Kh. and Khvostenko V. (2020), “Development of methodological foundations for a classifier of threats to cyberphysical systems design”, Eastern-European Journal of Enterprise Technologies, 3/9 (105), pp. 6–19.
(2021), Report on Post-Quantum Cryptography, available at: http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf.
Parthasarathy S. (2011), “Community discovery in social networks: applications, methods and emerging trends”, Social Network Data Analytics, pp 79–113, DOI: https://doi.org/10.1007/978-1-4419-8462-3_4.
Jimeng, Sun & Jie, Tang (2011), “A survey of models and algorithms for social influence analysis”, Social Network Data Analytics, pp 177–214, DOI: https://doi.org/10.1007/978-1-4419-8462-3_7.
Anagnostopoulos, A., Kumar, R. and Mahdian, M. (2008), “Influence and correlation in social networks” Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD’08), pp. 7–15, DOI: https://doi.org/10.1145/1401890.1401897.
Goyal, A., Bonchi, F. and Lakshmanan L. V. (2010), “Learning influence probabilities in social networks”, Proceedings of the 3st ACM International Conference on Web Search and Data Mining (WSDM’10), pp. 207–217, DOI: https://doi.org/10.1145/1718487.1718518.
Xiang, R., Neville, J. and Rogati, M. (2010), “Modeling relationship strength in online social networks”, Proceeding of the 19th international conference on World Wide Web (WWW’10), pp. 981–990, DOI: https://doi.org/10.1145/1772690.1772790.
Scripps, J., Tan, P.-N. and Esfahanian, A.-H. (2009), “Measuring the effects of preprocessing decisions and network forces in dynamic network analysis”, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD’09), pp. 747–756, DOI: https://doi.org/10.1145/1557019.1557102.
Merz, H., Hansemann, T. and Hübner, C. (2009), Building Automation: Communication systems with EIB/KNX, LON und BACnet / Springer-Verlag Berlin Heidelberg, 293 p.
(2017), KNX Technical Manual 2CKA001473B8668. KNX Technical Manual. Busch-Presence detector KNX, Busch-Watchdog Sky KNX, Busch-Jaeger Elektro GmbH, 198 p.
(2006), Technical documentation on KNX devices, ABB.
(2004), KNX Handbook, Version 1.1 Revision 1. Konnex Association.
(2016), ABB i-bus KNX KNX Security Panel GM/A 8.1 Product Manual, Busch-Watchdog Sky KNX lektro GmbH, 648 p.
Schilder Jü. and Reibel T. (2016), ABB GPG Building Automation Webinar ABB i-bus® KNX Basics and Products, March 3, 2016, Busch-Watchdog Sky KNX Busch-Jaeger Elektro GmbH, 86 p.
(2017), Manual for KNX Planning, Siemens Switzerland Ltd, 100 p.
(2010), Security Technology KNX-Intrusion Alarm System L240 Installation, Commissioning, Operation, Busch-Watchdog Sky KNX, Busch-Jaeger Elektro GmbH, 116 p.
(2021), "Cloud" 10 years old. From a startup in the emerging market to a successful company and new heights, available at: https://tadviser.com.
Yevseiev, S., Melenti, Y., Voitko, O., Hrebeniuk, V., Korchenko, A., Mykus, S., Milov, O., Prokopenko, O., Sievierinov О. & Chopenko, D. (2021), “Development of a concept for building a critical infrastructure facilities security system” ,Eastern-European Journal of Enterprise Technologies, Vol. 3(9(111), pp. 63–83, DOI: https://doi.org/10.15587/1729-4061.2021.233533.