<?xml version="1.0" encoding="UTF-8"?>
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" dtd-version="1.4" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="issn">2411-3336</journal-id>
      <journal-id journal-id-type="eissn">2541-9404</journal-id>
      <journal-title-group>
        <journal-title xml:lang="ru">Записки Горного института</journal-title>
        <journal-title xml:lang="en">Journal of Mining Institute</journal-title>
      </journal-title-group>
      <publisher>
        <publisher-name xml:lang="ru">Санкт-Петербургский горный университет императрицы Екатерины ΙΙ</publisher-name>
        <publisher-name xml:lang="en">Empress Catherine II Saint Petersburg Mining University</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id custom-type="edn" pub-id-type="custom">TBPPHN</article-id>
      <article-id custom-type="pmi" pub-id-type="custom">pmi-16402</article-id>
      <article-id pub-id-type="uri">https://pmi.spmi.ru/pmi/article/view/16402</article-id>
      <article-categories>
        <subj-group subj-group-type="section-heading" xml:lang="ru">
          <subject>Геотехнология и инженерная геология</subject>
        </subj-group>
        <subj-group subj-group-type="section-heading" xml:lang="en">
          <subject>Geotechnical Engineering and Engineering Geology</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title xml:lang="en">Anomaly detection in wastewater treatment process for cyber resilience risks evaluation</article-title>
        <trans-title-group xml:lang="ru">
          <trans-title>Выявление аномалий в технологическом процессе очистки сточных вод для оценки рисков киберустойчивости</trans-title>
        </trans-title-group>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name name-style="eastern">
            <surname>Novikova</surname>
            <given-names>Evgeniya S.</given-names>
          </name>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Новикова</surname>
              <given-names>Е. С.</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Novikova</surname>
              <given-names>Evgeniya S.</given-names>
            </name>
          </name-alternatives>
          <email>novikova@comsec.spb.ru</email>
          <contrib-id contrib-id-type="orcid">0000-0003-2923-4954</contrib-id>
          <xref ref-type="aff" rid="aff1"/>
        </contrib>
        <aff-alternatives id="aff1">
          <aff>
            <institution xml:lang="ru">Санкт-Петербургский Федеральный исследовательский центр РАН (Санкт-Петербург, Россия)</institution>
          </aff>
          <aff>
            <institution xml:lang="en">Saint Petersburg Federal Research Center of the RAS (Saint Petersburg, Russia)</institution>
          </aff>
        </aff-alternatives>
        <contrib contrib-type="author" corresp="yes">
          <name name-style="eastern">
            <surname>Fedorchenko</surname>
            <given-names>Elena V.</given-names>
          </name>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Федорченко</surname>
              <given-names>Е. В.</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Fedorchenko</surname>
              <given-names>Elena V.</given-names>
            </name>
          </name-alternatives>
          <email>doynikova@comsec.spb.ru</email>
          <contrib-id contrib-id-type="orcid">0000-0001-6707-9153</contrib-id>
          <xref ref-type="aff" rid="aff2"/>
        </contrib>
        <aff-alternatives id="aff2">
          <aff>
            <institution xml:lang="ru">Санкт-Петербургский Федеральный исследовательский центр РАН (Санкт-Петербург, Россия)</institution>
          </aff>
          <aff>
            <institution xml:lang="en">Saint Petersburg Federal Research Center of the RAS (Saint Petersburg, Russia)</institution>
          </aff>
        </aff-alternatives>
        <contrib contrib-type="author">
          <name name-style="eastern">
            <surname>Bukhtiyarov</surname>
            <given-names>Marat A.</given-names>
          </name>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Бухтияров</surname>
              <given-names>М. А.</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Bukhtiyarov</surname>
              <given-names>Marat A.</given-names>
            </name>
          </name-alternatives>
          <email>buhtiarov.marat@gmail.com</email>
          <contrib-id contrib-id-type="orcid">0009-0004-3964-2796</contrib-id>
          <xref ref-type="aff" rid="aff3"/>
        </contrib>
        <aff-alternatives id="aff3">
          <aff>
            <institution xml:lang="ru">OOO «Webim» (Москва, Россия)</institution>
          </aff>
          <aff>
            <institution xml:lang="en">OOO Webim (Moscow, Russia)</institution>
          </aff>
        </aff-alternatives>
        <contrib contrib-type="author">
          <name name-style="eastern">
            <surname>Saenko</surname>
            <given-names>Igor B.</given-names>
          </name>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Саенко</surname>
              <given-names>И. Б.</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Saenko</surname>
              <given-names>Igor B.</given-names>
            </name>
          </name-alternatives>
          <email>ibsaen@comsec.spb.ru</email>
          <contrib-id contrib-id-type="orcid">0000-0002-9051-5272</contrib-id>
          <xref ref-type="aff" rid="aff4"/>
        </contrib>
        <aff-alternatives id="aff4">
          <aff>
            <institution xml:lang="ru">Санкт-Петербургский Федеральный исследовательский центр РАН (Санкт-Петербург, Россия)</institution>
          </aff>
          <aff>
            <institution xml:lang="en">Saint Petersburg Federal Research Center of the RAS (Saint Petersburg, Russia)</institution>
          </aff>
        </aff-alternatives>
      </contrib-group>
      <pub-date pub-type="epub" iso-8601-date="2024-07-04">
        <day>04</day>
        <month>07</month>
        <year>2024</year>
      </pub-date>
      <pub-date date-type="collection">
        <year>2024</year>
      </pub-date>
      <volume>267</volume>
      <fpage>488</fpage>
      <lpage>500</lpage>
      <history>
        <date date-type="received" iso-8601-date="2024-03-07">
          <day>07</day>
          <month>03</month>
          <year>2024</year>
        </date>
        <date date-type="accepted" iso-8601-date="2024-06-14">
          <day>14</day>
          <month>06</month>
          <year>2024</year>
        </date>
        <date date-type="rev-recd" iso-8601-date="2024-07-04">
          <day>04</day>
          <month>07</month>
          <year>2024</year>
        </date>
      </history>
      <permissions>
        <copyright-statement xml:lang="ru">© 2024 Е. С. Новикова, Е. В. Федорченко, М. А. Бухтияров, И. Б. Саенко</copyright-statement>
        <copyright-statement xml:lang="en">© 2024 Evgeniya S. Novikova, Elena V. Fedorchenko, Marat A. Bukhtiyarov, Igor B. Saenko</copyright-statement>
        <copyright-year>2024</copyright-year>
        <copyright-holder xml:lang="ru">Е. С. Новикова, Е. В. Федорченко, М. А. Бухтияров, И. Б. Саенко</copyright-holder>
        <copyright-holder xml:lang="en">Evgeniya S. Novikova, Elena V. Fedorchenko, Marat A. Bukhtiyarov, Igor B. Saenko</copyright-holder>
        <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0" xml:lang="ru">
          <license-p>Эта статья доступна по лицензии Creative Commons Attribution 4.0 International (CC BY 4.0)</license-p>
        </license>
        <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0" xml:lang="en">
          <license-p>This article is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0)</license-p>
        </license>
      </permissions>
      <self-uri xlink:type="simple" xlink:href="https://pmi.spmi.ru/pmi/article/view/16402">https://pmi.spmi.ru/pmi/article/view/16402</self-uri>
      <abstract xml:lang="ru">
        <p>Своевременное выявление и предотвращение нарушений в технологическом процессе сточных вод в результате реализации угроз разной природы является актуальной задачей. Современные системы снабжены большим количеством технологических датчиков. Данные этих датчиков могут использоваться для выявления аномалий в технологическом процессе. Их своевременное выявление, прогнозирование и обработка обеспечит непрерывность и отказоустойчивость технологического процесса. Цель исследования – повышение точности обнаружения таких аномалий. Предлагается методика выявления и последующей оценки рисков киберустойчивости технологического процесса очистки сточных вод, включающая оригинальное формирование обучающих наборов данных и выявление аномалий на основе методов глубокого обучения. Наличие обучающих наборов данных – необходимое условие эффективной работы методики. Отличительная особенность методики выявления аномалий – новый метод обработки данных технологических датчиков, который позволяет использовать вычислительно эффективные аналитические модели с высокой точностью обнаружения аномалий и превосходит результаты ранее опубликованных методов.</p>
      </abstract>
      <abstract xml:lang="en">
        <p>Timely detection and prevention of violations in the technological process of wastewater treatment caused by threats of different nature is a highly relevant research problem. Modern systems are equipped with a large number of technological sensors. Data from these sensors can be used to detect anomalies in the technological process. Their timely detection, prediction and processing ensures the continuity and fault tolerance of the technological process. The aim of the research is to improve the accuracy of detection of such anomalies. We propose a methodology for the identification and subsequent assessment of cyber resilience risks of the wastewater treatment process, which includes the distinctive procedure of training dataset generation and the anomaly detection based on deep learning methods. The availability of training datasets is a necessary condition for the efficient application of the proposed technology. A distinctive feature of the anomaly detection approach is a new method of processing input sensor data, which allows the use of computationally efficient analytical models with high accuracy of anomaly detection, and outperforms the efficiency of previously published methods.</p>
      </abstract>
      <kwd-group xml:lang="ru">
        <title>Ключевые слова</title>
        <kwd>системы водоочистных сооружений</kwd>
        <kwd>промышленные киберфизические системы</kwd>
        <kwd>киберустойчивость</kwd>
        <kwd>риски</kwd>
        <kwd>выявление аномалий</kwd>
        <kwd>обучающие наборы</kwd>
        <kwd>тестовый стенд</kwd>
      </kwd-group>
      <kwd-group xml:lang="en">
        <title>Keywords</title>
        <kwd>water treatment systems</kwd>
        <kwd>industrial cyber-physical systems</kwd>
        <kwd>cyber resilience</kwd>
        <kwd>risks</kwd>
        <kwd>anomaly detection</kwd>
        <kwd>training datasets</kwd>
        <kwd>test bed</kwd>
      </kwd-group>
      <funding-group>
        <funding-statement xml:lang="ru">Работа выполнена при поддержке гранта Российского научного фонда № 23-11-20024 и Санкт-Петербургского научного фонда.</funding-statement>
        <funding-statement xml:lang="en">The research is supported by the grant of Russian Science Foundation N 23-11-20024 and Saint Petersburg Science Foundation.</funding-statement>
      </funding-group>
    </article-meta>
  </front>
  <body/>
  <back>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <mixed-citation xml:lang="ru">Balaram V., Copia L., Saravana Kumar U. et al. Pollution of water resources and application of ICP-MS techniques for monitoring and management – A comprehensive review // Geosystems and Geoenvironment. 2023. Vol. 2. Iss. 4. № 100210. DOI: 10.1016/j.geogeo.2023.100210</mixed-citation>
        <mixed-citation xml:lang="en">Balaram V., Copia L., Saravana Kumar U. et al. Pollution of water resources and application of ICP-MS techniques for monitoring and management – A comprehensive review. Geosystems and Geoenvironment. 2023. Vol. 2. Iss. 4. N 100210. DOI: 10.1016/j.geogeo.2023.100210</mixed-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <mixed-citation xml:lang="ru">Chukaeva M., Petrov D. Assessment and analysis of metal bioaccumulation in freshwater gastropods of urban river habitats, Saint Petersburg (Russia) // Environmental Science and Pollution Research. 2023. Vol. 30. Iss. 3. P. 7162-7172. DOI: 10.1007/s11356-022-21955-8</mixed-citation>
        <mixed-citation xml:lang="en">Chukaeva M., Petrov D. Assessment and analysis of metal bioaccumulation in freshwater gastropods of urban river habitats, Saint Petersburg (Russia). Environmental Science and Pollution Research. 2023. Vol. 30. Iss. 3, p. 7162-7172. DOI: 10.1007/s11356-022-21955-8</mixed-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <mixed-citation xml:lang="ru">Сафиуллин Р.Н., Афанасьев А.С., Резниченко В.В. Концепция развития систем мониторинга и управления интеллектуальных технических комплексов // Записки Горного института. 2019. Т. 237. С. 322-330. DOI: 10.31897/PMI.2019.3.322</mixed-citation>
        <mixed-citation xml:lang="en">Safiullin R.N., Afanasyev A.S., Rezchenko V.V. The Concept of Development of Monitoring Systems and Management of Intelligent Technical Complexes. Journal of Mining Institute. 2019. Vol. 237, р. 322-330. DOI: 10.31897/PMI.2019.3.322</mixed-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <mixed-citation xml:lang="ru">Patokin D., Danilov A., Isakov A. Environmental monitoring of natural waters in the zone of impact of an enterprise producing explosives // IOP Conference Series: Earth and Environmental Science. 2020. Vol. 578. № 012038. DOI: 10.1088/1755-1315/578/1/012038</mixed-citation>
        <mixed-citation xml:lang="en">Patokin D., Danilov A., Isakov A. Environmental monitoring of natural waters in the zone of impact of an enterprise producing explosives. IOP Conference Series: Earth and Environmental Science. 2020. Vol. 578. N 012038. DOI: 10.1088/1755-1315/578/1/012038</mixed-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <mixed-citation xml:lang="ru">Смирнов Ю.Д., Матвеева В.А., Яковлев Н.М., Сахабутдинова Э.Р. Анализ и оценка современных технологий очистки сточных вод на гальваническом производстве // Горный журнал. 2023. № 9. С. 55-60. DOI: 10.17580/gzh.2023.09.08</mixed-citation>
        <mixed-citation xml:lang="en">Smirnov Yu.D., Matveeva V.A., Yakovlev N.M., Sakhabutdinova E.R. Modern wastewater treatment technologies in galvanic production: Analysis and evaluation. Gornyi Zhurnal. 2023. N 9, p. 55-60 (in Russian). DOI: 10.17580/gzh.2023.09.08</mixed-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <mixed-citation xml:lang="ru">Ромашева Н.В., Бабенко М. А., Николайчук Л.А. Устойчивое развитие Арктического региона России: экологические проблемы и пути их решения // Горный информационно-аналитический бюллетень. 2022. № 10-2. С. 78-87 (in English). DOI: 10.25018/0236_1493_2022_102_0_78</mixed-citation>
        <mixed-citation xml:lang="en">Romasheva N.V., Babenko M.A., Nikolaichuk L.A. Sustainable development of the Russian Arctic region: environmental problems and ways to solve them. Mining Informational and Analytical Bulletin. 2022. N 10-2, p. 78-87. DOI: 10.25018/0236_1493_2022_102_0_78</mixed-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <mixed-citation xml:lang="ru">Чукаева М.А., Матвеева В.А., Сверчков И.П. Комплексная переработка высокоуглеродистых золошлаковых отходов // Записки Горного института. 2022. Т. 253. С. 97-104. DOI: 10.31897/PMI.2022.5</mixed-citation>
        <mixed-citation xml:lang="en">Chukaeva M.A., Matveeva V.A., Sverchkov I.P. Complex processing of high-carbon ash and slag waste. Journal of Mining Institute. 2022. Vol. 253, p. 97-104. DOI: 10.31897/PMI.2022.5</mixed-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <mixed-citation xml:lang="ru">Русскевич Е.А. Нарушение правил централизованного управления техническими средствами противодействия угрозам информационной безопасности // Journal of Digital Technologies and Law. 2023. Т. 1. № 3. С. 650-672. DOI: 10.21202/jdtl.2023.28</mixed-citation>
        <mixed-citation xml:lang="en">Russkevich E.A. Violating the Rules of Centralized Management of Technical Means of Counteracting the Threats to Information Security. Journal of Digital Technologies and Law. 2023. Vol. 1. N 3, p. 650-672.  DOI: 10.21202/jdtl.2023.28</mixed-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <mixed-citation xml:lang="ru">Landauer M., Onder S., Skopik F., Wurzenberger M. Deep learning for anomaly detection in log data: A survey // Machine Learning with Applications. 2023. Vol. 12. № 100470. DOI: 10.1016/j.mlwa.2023.100470</mixed-citation>
        <mixed-citation xml:lang="en">Landauer M., Onder S., Skopik F., Wurzenberger M. Deep learning for anomaly detection in log data: A survey. Machine Learning with Applications. 2023. Vol. 12. N 100470. DOI: 10.1016/j.mlwa.2023.100470</mixed-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <mixed-citation xml:lang="ru">Yuan Luo, Ya Xiao, Long Cheng et al. Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities // ACM Computing Surveys. 2022. Vol. 54. Iss. 5. № 106. DOI: 10.1145/3453155</mixed-citation>
        <mixed-citation xml:lang="en">Yuan Luo, Ya Xiao, Long Cheng et al. Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities. ACM Computing Surveys. 2022. Vol. 54. Iss. 5. N 106. DOI: 10.1145/3453155</mixed-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <mixed-citation xml:lang="ru">Haili Sun, Yan Huang, Lansheng Han et al. MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network // Computers &amp; Security. 2024. Vol. 139. № 103570. DOI: 10.1016/j.cose.2023.103570</mixed-citation>
        <mixed-citation xml:lang="en">Haili Sun, Yan Huang, Lansheng Han et al. MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network. Computers &amp; Security. 2024. Vol. 139. N 103570. DOI: 10.1016/j.cose.2023.103570</mixed-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <mixed-citation xml:lang="ru">Feng Xia, Xin Chen, Shuo Yu. et al. Coupled Attention Networks for Multivariate Time Series Anomaly Detection // IEEE Transactions on Emerging Topics in Computing. Vol. 12. Iss. 1. P. 240-253. DOI: 10.1109/TETC.2023.3280577</mixed-citation>
        <mixed-citation xml:lang="en">Feng Xia, Xin Chen, Shuo Yu. et al. Coupled Attention Networks for Multivariate Time Series Anomaly Detection. IEEE Transactions on Emerging Topics in Computing. Vol. 12. Iss. 1, p. 240-253. DOI: 10.1109/TETC.2023.3280577</mixed-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <mixed-citation xml:lang="ru">Zhukovskiy Y., Buldysko A., Revin I. Induction Motor Bearing Fault Diagnosis Based on Singular Value Decomposition of the Stator Current // Energies. 2023. Vol. 16. Iss. 8. № 3303. DOI: 10.3390/en16083303</mixed-citation>
        <mixed-citation xml:lang="en">Zhukovskiy Y., Buldysko A., Revin I. Induction Motor Bearing Fault Diagnosis Based on Singular Value Decomposition of the Stator Current. Energies. 2023. Vol. 16. Iss. 8. N 3303. DOI: 10.3390/en16083303</mixed-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <mixed-citation xml:lang="ru">Meleshko A., Shulepov A., Desnitsky V. et al. Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems // Water. 2022. Vol. 14. Iss. 15. № 2342. DOI: 10.3390/w14152342</mixed-citation>
        <mixed-citation xml:lang="en">Meleshko A., Shulepov A., Desnitsky V. et al. Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems. Water. 2022. Vol. 14. Iss. 15. N 2342. DOI: 10.3390/w14152342</mixed-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <mixed-citation xml:lang="ru">Pliatsios D., Sarigiannidis P., Lagkas T., Sarigiannidis A. A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics // IEEE Communications Surveys &amp; Tutorials. 2020. Vol. 22. Iss. 3. P. 1942-1976. DOI: 10.1109/COMST.2020.2987688</mixed-citation>
        <mixed-citation xml:lang="en">Pliatsios D., Sarigiannidis P., Lagkas T., Sarigiannidis A. A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics. IEEE Communications Surveys &amp; Tutorials. 2020. Vol. 22. Iss. 3, p. 1942-1976. DOI: 10.1109/COMST.2020.2987688</mixed-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <mixed-citation xml:lang="ru">Cherdantseva Y., Burnap P., Blyth A. et al. A review of cyber security risk assessment methods for SCADA systems // Computers &amp; Security. 2016. Vol. 56. P. 1-27. DOI: 10.1016/j.cose.2015.09.009</mixed-citation>
        <mixed-citation xml:lang="en">Cherdantseva Y., Burnap P., Blyth A. et al. A review of cyber security risk assessment methods for SCADA systems. Computers &amp; Security. 2016. Vol. 56. P. 1-27. DOI: 10.1016/j.cose.2015.09.009</mixed-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <mixed-citation xml:lang="ru">Mehmood A., Epiphaniou G., Maple C. et al. A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites // Sensors. 2023. Vol. 23. Iss. 21. № 8720. DOI: 10.3390/s23218720</mixed-citation>
        <mixed-citation xml:lang="en">Mehmood A., Epiphaniou G., Maple C. et al. A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites. Sensors. 2023. Vol. 23. Iss. 21. N 8720. DOI: 10.3390/s23218720</mixed-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <mixed-citation xml:lang="ru">Xirong Ning, Jin Jiang. Design, Analysis and Implementation of a Security Assessment/Enhancement Platform for Cyber-Physical Systems // IEEE Transactions on Industrial Informatics. 2022. Vol. 18. Iss. 2. P. 1154-1164. DOI: 10.1109/TII.2021.3085543</mixed-citation>
        <mixed-citation xml:lang="en">Xirong Ning; Jin Jiang. Design, Analysis and Implementation of a Security Assessment/Enhancement Platform for Cyber-Physical Systems. IEEE Transactions on Industrial Informatics. 2022. Vol. 18. Iss. 2, p. 1154-1164. DOI: 10.1109/TII.2021.3085543</mixed-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <mixed-citation xml:lang="ru">Teixeira A., Kin Cheong Sou, Sandberg H., Johansson K.H. Secure Control Systems: A Quantitative Risk Management Approach // IEEE Control Systems Magazine. 2015. Vol. 35. Iss. 1. P. 24-45. DOI: 10.1109/MCS.2014.2364709</mixed-citation>
        <mixed-citation xml:lang="en">Teixeira A., Kin Cheong Sou, Sandberg H., Johansson K.H. Secure Control Systems: A Quantitative Risk Management Approach. IEEE Control Systems Magazine. 2015. Vol. 35. Iss. 1, p. 24-45. DOI: 10.1109/MCS.2014.2364709</mixed-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <mixed-citation xml:lang="ru">Федорченко Е.В., Новикова Е.С., Котенко И.В. и др. Система измерения защищенности информации и персональных данных для устройств интернета вещей // Вопросы кибербезопасности. 2022. № 5 (51). С. 28-46. DOI: 10.681/2311-3456-2022-5-28-46</mixed-citation>
        <mixed-citation xml:lang="en">Fedorchenko E.V., Novikova E.S., Kotenko I.V. The security and privacy measuring system for the internet of things devices. Voprosy kiberbezopasnosti. 2022. N 5 (51), p. 28-46 (in Russian). DOI: 10.681/2311-3456-2022-5-28-46</mixed-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <mixed-citation xml:lang="ru">Дойникова Е.В., Котенко И.В. Оценивание защищенности и выбор контрмер для управления кибербезопасностью. М.: Российская академия наук, 2021. 184 c.</mixed-citation>
        <mixed-citation xml:lang="en">Doinikova E.V., Kotenko I.V. Security assessment and selection of countermeasures for cybersecurity management. Moscow: Rossiiskaya akademiya nauk, 2021, p. 184 (in Russian).</mixed-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <mixed-citation xml:lang="ru">Jbair M., Ahmad B., Maple C., Harrison R. Threat modelling for industrial cyber physical systems in the era of smart manufacturing // Computers in Industry. 2022. Vol. 137. № 103611. DOI: 10.1016/j.compind.2022.103611</mixed-citation>
        <mixed-citation xml:lang="en">Jbair M., Ahmad B., Maple C., Harrison R. Threat modelling for industrial cyber physical systems in the era of smart manufacturing. Computers in Industry. 2022. Vol. 137. N 103611. DOI: 10.1016/j.compind.2022.103611</mixed-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <mixed-citation xml:lang="ru">Palleti V.R., Adepu S., Mishra V.K., Mathur A. Cascading effects of cyber-attacks on interconnected critical infrastructure // Cybersecurity. 2021. Vol. 4. № 8. DOI: 10.1186/s42400-021-00071-z</mixed-citation>
        <mixed-citation xml:lang="en">Palleti V.R., Adepu S., Mishra V.K., Mathur A. Cascading effects of cyber-attacks on interconnected critical infrastructure. Cybersecurity. 2021. Vol. 4. N 8. DOI: 10.1186/s42400-021-00071-z</mixed-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <mixed-citation xml:lang="ru">Khalil S.M., Bahsi H., Korõtko T. Threat modeling of industrial control systems: A systematic literature review // Computers &amp; Security. 2024. Vol. 136. № 103543. DOI: 10.1016/j.cose.2023.103543</mixed-citation>
        <mixed-citation xml:lang="en">Khalil S.M., Bahsi H., Korõtko T. Threat modeling of industrial control systems: A systematic literature review. Computers &amp; Security. 2024. Vol. 136. N 103543. DOI: 10.1016/j.cose.2023.103543</mixed-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <mixed-citation xml:lang="ru">Kaixing Huang, Chunjie Zhou, Yu-Chu Tian et al. Assessing the Physical Impact of Cyberattacks on Industrial Cyber-Physical Systems // IEEE Transactions on Industrial Electronics. 2018. Vol. 65. Iss. 10. P. 8153-8162. DOI: 10.1109/TIE.2018.2798605</mixed-citation>
        <mixed-citation xml:lang="en">Kaixing Huang, Chunjie Zhou, Yu-Chu Tian et al. Assessing the Physical Impact of Cyberattacks on Industrial Cyber-Physical Systems. IEEE Transactions on Industrial Electronics. 2018. Vol. 65. Iss. 10, p. 8153-8162. DOI: 10.1109/TIE.2018.2798605</mixed-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <mixed-citation xml:lang="ru">Tushkanova O., Levshun D., Branitskiy A. et al. Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation // Algorithms. 2023. Vol. 16. Iss. 2. № 85. DOI: 10.3390/a16020085</mixed-citation>
        <mixed-citation xml:lang="en">Tushkanova O., Levshun D., Branitskiy A. et al. Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation. Algorithms. 2023. Vol. 16. Iss. 2. N 85. DOI: 10.3390/a16020085</mixed-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <mixed-citation xml:lang="ru">Conti M., Donadel D., Turrin F. A Survey on Industrial Control System Testbeds and Datasets for Security Research // IEEE Communications Surveys &amp; Tutorials. 2021. Vol. 23. Iss. 4. P. 2248-2294. DOI: 10.1109/COMST.2021.3094360</mixed-citation>
        <mixed-citation xml:lang="en">Conti M., Donadel D., Turrin F. A Survey on Industrial Control System Testbeds and Datasets for Security Research. IEEE Communications Surveys &amp; Tutorials. 2021. Vol. 23. Iss. 4, p. 2248-2294. DOI: 10.1109/COMST.2021.3094360</mixed-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <mixed-citation xml:lang="ru">Renjie Wu, Keogh E.J. Current Time Series Anomaly Detection Benchmarks are Flawed and are Creating the Illusion of Progress // IEEE Transactions on Knowledge and Data Engineering. 2023. Vol. 35. Iss. 3. P. 2421-2429. DOI: 10.1109/TKDE.2021.3112126</mixed-citation>
        <mixed-citation xml:lang="en">Renjie Wu, Keogh E.J. Current Time Series Anomaly Detection Benchmarks are Flawed and are Creating the Illusion of Progress. IEEE Transactions on Knowledge and Data Engineering. 2023. Vol. 35. Iss. 3, p. 2421-2429. DOI: 10.1109/TKDE.2021.3112126</mixed-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <mixed-citation xml:lang="ru">Котенко И.В., Федорченко Е.В., Новикова Е.С. и др. Методология сбора данных для анализа безопасности промышленных киберфизических систем // Вопросы кибербезопасности. 2023. № 5 (57). С. 69-79. DOI: 10.21681/2311-3456-2023-5-69-79</mixed-citation>
        <mixed-citation xml:lang="en">Kotenko I.V., Fedorchenko E.V., Novikova E.S. et al. Data collection methodology for security analysis of industrial cyber-physical systems. Voprosy kiberbezopasnosti. 2023. N 5 (57), p. 69-79 (in Russian). DOI: 10.21681/2311-3456-2023-5-69-79</mixed-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <mixed-citation xml:lang="ru">Антонова Е.С. Моделирование процесса очистки сточных вод во флотационной установке с эжекционной системой аэрации с диспергатором // Безопасность в техносфере. 2017. Т. 6. № 1. С. 43-50. DOI: 10.12737/article_590199b9952dc2.23575176</mixed-citation>
        <mixed-citation xml:lang="en">Antonova E.S. Modeling of Wastewater Treatment Process in a Flotation Setup with Ejection Aeration System Having a Disperser. Safety in Technosphere. 2017. Vol. 6. N 1, p. 43-50 (in Russian). DOI: 10.12737/article_590199b9952dc2.23575176</mixed-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <mixed-citation xml:lang="ru">Ivanov A., Strizhenok A., Borowski G. Treatment of methanol-containing wastewater at gas condensate production // Journal of Water and Land Development. 2022. Vol. 54. P. 84-93. DOI: 10.24425/jwld.2022.141558</mixed-citation>
        <mixed-citation xml:lang="en">Ivanov A., Strizhenok A., Borowski G. Treatment of methanol-containing wastewater at gas condensate production. Journal of Water and Land Development. 2022. Vol. 54, p. 84-93. DOI: 10.24425/jwld.2022.141558</mixed-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <mixed-citation xml:lang="ru">Bazgir O., Zhang R., Dhruba S.R. et al. Representation of features as images with neighborhood dependencies for compatibility with convolutional neural networks // Nature Communications. 2020. Vol. 11. № 4391. DOI: 10.1038/s41467-020-18197-y</mixed-citation>
        <mixed-citation xml:lang="en">Bazgir O., Zhang R., Dhruba S.R. et al. Representation of features as images with neighborhood dependencies for compatibility with convolutional neural networks. Nature Communications. 2020. Vol. 11. N 4391. DOI: 10.1038/s41467-020-18197-y</mixed-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <mixed-citation xml:lang="ru">Sharma A., Vans E., Shigemizu D. et al. DeepInsight: A methodology to transform a non-image data to an image for convolution neural network architecture // Scientific Reports. 2019. Vol. 9. № 11399. DOI: 10.1038/s41598-019-47765-6</mixed-citation>
        <mixed-citation xml:lang="en">Sharma A., Vans E., Shigemizu D. et al. DeepInsight: A methodology to transform a non-image data to an image for convolution neural network architecture. Scientific Reports. 2019. Vol. 9. N 11399. DOI: 10.1038/s41598-019-47765-6</mixed-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <mixed-citation xml:lang="ru">Zhu Y., Brettin T., Fangfang Xia et al. Converting tabular data into images for deep learning with convolutional neural networks // Scientific Reports. 2021. Vol. 11. № 11325. DOI: 10.1038/s41598-021-90923-y</mixed-citation>
        <mixed-citation xml:lang="en">Zhu Y., Brettin T., Fangfang Xia et al. Converting tabular data into images for deep learning with convolutional neural networks. Scientific Reports. 2021. Vol. 11. N 11325. DOI: 10.1038/s41598-021-90923-y</mixed-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <mixed-citation xml:lang="ru">Jong-Ik Park, Sihoon Seong, JunKyu Lee, Cheol-Ho Hong. Vortex Feature Positioning: Bridging Tabular IIoT Data and Image-Based Deep Learning: ArXiv. 2024. 23 p. (препринт)</mixed-citation>
        <mixed-citation xml:lang="en">Jong-Ik Park, Sihoon Seong, JunKyu Lee, Cheol-Ho Hong. Vortex Feature Positioning: Bridging Tabular IIoT Data and Image-Based Deep Learning: ArXiv. 2024, p. 23 (preprint).</mixed-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <mixed-citation xml:lang="ru">Yuansheng Zhou, Sharpee T.O. Using Global t-SNE to Preserve Intercluster Data Structure // Neural Computation. 2022. Vol. 34. Iss. 8. P. 1637-1651. DOI: 10.1162/neco_a_01504</mixed-citation>
        <mixed-citation xml:lang="en">Yuansheng Zhou, Sharpee T.O. Using Global t-SNE to Preserve Intercluster Data Structure. Neural Computation. 2022. Vol. 34. Iss. 8. P. 1637-1651. DOI: 10.1162/neco_a_01504</mixed-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <mixed-citation xml:lang="ru">Goh J., Adepu S., Junejo K.N., Mathur A. A Dataset to Support Research in the Design of Secure Water Treatment Systems. Critical Information Infrastructures Security. Cham: Springer, 2017. P. 88-99. DOI: 10.1007/978-3-319-71368-7_8</mixed-citation>
        <mixed-citation xml:lang="en">Goh J., Adepu S., Junejo K.N., Mathur A. A Dataset to Support Research in the Design of Secure Water Treatment Systems. Critical Information Infrastructures Security. Cham: Springer, 2017, p. 88-99. DOI: 10.1007/978-3-319-71368-7_8</mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>
