How can I help?
How can I help?

Dr Oleg Illiashenko

Senior Lecturer

Dr Oleg Illiashenko is a Senior Lecturer with the School of Built Environment, Engineering and Computing. He is also a Visiting Professor and Cyber security Course Director with the Department of Computer Systems, Networks and Cybersecurity at the National Aerospace University "Kharkiv Aviation Institute" of Ukraine.

Orcid Logo 0000-0002-4672-6400 Elsevier Logo Scopus ID: 55842633400
Dr Oleg Illiashenko staff profile image

About

Dr Oleg Illiashenko is a Senior Lecturer with the School of Built Environment, Engineering and Computing. He is also a Visiting Professor and Cyber security Course Director with the Department of Computer Systems, Networks and Cybersecurity at the National Aerospace University "Kharkiv Aviation Institute" of Ukraine.

I have combined academic and business experience in my career.

I specialise in cybersecurity assessment and assurance, as well as the verification and validation of safety-critical FPGA-based and embedded systems, including technical regulation and licensing for safety-critical industrial automation and control systems (IACS).

Since 2010, at the National Aerospace University “Kharkiv Aviation Institute”, I have conducted research and taught functional safety, cybersecurity co-engineering and analysis, and the dependability and resilience of embedded, cloud, and IoT/IIoT systems. I have also assessed, assured, and standardised critical IACS systems. I have supervised students pursuing BSc, MSc, and PhD degrees. Since 2022, I have been Course Director of the BSc Cybersecurity program (4-year cycle). Since 2011, I have been a PI and a co-PI in projects funded under the Ministry of Education and Science of Ukraine (8). Author of 121 international scientific papers, including 16 monographs, speaker at over 50+ conferences (2011–2025). Actively engaged in the academic and professional communities. Invited reviewer (109 verified peer reviews) for Elsevier, IEEE, Springer, and MDPI journals and International conferences.

Since 2018, I have headed the cybersecurity division and served as an expert in the functional safety division of Technical Committee TC185 "Industrial Automation”, working under the Ukrainian Research and Training Centre of Standardisation, Certification, and Quality. I led the successful implementation of international standards for the security of industrial automation and control systems (IEC 62443-2-1, IEC 62443-4-1) and for the functional safety of electrical/electronic/programmable electronic safety-related systems (IEC 61508-1, IEC 61508-4) in Ukraine.

During 2022-2025, I worked at the National Research Council (CNR) of Italy: at the Institute of Information Science and Technologies “A. Faedo” (ISTI) and the Institute of Informatics and Telematics (IIT), conducting research on functional safety & cybersecurity co-engineering in safety-critical domains (nuclear, railway, automotive), cybersecurity-informed safety analysis of autonomous transport systems considering AI-powered cyberattacks and protection in aviation, space, and maritime domains and managing the Horizon Europe SYNAPSE project.

In 2025, I joined Leeds Beckett University as a senior lecturer in cybersecurity and forensics, teaching modules on incident response and investigations, cybersecurity landscapes, system security, and web and network security. Since 2025, I've been an External Examiner for the BSc (Hons) Computer Science with Cybersecurity programme at Abertay University, Dundee.

With over 10 years of industry experience, I am a seasoned project manager who has led ICT projects across various sectors, including research, hardware and software development, technology-driven transformation in cybersecurity, cloud, embedded systems, telecom, and education. I have successfully guided projects through their entire lifecycle - from inception and grant writing to implementation, financial auditing, and post-project support. My portfolio includes managing EU-funded projects (Horizon Europe, Horizon 2020, FP7, FP6, Erasmus+, Tempus) in the academic sector, as well as a proven track record in managing IT projects within industry (Hitachi group), with budgets exceeding $5 million, encompassing full financial responsibility, client relationships, and high-performing global teams. Experienced in client engagement, pre-sales, solution scoping, and partner collaboration across EMEA, APAC, and CIS markets. Adept at aligning customer business needs with scalable cloud and digital workplace solutions.

 

Academic positions

  • Senior Lecturer in Cyber Security and Digital Forensics
    Leeds Beckett University, School of Built Environment, Engineering and Computing, Leeds, United Kingdom | 11 August 2025 - present

  • External Examiner
    Abertay University, BSc (Hons) Computer Science with Cybersecurity course, Dundee, United Kingdom | 17 October 2025 - present

  • Visiting Professor, BSc Cyber Security Course Director
    National Aerospace University – Kharkiv Aviation Institute, Computer Systems, Networks and Cyber security, Kharkiv, Ukraine | 01 September 2024 - present

  • Associate Professor, BSc Cyber Security Course Director
    National Aerospace University – Kharkiv Aviation Institute, Kharkiv, Ukraine | 01 September 2019 - 31 August 2024

  • Senior Lecturer
    National Aerospace University – Kharkiv Aviation Institute, Computer Systems, Networks and Cybersecurity, Kharkiv, Ukraine | 01 September 2016 - 31 August 2019

  • Postdoctoral Researcher (Cyber Security)
    Institute of Informatics and Telematics, Trust, Security and Privacy Research Unit, Pisa, Italy | 01 March 2024 - 30 November 2025

  • Visiting Researcher (Functional Safety and Cyber Security Co-engineering and AI)
    Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo", Software Engineering & Dependable Computing (SEDC) Laboraroty, Pisa, Italy | 01 October 2022 - 01 October 2023

Non-academic positions

  • IT Project Manager
    GlobalLogic, (Hitachi Group), Kyiv, Pisa, Ukraine, Italy | 01 November 2021 - 31 July 2025

  • Head of the cyber security division and expert in the functional safety division
    Technical Committee TC185 "Industrial Automation" (volunteer), Kyiv, Ukraine | 01 September 2018 - present

  • International Advisory Board member
    IEEE DeSSeRT Conference (Dependable Systems, Services and Technologies), Ukraine | 01 November 2010 - present

Degrees

  • PhD
    National Technical University "Kharkiv Polytechnic Institute", Kharkiv, Ukraine | 01 September 2012 - 25 December 2018

  • MSc
    National Aerospace University – Kharkiv Aviation Institute, Kharkiv, Ukraine | 01 September 2010 - 29 February 2012

  • MSc
    Kharkiv National University of Radio Electronics, Kharkiv, Ukraine | 01 September 2012 - 31 August 2013

Certifications

  • Professional Scrum Product Owner™ I (PSPO I)
    Scrum.org | 01 April 2025 - present
    https://www.credly.com/badges/f4aac2d5-cd5c-4ed4-b943-cc033b2f736b/linked_in_profile

  • Professional Scrum Master™ I (PSM I)
    Scrum.org | 01 March 2025 - present
    https://www.credly.com/badges/ab7b1ad7-0b71-4e09-aebc-8e49fb84bda5/linked_in_profile

  • Professional Scrum Master™ II (PSM II)
    Scrum.org | 01 March 2025 - present
    https://www.credly.com/badges/a509a9f8-f591-4c8f-9df1-6edbfdc7817e/linked_in_profile

  • Certified SAFe® 6 Agilist
    Scaled Agile, Inc. | 01 March 2025 - present
    https://www.credly.com/badges/cfff4604-c07f-4bfb-8258-1705c1173b95/linked_in_profile

Languages

  • English
    Can read, write, speak, understand and peer review

  • Ukrainian
    Can read, write, speak, understand and peer review

  • Russian
    Can read, write, speak, understand and peer review

  • German
    Can read and speak

  • Italian
    Can read

Research interests

  • Cyber threat intelligence / cyber threat prevention;
  • Artificial Intelligence;
  • Hardware security and trust;
  • Functional safety and cybersecurity co-engineering of safety-critical instrumentation and control systems;
  • Assessment, assurance, and standardisation of Industrial Automation and Control Systems;
  • Academia-industry cooperation.
 

Publications (73)

Sort By:

Conference Proceeding (with ISSN)

Prototyping tools for IoT systems based on virtualization techniques

Featured May 2018 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) IEEE
AuthorsVlasov Y, Illiashenko O, Uzun D, Haimanov O

Modern prototyping tools and virtualization techniques are studied. In order to reduce development time and assets cost, there is a great need in implementing of prototyping tools and virtualization techniques in developing of the Internet of Things (IoT) systems. The detailed analysis of existed virtualization tools is provided. Comparative analysis of modern solutions shows that the Kubernetes is the best tool which advantages allow addressing arisen challenges. The features of the joint use of Kubernetes together with different cloud providers as well as the comparison of cloud providers itself is given.

Conference Proceeding (with ISSN)

IoT solutions for health monitoring: Analysis and case study

Featured May 2018 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) IEEE
AuthorsMedvediev I, Illiashenko O, Uzun D, Strielkina A

The paper formulates the requirements for a monitoring patient's health with using of the Internet of Things (IoT) and cloud technologies. The existing solutions of IoT-based heart rate monitoring are analyzed. It is spoken in detail about the architecture of such systems. The paper contains the analysis and grounding for the choice of protocols for communication between devices over the IoT. The case study of the prototype of medical wearable electronic cardiograph is described. It includes elements and cloud technologies which were not used jointly for health monitoring before. The data processing issues regarding the security and privacy requirements of the healthcare industry are addressed.

Chapter

PSMECA Analysis of IoT-based Physical Security Systems

Featured 01 September 2022 Dependable IoT for Human and Industry River Publishers
AuthorsWaleed A-KA, Kharchenko V, Uzun D, Illiashenko O, Solovyov O

This paper presents the results of research of the physical security systems (PSSs) and its assessment using the physical security modes and effect analysis (PSMECA) technique considering the infrastructure facility of a region. The following results have been obtained: structural and functional decomposition of the PSS for the regional infrastructure (RI) has been performed; engineering solutions for the implementation of the standard functions for the subsystems of the research object have been developed; and a set-theoretic model of the failure occurrence in the context of the study of the PSS has been developed. An example of PSMECA application is discussed.

Journal article

Integrated Security Management System for Enterprises in Industry 4.0

Featured 2019 Information & Security: An International Journal43(3):294-304 Procon, Ltd.
AuthorsDotsenko S, Illiashenko O, Kamenskyi S, Kharchenko V
Journal article

Application of the FPGA Technology for the Development of Multi-Version Safety-Critical NPP Instrumentation and Control Systems

Featured 01 January 2020 Nuclear and Radiation Safety2(2(86)):52-61 State Scientific and Technical Center for Nuclear and Radiation Safety
AuthorsPerepelitsyn A, Illiashenko O, Duzhyi V, Kharchenko V

The paper overviews the requirements of international standards on application of diversity in safety-critical NPP instrumentation and control (I&C) systems. The NUREG7007 classification of version redundancy and the method for diversity assessment are described. The paper presents results from the analysis of instruments and design tools for FPGA-based embedded digital devices from leading manufacturers of programmable logics using the Xilinx and Altera (Intel) chips, which are used in NPP I&C systems, as an example. The most effective integrated development environments are analyzed and the results of comparing the functions and capabilities of using the Xilinx and Altera (Intel) tools are described. The analysis of single failures and fault tolerance using diversity in chip designs based on the SRAM technology is presented. The results from assessment of diversity metrics for RadICS platform-based multi-version I&C systems are discussed.

Chapter

Internet of Things for Industry and Human Applications: ALIOT-Based Vertically Integrated Education

Featured 01 September 2022 Dependable IoT for Human and Industry River Publishers
AuthorsBoyarchuk A, Illiashenko O, Kharchenko V, Maevsky D, Phillips C, Plakhteev A, Vystorobska L

The need of new curricula in the Internet of things (IoT) for M.Sc., Ph.D., and engineering levels of education is described. The joint project on curricula development ALIOT, financed in the frame of Erasmus+ program, is discussed. The project ensures adaptation of academic programs in Ukraine and other countries to the needs of the European labor market, thus enhancing the opportunities of academic and labor abundant. The ALIOT covers hot domains of IoT applications such as health systems, intellectual transport systems, ecology and industry 4.0 systems, smart grid, and smart buildings and cities. The description of interdisciplinary multidomain and transnational programs of M.Sc. and Ph.D. levels is introduced with the mechanisms of intensive capacity building measures as well as the establishment of multidomain IoT cluster network in Ukraine is given.

Conference Proceeding (with ISSN)

Criticality Assessment of Critical Information Infrastructure Objects: A Category Based Methodology and Ukrainian Experience

Featured 2020 Communications in Computer and Information Science Springer International Publishing
AuthorsPotii O, Tsyplinskyi Y, Illiashenko O, Kharchenko V

The paper outlines the basic principles and assumptions used to assess the criticality of critical infrastructure object (CIO) and critical information infrastructure objects (CIIO). Methods for assigning critical information infrastructure objects to the criticality levels are described. The sequence of carrying out the criticality assessment of CIOs is provided. The recommendations concerning evolving regulation in the field of critical information infrastructure objects protection are given. According to the results of the research, several drafts of the Ukrainian state-level normative documents were developed such as “Classification of critical information infrastructure objects by severity (criticality)” and “Criteria and procedure for assigning critical information infrastructure objects to one of the significance (criticality)”. The implementation of the developed documents is an important step in the construction of the Ukrainian state system of protection of critical information infrastructure.

Journal article

Safety and Reliability Assessment of NPP Instrumentation and Control Systems Considering Different Communication Architectures

Featured 01 January 2020 Nuclear and Radiation Safety2(2(86)):38-43 State Scientific and Technical Center for Nuclear and Radiation Safety
AuthorsBabeshko E, Illiashenko O, Kharchenko V, Ruchkov E

Safety and reliability assessment of instrumentation and control (I&C) systems used in different safety-critical industries is a responsible and challenging task. Different assessment models recommended by international and national regulatory documents and used by experts worldwide still have disadvantages and limitations. Therefore, studies of assessment model improvements and refinements are essential. This paper proposes that the assessment models be improved by taking into account different architectures of communications both between different systems and within one particular system. In most models, communication lines are considered absolutely reliable, but the analysis performed shows that the communications should be necessarily addressed. Several analytical models are described to assess the reliability of safety-critical systems for nuclear power plants with different communication options.

Conference Proceeding (with ISSN)

Integrated Cyber Safety & Security Management System: Industry 4.0 Issue

Featured June 2019 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT) IEEE
AuthorsKharchenko V, Dotsenko S, Illiashenko O, Kamenskyi S

The aim of the article is to enhance the conventional concepts of enterprise safety and security management by combining this two interrelated features in one philosophical and managerial conception. Overall protection of the enterprise, where critical data assets are stored, processed and transmitted is impossible without uniting security and safety systems properties. It is especially essential nowadays with intensively evolving Industry 4.0 in developing countries like Ukraine and rapidly developing Industry 5.0 in developed countries with digitalized societies. A three-level hierarchical integrated model of the architecture of a functional safety and security management system that meets the requirements of international standards is shown. It includes principles of the control law and cybernetic control.

Chapter

Concepts of Green IT Engineering: Taxonomy, Principles and Implementation

Featured 2017 Studies in Systems, Decision and Control Springer International Publishing
AuthorsKharchenko V, Illiashenko O

Among the challenges faced by modern civilization, are the key challenges associated with the shortage of energy resources, environmental issues and safety. Information technologies are an important factor of energy consumption, safety and green culture. The paper describes concepts and taxonomy of green IT engineering. Main principles of development and implementation, indicators and values of green computing are analyzed. Description of EU project GreenCo is provided.

Conference Proceeding (with ISSN)

Advanced Security Assurance Case Based on ISO/IEC 15408

Featured 2015 Advances in Intelligent Systems and Computing Springer International Publishing
AuthorsPotii O, Illiashenko O, Komin D

Assessment and assurance of conformity with regulation documents assumes significant cost in modern economies. Demonstration of compliance with security standards involves providing evidence that the standards’ security criteria are met in full substantiating appropriate decision. Nevertheless despite its importance such type of activity haven't been addressed adequately by the available solutions and the tool support given to conformity assessment and assurance processes is rather poor. International standards do not contain any formal technique for security evaluation, what makes performing evaluation process complicated and one-sided. In the article the approach to the security assurance evaluation Advanced Security Assurance Case (ASAC) is proposed based on refined definition of existed assurance case structure.

Journal article

TEST SCENARIO SPECIFICATION LANGUAGE FOR MODEL-BASED TESTING

Featured 01 January 2019 International Journal of Computing18(4):408-421 Research Institute for Intelligent Computer Systems
AuthorsHalling E, Vain J, Boyarchuk A, Illiashenko O

In mission critical systems a single failure might cause catastrophic consequences. This sets high expectations to timely detection of design faults and runtime failures. By traditional software testing methods the detection of deeply nested faults that occur sporadically is almost impossible. The discovery of such bugs can be facilitated by generating well-targeted test cases where the test scenario is explicitly specified. On the other hand, the excess of implementation details in manually crafted test scripts makes it hard to understand and to interpret the test results. This paper defines high-level test scenario specification language TDLTP for specifying complex test scenarios that are relevant for model-based testing of mission critical systems. The syntax and semantics of TDLTP operators are defined and the transformation rules that map its declarative expressions to executable Uppaal Timed Automata test models are specified. The scalability of the method is demonstrated on the TUT100 satellite software integration testing case study.

Conference Proceeding (with ISSN)

Combination of Digital Twin and Artificial Intelligence in Manufacturing Using Industrial IoT

Featured May 2020 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT) IEEE
AuthorsKharchenko V, Illiashenko O, Morozova O, Sokolov S

The paper focuses on Digital Twin (DT) in Manufacturing using Artificial Intelligence (AI) and Industrial IoT. According to the concept, the manufacturing includes three main units: equipment, personnel and processes. All data from these units are inherited to manufacture model (DT) and decision support system with the use of AI. DT data technology allows finding the required knowledge that can be interpreted and used to support the process of decision-making in the management of the enterprise. AI applications open up a broad spectrum of opportunities in manufacturing to add value by optimizing processes and generating new business models. The Landscape was described by a formal model to assure the possibility to analyze the state and development of landscape in detail considering DT and other technologies. DT and IIoT implementation for the simulation of real enterprise manufacturing were considered.

Conference Proceeding (with ISSN)

Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment

Featured May 2018 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) IEEE
AuthorsStrielkina A, Illiashenko O, Zhydenko M, Uzun D

The paper deals with exponentially growing technology-Internet of Things (IoT) in the field of healthcare. It is spoken about the networked healthcare and medical architecture. The attention is given to the analysis of the international regulations on medical and healthcare cybersecurity. For building a trustworthy healthcare IoT solution, a developed normative hierarchical model of the international cybersecurity standards is provided. For cybersecurity assessment of such systems the case-oriented technique, which includes Advanced Security Assurance Case (ASAC) and an example on a wireless insulin pump of its application are provided.

Conference Proceeding (with ISSN)

Structure Function Based Methods in Evaluation of Availability of Healthcare system

Featured June 2019 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT) IEEE
AuthorsRusnak P, Sedlacek P, Forgac A, Illiashenko O, Kharchenko V

Reliability analysis is important properties of any system and healthcare system too. The healthcare system has some specifics in reliability analysis. One of them is the heterogeneity, because this system includes components with different background, kind and properties (for example, equipment and human factor). Other specific of healthcare system is great influence of human factor. Typically, the influence of human factor is evaluated by special methods from special part of reliability engineering that is known as Human Reliability Analysis (HRA). But these methods can not be used for evaluation of technical part (components) of healthcare system. In this paper new method for healthcare system evaluation is developed. This method is proposed for the quantitative analysis of healthcare system and, in particular, for Importance Analysis of this system. It is based on the application of mathematical representation that is named Multi-State System (MSS) to indicate some (more than only two) performance levels in investigated system for more details analysis. In this paper the representation of healthcare system in form of Multi-Valued Decision Diagram is used, that typically used for the system of large dimension.

Conference Proceeding (with ISSN)

Integration of Security, Functional and Ecology Safety Management Systems: Concept and Industrial Case

Featured May 2020 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT) IEEE
AuthorsDotsenko S, Fesenko H, Illiashenko O, Kharchenko V, Moiseenko V, Yermolenko L

The purpose of the article is to substantiate the method of integration of the environmental management system in the enterprise management system. In order to meet the requirements of ISO 7498-2-99, the structure of a multilevel integrated enterprise security management system has been developed. The system provides security management for physical, information, signaling and environmental spaces. An additional environmental management layer was introduced in comparison with the security management system proposed in [12]. The integration of environmental management meets the requirements of IEC 62264-1-2014. This allows us to form inter-layers connections and coordinate the operation of individual subsystems at the physical security, information (cyber) security, functional and ecological security layers. The implementation of this approach enhances enterprise security and environment security as a whole.

Conference Proceeding (with ISSN)

Development of Large Numbers Factorization Algorithm

Featured September 2019 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) IEEE
AuthorsIlliashenko O, Pevnev V

The paper analyzes existing factorization algorithms and classifies them. The elaboration of the factorization algorithm which allows working with both small and large numbers is presented. Whereas the replacement of operations of addition and multiplication by the operation of addition, in comparison with the existing algorithms, a large gain of time is achieved. The initiation of operation of inequality solution allows cutting up to N

1/4

of possible candidates for a single calculation step. The evaluation of the time of the algorithm was conducted. It is comparable to the best known.

Journal article

Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application

Featured 2020 Information & Security: An International Journal47(1):77-90 Procon, Ltd.
AuthorsKharchenko V, Dotsenko S, Ponochovnyi Y, Illiashenko O
Journal article

Базова модель нефункційних характеристик для оцінки якості штучного інтелекту

Featured 01 January 2022 RADIOELECTRONIC AND COMPUTER SYSTEMS2022(2):131-144 National Aerospace University - Kharkiv Aviation Institute
AuthorsKharchenko V, Fesenko H, Illiashenko O

The subject of the research is the models of artificial intelligence (AI) quality. The current paper develops an AI quality model based on the definition and ordering of its characteristics. Objectives: to develop the principles and justify the sequence of analysis and development of AI quality models as ordered sets of characteristics; to offer models of AI quality for further use, first, the evaluation of individual characteristics and quality in general; to demonstrate the profiling of AI quality models for systems using artificial intelligence. The following results were obtained. The sequence of construction of AI quality models is offered. Based on the analysis of references, a list of AI characteristics was formed and their definitions were harmonized. The general model of AI quality is presented with a description of the step-by-step procedure for the realization of its hierarchical construction. A basic model of AI with abbreviated sets of characteristics is proposed due to its importance. Examples of profiling of quality models for two systems - monitoring of engineering communications and recognition of road signs are given. Conclusions. The study's main result is the development of a quality model for artificial intelligence, which is based on the analysis and harmonization of definitions and dependencies of quality characteristics specific to AI. The selection of characteristics and the construction of the quality model were carried out in such a way to exclude duplication, ensure the completeness of the presentation, as well as to determine the specific features of each characteristic. It is extremely difficult to create a model that would fully meet such requirements, so the presented options should be supplemented and improved considering the rapid development of technologies and applications of AI. The proposed quality models are open and can be supplemented and detailed according to the specific purpose and scope of AI.

Conference Proceeding (with ISSN)

Security Informed Safety Assessment of NPP I&C Systems: GAP-IMECA Technique

Featured 07 July 2014 2014 22nd International Conference on Nuclear Engineering Volume 3: Next Generation Reactors and Advanced Reactors; Nuclear Safety and Security American Society of Mechanical Engineers
AuthorsKharchenko VS, Illiashenko OA, Kovalenko AA, Sklyar VV, Boyarchuk AV

The application of complex electronic components such as systems-on-chips (including systems-on-programmable-chips using field programmable gate arrays (FPGAs)) in industrial instrumentation and control systems (I&Cs) causes risks for ensuring of safety. Nuclear power plant (NPP) I&C projects on FPGA are complex solutions which include both software and hardware components.

Information security (system’s ability to protect the information and data from unauthorized access and modification) is a subordinate property with respect to safety of many I&Cs, primarily to the NPP reactor trip systems. Such hierarchy may be taken into account by implementation of security informed safety (SIS) approach.

Recent events like Stuxnet or Duqu showed vulnerabilities in industrial embedded IT-Systems. In order to remove or reduce security risks, which could increase overall safety risk, the holistic analytical technique are necessary.

The goal of the paper is to present the technique for of SIS-based assessment of the NPP I&C systems. The proposed SIS-oriented method of NPP I&C systems assessment includes the models and techniques.

To decrease the risk of manual errors, the tool for the SIS-oriented assessment automation is described. The tool is based on joint use of abovementioned models and techniques, is proposed.

The tool allows conducting the joint use of the following analysis techniques: GAP and IMECA.

Conference Proceeding (with ISSN)

Security assessment and green issues of FPGA-based information & control systems

Featured May 2013 2013 International Conference on Digital Technologies (DT) The International Conference on Digital Technologies 2013 IEEE
AuthorsIlliashenko O, Kharchenko V, Ahtyamov M

Main elements of critical FPGA-based information and control systems (I&Cs) security assessment are described. It is proposed to use combination of traditional techniques for reliability and safety analysis: GAP-analysis and IMECA-analysis (modification of FMECA which takes into account intrusion to the system) for analysis of requirements and possible safety and security deficits which could take place during transition between stages of lifecycle of critical FPGA-based I&Cs. The article depicts main steps of assessment, life cycle of safety and security FPGA project development and software tool, which automates the process of assessment. Some challenges regarding to green aspect of safety and security ensuring of energy-critical systems are discussed. © 2013 IEEE.

Journal article

Ensuring cybersecurity of FPGA as a service with the use of penetration testing of components

Featured 01 January 2024 Radioelectronic and Computer Systems2024(2):160-172 National Aerospace University - Kharkiv Aviation Institute
AuthorsTetskyi A, Perepelitsyn A, Illiashenko O, Morozova O, Uzun D

The subject of study in this article is modern penetration testing technologies, in which the test object is the implementation of a service based on a platform using Field Programmable Gate Array (FPGA) resources. The goal of this study is to improve modern methods of penetration testing of services provided by FPGA as a Service (FaaS) to find vulnerabilities for further fixing and increasing the level of services security and trust. Task: to analyze the technological capabilities for the development of FPGA as a Service; to analyze possible threats for FPGA as a Service platform; to analyze the structure of the FPGA as a Service platform and the peculiarities of attacks on it; to analyze options for using the penetration testing standard; to propose the classification of possible use of FPGA as a Service platform for solving of cybersecurity tasks; and to propose the sequence of critical components of ensuring of the cybersecurity of FPGA as a Service platform. The following results were obtained based on the tasks. The analysis of the capabilities of existing chips, FPGA accelerator cards, programming technologies, and the integrated environments of a leading company for creation of FPGA as a Service is performed. A study on the cybersecurity problems of FPGA as a Service platforms is conducted, and a set of components to ensure the cybersecurity of FPGA as a Service Platform is proposed. Modern cybersecurity threats of FPGA as a Service platforms are analyzed. A threat structure for FPGA as a Service is proposed. The possibility of applying a penetration testing standard to FPGA services is considered. Regular audits and penetration testing are crucial elements of a cybersecurity strategy and help maintain customer and user trust in FPGA services. Based on the analysis of the possible use of FPGA as a Service to solve cybersecurity tasks, a classification of five variants considering FPGA as an object and tool is proposed. The sequence of critical components of ensuring of the cybersecurity of FPGA as a Service platform is proposed to correspond to modern known threats. Complex activities, including the software updates, security monitoring, auditing, and penetration testing, based on security standards. Conclusions. The primary contribution and scientific novelty of the obtained results is the research into the possibilities of penetration testing for services, where the test object is a platform with access to FPGA. As in many other areas, ensuring the cybersecurity of FPGA as a Service platform is complex, and ignoring any component can lead to critical consequences. Applying only penetration testing is not enough; therefore, a comprehensive list of cybersecurity measures for FPGA as a Service platforms is provided, underlining the urgency and necessity of their implementation.

Chapter

AI Cybersecurity Assurance for Autonomous Transport Systems: Scenario, Model, and IMECA-Based Analysis

Featured 2022 Communications in Computer and Information Science Springer International Publishing
AuthorsKharchenko V, Illiashenko O, Fesenko H, Babeshko I

The paper investigates problems and ways of utilizing Artificial Intelligence (AI) to ensure the cybersecurity of autonomous transport systems (ATSs) in different domains (aviation, space, maritime). A systematic approach to solving problems of analyzing and assuring ATS cybersecurity in conditions of attacks by use of AI means is suggested. This approach is based on: the development of a set of scenarios describing the operation of ATS under cyberattacks and actor activities considering AI contribution to system protection; scenario-based development and analysis of user stories describing different cyber-attacks, their influence, and ways to protect ATs via AI means/platforms; profiling of AI platform requirements by use of characteristics based AI quality model and risk-based assessment of cyberattacks criticality and efficiency of countermeasures, which can be implemented by actors. A modified IMECA technique for risk-based cyber security assessment and choice of countermeasures applied by different actors to minimize the effect of attacks on the system is suggested.

Conference Proceeding (with ISSN)

Security informed safety assessment of industrial FPGA-based systems

Featured 01 January 2014 Psam 2014 Probabilistic Safety Assessment and Management
AuthorsKharchenko V, Illiashenko O, Brezhnev E, Boyarchuk A, Golovanevskiy V

The strong interconnection and interrelation of safety and security properties of industrial system which are based on programmable logic (field programmable gate arrays, FPGA) is reviewed. Information security, i.e. system's ability to protect the information and data from unauthorized access and modification, is a subordinate property with respect to safety of many instrumentation and control systems (I&Cs), primarily to the NPP reactor trip systems. Such subordination may be taken into account by implementation of security informed safety (SIS) approach. The methodology for safety assessment of FPGA-based systems which are widely used in industrial critical systems is described. It is based on joint using of security analysis techniques (GAP-analysis and intrusion modes, effects and criticality IMECA analysis) and also their reflection on the final safety assessment picture of the system with two channels. This methodology forms so called security informed safety approach. Additional aspects of safety assessment of diverse instrumentation and control FPGA-based systems for safety-critical application are described.

Journal article

Invariant-Based Safety Assessment of FPGA Projects: Conception and Technique

Featured 01 October 2021 Computers10(10):125 MDPI AG
AuthorsKharchenko V, Illiashenko O, Sklyar V

This paper describes a proposed method and technology of safety assessment of projects based on field programmable gate arrays (FPGA). Safety assessment is based on special invariants, e.g., properties which remain unchanged when a specified transformation is applied. A classification and examples of FPGA project invariants are provided. In the paper, two types of invariants are described. The first type of invariants used for such assessment are those which are versatile since they reflect the unchanged properties of FPGA projects, hardware description languages, etc. These invariants can be replenished as experience gained in project implementation accumulates. The second type of invariants is formed based on an analysis of the specifics of a particular FPGA project and reflects the features of the tasks to be solved, the algorithms that are implemented, the hardware FPGA chips used, and the computer-aided design tools, etc. The paper contains a description of the overall conception and particular stages of FPGA projects invariant-based safety assessment. As examples for solving some tasks (using of invariants and defect injections), the paper contains several algorithms written in the VHSIC hardware description language (VHDL). The paper summarizes the results obtained during several years of practical and theoretical research. It can be of practical use for engineers and researchers in the field of quality, reliability, and security of embedded systems, software and information management systems for critical and business applications.

Journal article

Integrated Information Model of an Enterprise and Cybersecurity Management System

Featured 28 July 2022 International Journal of Cyber Warfare and Terrorism12(2):1-21 IGI Global
AuthorsDotsenko S, Illiashenko O, Kharchenko V, Morozova O

The paper analyzes the concepts of "data", "information", "knowledge", "intelligence", "activity", establishes their relationship in the context of integrating information about the enterprise with the contours of security management through the connection of information technologies, operation technologies, ecology technologies (IT, OT, ET). The authors propose an integrated model of information representation of the organization based on a chain of data, information, knowledge and activity / intelligence. The main feature of this model is that it explicitly includes activities that are implemented considering the laws of natural intelligence and forms a corresponding control loop. The security management system is based on identifying and tolerating threats on the stages of processing the data, information, knowledge and intelligence/activities and IT, OT and ET levels. Two industrial cases related to dialog enterprise management system and post-accident monitoring system are discussed.

Conference Proceeding (with ISSN)

Emerging curriculum for industry and human applications in Internet of Things

Featured September 2017 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) IEEE
AuthorsKharchenko V, Illiashenko O, Boyarchuk A, Sklyar V, Phillips C

The need of new curricula in the Internet of things (IoT) for MSc, PhD and engineering levels of education is described. The joint project on curricula development ALIOT, financed in the frame of Erasmus+ program, is discussed. The project ensures adaptation of academic programs in Ukraine and other countries to the needs of the labor market in the EU, thus influencing on the expansion of the opportunities for economic and labor diversity. The ALIOT covers hot domains of IoT applications such as health systems, intellectual transport systems, ecology and industry 4.0 systems, smart grid, smart buildings and city. The description of interdisciplinary multi-domain and transnational program of MSc and PhD levels is introduced with the mechanisms of intensive capacity building measures as well as the establishment of multi-domain IoT cluster network (MDICN) in Ukraine is given.

Conference Proceeding (with ISSN)

FPGA-based critical computing: TEMPUS and FP7 projects issues

Featured May 2014 2014 10th European Workshop on Microelectronics Education (EWME) 10th European Workshop on Microelectronics Education (EWME) IEEE
AuthorsKharchenko V, Illiashenko O, Boyarchuk A, Phillips C, Vain J, Krispin M

The paper analyzes the experience of cooperation between universities and industrial partners from Ukraine and EU countries in the development and implementation of educational and research projects in frameworks of TEMPUS and FP7 programs in the area of safety and mission critical Field Programmable Gate Arrays (FPGA)-based systems. Outcomes of the projects are a set of MSc-, PhD- and training courses and modules related to FPGA-based systems and their application in critical domains, tools for support of university and IT-industry interaction. The structure and brief content of some courses are described. © 2014 IEEE.

Journal article

UAV Fleet as a Dependable Service for Smart Cities: Model-Based Assessment and Application

Featured 01 September 2022 Smart Cities5(3):1151-1178 MDPI AG
AuthorsKharchenko V, Kliushnikov I, Rucinski A, Fesenko H, Illiashenko O

The paper suggests a model-based approach to assessment and choice of parameters of unmanned aerial vehicle (UAV) fleets applied as one of the main services for Smart Cities and recommendations to assure their dependability. The principles of building and modeling a UAV Fleet as a Dependable Service (UAVFaaDS) for Smart Cities are formulated. Dependability issues for UAVFaaDS including a taxonomy of UAVF failures caused by equipment faults and attacks on assets were specified. The main results cover methodology, classification of UAVFaaDS models as models of queuing systems, and a set of queueing theory-based models for assessment of UAVFaaDS performance, and availability allowing for analysis and choice of fleet parameters. The efficiency of UAVFaaDS is assessed by the probability of successful delivery of services. The proposed modeling base and algorithms provide a choice of appropriate models for analysis and synthesis of UAVFaaDS, grounding of parameters of UAV fleets considering operation modes, and maintenance policy. The application of the developed models and algorithms during the synthesis of UAVFaaDS allows choosing the appropriate parameters of the fleet and ensuring the dependability of services, as well as service of orders with a probability of 0.9–0.99 depending on the requirements. Two cases of UAVFaaDS application for delivery of medicines in normal and emergence modes, models’ development, and recommendations for their utilization are discussed.

Journal article

Deployment of a UAV swarm-based LiFi network in the obstacle-ridden environment: algorithms of finding the path for UAV placement

Featured 01 January 2024 Radioelectronic and Computer Systems2024(1):176-195 National Aerospace University - Kharkiv Aviation Institute
AuthorsLeichenko K, Fesenko H, Kharchenko V, Illiashenko O

The subject of this study is unmanned aerial vehicle (UAV)-based wireless networks in an obstacle-ridden environment. The aim of this study is to develop methods and software to ensure reliable LiFi communication using swarm UAVs in an obstacle-ridden environment. The objectives are as follows: 1) to describe the problem of providing a reliable UAV swarm-based LiFi network, requirements for the composition and use of UAVs, and assumptions; 2) to develop the methodology for solving research tasks; 3) to develop the method and algorithms for solving the problem, considering the requirements, assumptions, and practical limitations; 4) to explore the algorithms by developing software for modeling and searching for rational UAV placement to ensure the required UAV-based LiFi network characteristics; 5) to provide experiments and illustrative examples of the developed tool’s application. The following results were obtained. 1) The requirements for the composition and use of UAVs for creating LiFi networks, as well as assumptions and limitations for the methodology development and research task solving. 2) An obstacle avoidance method using the left and right angles algorithm. 3) A method for obstacle avoidance using the controlled waterfall algorithm. 4) A software tool for modeling and searching for rational UAV placement to ensure the required LiFi network characteristics. The tool allows route construction under obstacles in 2D space and a comparison of the developed algorithms for various variants of obstacle placement. Conclusions. The main contribution of this research is a set of methods, algorithms, and software tools for providing communications between two points using LiFi technologies and a swarm of UAVs supporting these communications as transmitters in conditions of mechanical obstacles.

Journal article

Quality Models for Artificial Intelligence Systems: Characteristic-Based Approach, Development and Application

Featured 01 July 2022 Sensors22(13):4865 MDPI AG
AuthorsKharchenko V, Fesenko H, Illiashenko O

The factors complicating the specification of requirements for artificial intelligence systems (AIS) and their verification for the AIS creation and modernization are analyzed. The harmonization of definitions and building of a hierarchy of AIS characteristics for regulation of the development of techniques and tools for standardization, as well as evaluation and provision of requirements during the creation and implementation of AIS, is extremely important. The study aims to develop and demonstrate the use of quality models for artificial intelligence (AI), AI platform (AIP), and AIS based on the definition and ordering of characteristics. The principles of AI quality model development and its sequence are substantiated. Approaches to formulating definitions of AIS characteristics, methods of representation of dependencies, and hierarchies of characteristics are given. The definitions and harmonization options of hierarchical relations between 46 characteristics of AI and AIP are suggested. The quality models of AI, AIP, and AIS presented in analytical, tabular, and graph forms, are described. The so-called basic models with reduced sets of the most important characteristics are presented. Examples of AIS quality models for UAV video navigation systems and decision support systems for diagnosing diseases are described.

Journal article

UAV Fleet Based Accident Monitoring Systems with Automatic Battery Replacement Systems: Algorithms for Justifying Composition and Use Planning

Featured 31 August 2021 International Journal of Safety and Security Engineering11(4):319-328 International Information and Engineering Technology Association
AuthorsKliushnikov I, Fesenko H, Kharchenko V, Illiashenko O, Morozova O

The existing approaches suggest that justifying robotic monitoring systems composition and use planning are carried out through a set of predefined missions. The paper proposes the algorithm of justifying composition and utilization of monitoring systems for critical infrastructure objects based on the theory of transport systems considering possible types of the monitoring missions. The considered monitoring system comprises a fleet of unmanned aerial vehicles (UAV fleet) and automatic battery replacement systems. The algorithm provides a procedure for defining the monitoring system composition and using the UAV fleet and the automatic battery replacement systems taking into account the requirements for the number of ground objects from which data needs collecting, range, transmission frequency, volume of the transmitted data, and operation time. Methods of research are the following: Graph theory, theory of transportation system (methods for solving the traveling salesman problem and multiple traveling salesman problem); mathematical optimization models (evolutionary algorithms), job shop scheduling. The algorithm allows finding an optimal or near optimal compromise solving for composition and utilization of monitoring system for different cases; reducing the time of justifying the monitoring system composition and takes into account the various requirements such as transmission frequency, volume of the transmitted data, and continuous operation time; planning using UAV and automated battery replacement aerial stations (ABRAS) as the parts of transportation system.

Journal article

Concept of Using Eye Tracking Technology to Assess and Ensure Cybersecurity, Functional Safety and Usability

Featured 31 August 2021 International Journal of Safety and Security Engineering11(4):361-367 International Information and Engineering Technology Association
AuthorsGordieiev O, Kharchenko V, Illiashenko O, Morozova O, Gasanov M

Eye tracking technology is based on tracking the trajectory of human eye movement. As a rule, it is implemented in the form of an additional device attached under the monitor or in the form of glasses. On the basis of a mathematical model, the focus of a person's attention is calculated and, accordingly, the user's visual route is built. Eye tracking technology is used to solve various problems, e.g. for marketing research, assessing the quality of user interfaces, developing simulators for operators, etc. The article discusses the concept of using eye tracking technology to assess and ensure cyber security, functional safety and usability. The possibility of using eye tracking technology (ETT) to solve the problem of identifying a person's personality is considered separately. The solution is achieved by reproducing a certain trajectory by a person's vision. This technique can be used as a basic or additional technique for identifying a person's personality. It also analyzes the results of using eye tracking to study the interface of an automated information system for operator support based on algorithms for symptom-oriented emergency instructions (ASOEI), which is used at nuclear power plants (NPP).

Conference Proceeding (with ISSN)

Internet of Things for Human and Industry Application: ALIOT Project and R&D Issues.

Featured 20 November 2020 PCI 2020: 24th Pan-Hellenic Conference on Informatics 24th Pan-Hellenic Conference on Informatics ACM
AuthorsIlliashenko O, Kharchenko V, Morozova O, Phillips C

The paper focuses on analysis of the project "ALIOT"Internet of Things for Human and Industry Application. It discusses the complex problem how to build a united system of educational processes management in IoT domain, taking into account the industrial requirements to modern specialists in IoT. The paper proposes the principles of developing support systems of processes for acquiring knowledge that ensure the integration of educational and production systems in the frame of ALIOT project. The ALIOT project results and related R&D issues are described. The ALIOT curriculum consists of fourteen courses for three level of education: master courses, doctoral courses and industrial trainings. The main results of the ALIOT project and their interrelation are described: specialties and courses, education and research laboratories, sectoral IoT cluster network, networks of labs and centers.

Conference Proceeding (with ISSN)

Solving the Two-Criteria Maximum Coverage Location Problem of Continuous Area Monitored by Sensor Network

Featured 07 September 2023 2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) 2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) IEEE
AuthorsYakovlev S, Wojciechowski A, Podzeha D, Illiashenko O, Yakovleva I

The paper investigates the problem of optimizing a sensor network for monitoring a continuous area, considering the bounded coverage areas of sensors. This task is formulated in terms of the maximum coverage location problem. A mathematical model is proposed as a two-criteria optimization problem. The objective functions are the maximum area of the covered part of the region and the minimum total overlapping of sensor coverage areas. This model is transformed into an elastic (quasi-physical quasi-human) model, which differs from the known one in forming the extrusion potential energy function. To solve the problem, an original approach was implemented, combining local and global optimization stages. At the stage of local optimization, the Broyden-Fletcher-Goldfarb-Shanno method was used, in which the gradients were calculated analytically or from first-order differences depending on the shape of sensor coverage areas. At the stage of local optimization, the multistart method was used. The implementation of the approach has been tested for the polygonal shape of the region and elliptical shapes of the sensor coverage areas.

Journal article

A Convergent Approach to the Viability of the Dynamical Systems: The Cognitive Value of Complexity

Featured 28 December 2021 International Journal of Safety and Security Engineering11(6):713-719 International Information and Engineering Technology Association
AuthorsIlliashenko O, Mygal V, Mygal G, Protasenko O

The integration of information and industrial technologies, digitalization and differentiation of sciences are accompanied by an increase in various types of complexity. This limits the capabilities of computer modelling, data mining, and predictive analytics. The increasing cognitive complexity of information flows and their diversity creates problems of safety, reliability and stability of the functioning of a complex dynamic system in extreme conditions. Here we show the possibility of cognitive visualization of signals of different nature through their geometrization in the form of a topological 3D model of functioning. Its projections are spatio-temporal signatures, the configurations of which reflect the dynamic, energetic and structural features of the model. An increase in the number of components of the signature configuration and its area under external influence indicates an increase in structural and functional complexity. Therefore, the signal structure can be analyzed in real time using complementary probabilistic and deterministic methods. A set of tools for the synthesis and analysis of 3D models has innovative potential for monitoring the functioning of elements of complex dynamic systems, risk management and predictive analytics.

Conference Proceeding (with ISSN)

Towards Evidence-Based Cybersecurity Assessment of Programmable Systems to Ensure the Protection of Critical IT Infrastructure

Featured 07 September 2023 2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) 2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) IEEE
AuthorsIlliashenko O, Kharchenko V, Odarushchenko O

The paper is devoted to developing scientific principles, methods, means, and information technology of model-oriented verification and evidence-based assessment using functional safety and cybersecurity cases for programmable systems of critical applications (PSCA). In particular, information and control systems important for the safety of nuclear power plants (NPPs), aerospace systems, railway domains, etc., developed using Field Programmable Gate Arrays (FPGAs) and hardware platforms are reviewed. The goal is to ensure the guaranteed completeness and reliability of its functional safety and cybersecurity assessment by developing and implementing a set of formal and semi-formal methods and tools that consider defects of different nature - physical, design, trojans, and vulnerabilities that can be attacked and lead to a fatal system failure, which results in damaging the critical IT infrastructure. The methods shown are based on integrating algebraic, tabular, graph models, and case assessment methodology. The methods are implemented as appropriate technologies for evidence-based verification and evaluation of PSCA. For formal methods, a prototype of a translator of Very High-Speed Integrated Circuits Hardware Description Language (VHDL) code is developed into an algebra of behaviors. It provides evidence-based verification and a framework and tools to design reports on assessing the cybersecurity and functional safety of programmable systems.

Conference Proceeding (with ISSN)

Towards Effective Safety and Cybersecurity Co-engineering in Critical Domains

Featured 13 October 2023 2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT) IEEE
AuthorsBabeshko I, Illiashenko O, Di Giandomenico F

The primary objective of functional safety and cybersecurity co-engineering is to streamline assessment processes and enhance efficiency by implementing integrated approaches, therefore reducing overall effort and bringing several consequential advantages. Although this concept is not new, and there have already been successful attempts at its utilization in different critical domains such as nuclear, railway, and automotive, no mature approach could be easily adopted and applied during the assessment. Another challenge is that the understanding of co-engineering is essentially different, depending on domain specifics and priorities. Moreover, issues are still related to measuring efficiency achieved by co-engineering utilization. This paper addresses the current state of safety and cybersecurity co-engineering in critical domains. With a focus on nuclear, automotive, and railway domains, it proposes directions toward developing effective co-engineering frameworks for them.

Journal article

Digital Image Representation by Atomic Functions: The Compression and Protection of Data for Edge Computing in IoT Systems

Featured 01 May 2022 Sensors22(10):3751 MDPI AG
AuthorsMakarichev V, Lukin V, Illiashenko O, Kharchenko V

Digital images are used in various technological, financial, economic, and social processes. Huge datasets of high-resolution images require protected storage and low resource-intensive processing, especially when applying edge computing (EC) for designing Internet of Things (IoT) systems for industrial domains such as autonomous transport systems. For this reason, the problem of the development of image representation, which provides compression and protection features in combination with the ability to perform low complexity analysis, is relevant for EC-based systems. Security and privacy issues are important for image processing considering IoT and cloud architectures as well. To solve this problem, we propose to apply discrete atomic transform (DAT) that is based on a special class of atomic functions generalizing the well-known up-function of V.A. Rvachev. A lossless image compression algorithm based on DAT is developed, and its performance is studied for different structures of DAT. This algorithm, which combines low computational complexity, efficient lossless compression, and reliable protection features with convenient image representation, is the main contribution of the paper. It is shown that a sufficient reduction of memory expenses can be obtained. Additionally, a dependence of compression efficiency measured by compression ratio (CR) on the structure of DAT applied is investigated. It is established that the variation of DAT structure produces a minor variation of CR. A possibility to apply this feature to data protection and security assurance is grounded and discussed. In addition, a structure or file for storing the compressed and protected data is proposed, and its properties are considered. Multi-level structure for the application of atomic functions in image processing and protection for EC in IoT systems is suggested and analyzed.

Journal article

Flying Sensor and Edge Network-Based Advanced Air Mobility Systems: Reliability Analysis and Applications for Urban Monitoring

Featured 01 July 2023 Drones7(7):409 MDPI AG
AuthorsFesenko H, Illiashenko O, Kharchenko V, Kliushnikov I, Morozova O, Sachenko A, Skorobohatko S

Typical structures of monitoring systems (MSs) that are used in urban complex objects (UCOs) (such as large industrial facilities, power facilities, and others) during the post-accident period are combined with the technologies of flying sensor networks (FSNets) and flying edge networks (FENets) (FSNets and FENets); cloud/fog computing and artificial intelligence are also developed. An FSNets and FENets-based MS, composed of one of the Advanced Air Mobility (AAM) systems classes, which comprise main and virtual crisis centers, fleets of flying sensors, edge nodes, and a ground control station, is presented and discussed. Reliability and survivability models of the MS for the UCOs, considering various operation conditions and options of redundancy, are developed and explored. A tool to support the research on MS reliability, survivability, and the choice of parameters is developed and described. Crucially, this paper enhances the technique for assessing systems using the multi-parametrical deterioration of characteristics as a class of multi-state systems. Problems that may arise when using FSNets/FENet-based AAM systems are discussed. The main research results comprise a structural basis, a set of models, and a tool for calculating the reliability and survivability of FSNets/FENet-based AAM systems, with various options for distributing the processing and control resources between components, their failure rates, and degradation scenarios.

Journal article

Methods and Software Tools for Reliable Operation of Flying LiFi Networks in Destruction Conditions

Featured 01 September 2024 Sensors24(17):5707 MDPI AG
AuthorsFesenko H, Illiashenko O, Kharchenko V, Leichenko K, Sachenko A, Scislo L

The analysis of utilising unmanned aerial vehicles (UAVs) to form flying networks in obstacle conditions and various algorithms for obstacle avoidance is conducted. A planning scheme for deploying a flying LiFi network based on UAVs in a production facility with obstacles is developed and described. Such networks are necessary to ensure reliable data transmission from sensors or other sources of information located in dangerous or hard-to-reach places to the crisis centre. Based on the planning scheme, the following stages are described: (1) laying the LiFi signal propagation route in conditions of interference, (2) placement of the UAV at the specified points of the laid route for the deployment of the LiFi network, and (3) ensuring the reliability of the deployed LiFi network. Strategies for deploying UAVs from a stationary depot to form a flying LiFi network in a room with obstacles are considered, namely the strategy of the first point for the route, the strategy of radial movement, and the strategy of the middle point for the route. Methods for ensuring the uninterrupted functioning of the flying LiFi network with the required level of reliability within a given time are developed and discussed. To implement the planning stages for deploying the UAV flying LiFi network in a production facility with obstacles, the “Simulation Way” and “Reliability Level” software tools are developed and described. Examples of utilising the proposed software tools are given.

Journal article

Towards Trustworthy Safety Assessment by Providing Expert and Tool-Based XMECA Techniques

Featured 01 July 2022 Mathematics10(13):2297 MDPI AG
AuthorsBabeshko I, Illiashenko O, Kharchenko V, Leontiev K

Safety assessment of modern critical instrumentation and control systems is a complicated process considerably dependent on expert techniques, single/multiple faults consideration scope, other assumptions, invoked limitations, and support tools used during the assessment process. Ignoring these assumptions, as well as the significance of expert and tool influence, could lead to such effects as functional safety underestimation or overestimation in such a manner that functional safety assessment correctness and accuracy are affected. This paper introduces XMECA (x modes, effects, and criticality analysis, where x could be from different known techniques and domains—failures in functional safety, vulnerabilities and intrusions regarding cybersecurity, etc.) as a key technique of safety assessment. To verify the results obtained as XMECA deliverables, expert and uncertainty modes, effects, and criticality analysis (EUMECA) is performed, in particular focusing on decisions and judgments made by experts. Scenarios for processing verbal and quantitative information of XMECA tables from experts are offered. A case study of a possible functional safety assessment approach that considers the above-mentioned techniques and a supporting tool is provided. To assess the trustworthiness of safety analysis and estimation using XMECA, a set of the metrics is suggested. Features of adapting the suggested method for security assessment considering intrusions, vulnerabilities, and effects analysis (IMECA technique) are discussed.

Chapter

Diversity for NPP I&C Systems Safety and Cyber Security

Featured 2020 Advances in Information Security, Privacy, and Ethics IGI Global
AuthorsBabeshko I, Duzhiy V, Illiashenko O, Siora A, Sklyar V, Panarin A, Brezhniev E

This chapter presents a cost-effective approach to selection of the most diverse NPP Reactor Trip System (RTS) under uncertainty. The selection of a pair of primary and secondary RTS is named a diversity strategy. All possible strategies are evaluated on an ordinal scale with linguistic values provided by experts. These values express the expert's degree of confidence that evaluated variants of secondary RTS are different from primary RTS. All diversity strategies are evaluated on a set of linguistic diversity criteria, which are included in a corresponding diversity attribute. The generic fuzzy diversity score is an aggregation of the linguistic values provided by the experts to obtain a collective assessment of the secondary RTS's similarity (difference) with a primary one. This most rational diversity strategy is found during the exploitation stage, taking into consideration the fuzzy diversity score and cost of each strategy.

Chapter

Intelligent Decision Support—Cognitive Aspects

Featured 2021 Studies in Big Data Springer International Publishing
AuthorsMygal VP, Mygal GV, Illiashenko O

This chapter is dedicated to the problem of dynamic systems operating in harsh conditions where informational cognitive distortions and the psychophysiological state of a human could influence the decision-making process. The main information source about cognitive distortions of information is the spatio-temporal features of periodic signals of different nature. Their consideration has led to the emergence of many models, patterns, indicators, criteria and methods for their processing, which limit the possibilities for intelligent decision support. The chapter presents the results of developing a technology for constructing a topographic three-dimensional model of the cycle of functioning of an information source from a digitized time series. It is proposed to expand the knowledge base using structural and other patterns of the cycle of functioning of self-organizing objects. The application of the proposed technology to information sources of various nature demonstrates the advantages and new opportunities for identifying hidden spatio-temporal relationships that determine the features of functioning the dynamic systems in harsh conditions. The authors outline the prospects of utilising the developed technology for conducting intelligent trainings and individual approach to training of operators for critical application systems, as well as in the transition from Industry 3.0 to Industry 4.0.

Chapter

Models of Resilient Systems with Online Verification Considering Changing Requirements and Latent Failures

Featured 2024 Lecture Notes in Networks and Systems Springer Nature Switzerland
AuthorsKharchenko V, Ponochovnyi Y, Dotsenko S, Illiashenko O, Ivasiuk O

The paper presents the outcomes of developing and implementing a cybernetic approach to creating and deploying resilient systems. It discusses the concepts and principles of real-time evolution for resilient systems, considering changing requirements, environments, and latent failures. This increased resilience stems from the necessity of integrating additional channels into the control system to address shifts in requirements, environments, or unspecified faults and failures. The general structure of resilient systems is founded on the principle of partitioning and managing channels, as well as system reconfiguration based on functional and non-functional characteristics. A case study of a space resilient system with online verification is presented. Three scenarios of system behavior to ensure resilience are proposed, considering various tolerance and management mechanisms. The paper analyzes the results of developing and researching Markov models for these scenarios, offering insights for enhancing the availability of resilient systems.

Conference Proceeding (with ISSN)

Diversity for security: case assessment for FPGA-based safety-critical systems

Featured 2016 MATEC Web of Conferences Mastorakis N, Mladenov V, Bulucea A EDP Sciences
AuthorsAuthors: Kharchenko V, Illiashenko O, Editors: Mastorakis N, Mladenov V, Bulucea A

Industrial safety critical instrumentation and control systems (I&Cs) are facing more with information (in general and cyber, in particular) security threats and attacks. The application of programmable logic, first of all, field programmable gate arrays (FPGA) in critical systems causes specific safety deficits. Security assessment techniques for such systems are based on heuristic knowledges and the expert judgment. Main challenge is how to take into account features of FPGA technology for safety critical I and Cs including systems in which are applied diversity approach to minimize risks of common cause failure. Such systems are called multi-version (MV) systems. The goal of the paper is in description of the technique and tool for case-based security assessment of MV FPGA-based I and Cs.

Journal article

Neural Network Ensemble Method for Deepfake Classification Using Golden Frame Selection

Featured 01 April 2025 Big Data and Cognitive Computing9(4):109 MDPI AG
AuthorsLipianina-Honcharenko K, Melnyk N, Ivasechko A, Telka M, Illiashenko O

Deepfake technology poses significant threats in various domains, including politics, cybersecurity, and social media. This study uses the golden frame selection technique to present a neural network ensemble method for deepfake classification. The proposed approach optimizes computational resources by extracting the most informative video frames, improving detection accuracy. We integrate multiple deep learning models, including ResNet50, EfficientNetB0, Xception, InceptionV3, and Facenet, with an XGBoost meta-model for enhanced classification performance. Experimental results demonstrate a 91% accuracy rate, outperforming traditional deepfake detection models. Additionally, feature importance analysis using Grad-CAM highlights how different architectures focus on distinct facial regions, enhancing overall model interpretability. The findings contribute to of robust and efficient deepfake detection techniques, with potential applications in digital forensics, media verification, and cybersecurity.

Journal article

Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems

Featured 01 September 2022 Cryptography6(3):44 MDPI AG
AuthorsKharchenko V, Ponochovnyi Y, Ivanchenko O, Fesenko H, Illiashenko O

This paper suggests a strategy (C5) for assessing cloud and IoT system (CIS) dependability, availability, and cybersecurity based on the continuous collection, comparison, choice, and combination of Markov and semi-Markov models (MMs and SMMs). It proposes the systematic building of an adequate and accurate model to evaluate CISs considering (1) continuous evolution of the model(s) together with systems induced by changes in the CIS or physical and cyber environment parameters; (2) the necessity of collecting data on faults, failures, vulnerabilities, cyber-attacks, privacy violations, and patches to obtain actual data for assessment; (3) renewing the model set based on analysis of CIS operation; (4) the possibility of choice and utilizing “off-the-shelf” models with understandable techniques for their development to assure improved accuracy of assessment; (5) renewing the models during application of CIS by time, component or mixed combining, taking into consideration different operation and maintenance events. The results obtained were algorithms for data collection and analysis, choice, and combining appropriate MM and SMMs and their different types, such as multi-fragmental and multiphase models, considering changing failure rates, cyber-attack parameters, periodical maintenance, etc. To provide and verify the approach, several private and public clouds and IoT systems were researched and discussed in the context of C5 and proposed algorithms.

Chapter

UAV Fleet with Battery Recharging for NPP Monitoring: Queuing System and Routing Based Reliability Models

Featured 2022 Lecture Notes in Networks and Systems Springer International Publishing
AuthorsKliushnikov I, Kharchenko V, Fesenko H, Leontiiev K, Illiashenko O

Reliability models of the unmanned aerial vehicle (UAV) fleet with battery recharging for the system of monitoring critical objects as nuclear power plants (NPPs) and developed. The general model for describing and assessing availability of a UAV monitoring station (UAVMS) by use of a queuing system model is developed and analyzed in detail. These models consider UAV failures considering a mission plan. Battery recharging is carried out either at the depot or by using autonomous battery maintenance stations (ABMSs) deployed at certain points. Paper presents and discuss a general and partial UAVMS reliability models considering parameters of a ABMS and routings for monitoring. The results of research of the partial reliability models of the UAVMS with the ABMS (UAVMS-ABMS) set considering reliability, structure and routing parameters are described.

Journal article

Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection

Featured 01 August 2023 Entropy25(8):1123 MDPI AG
AuthorsIlliashenko O, Kharchenko V, Babeshko I, Fesenko H, Di Giandomenico F

The entropy-oriented approach called security- or cybersecurity-informed safety (SIS or CSIS, respectively) is discussed and developed in order to analyse and evaluate the safety and dependability of autonomous transport systems (ATSs) such as unmanned aerial vehicles (UAVs), unmanned maritime vehicles (UMVs), and satellites. This approach allows for extending and integrating the known techniques FMECA (Failure Modes, Effects, and Criticality Analysis) and IMECA (Intrusion MECA), as well as developing the new SISMECA (SIS-based Intrusion Modes, Effects, and Criticality Analysis) technique. The ontology model and templates for SISMECA implementation are suggested. The methodology of safety assessment is based on (i) the application and enhancement of SISMECA considering the particularities of various ATSs and roles of actors (regulators, developers, operators, customers); (ii) the development of a set of scenarios describing the operation of ATS in conditions of cyberattacks and physical influences; (iii) AI contribution to system protection for the analysed domains; (iv) scenario-based development and analysis of user stories related to different cyber-attacks, as well as ways to protect ATSs from them via AI means/platforms; (v) profiling of AI platform requirements by use of characteristics based on AI quality model, risk-based assessment of cyberattack criticality, and efficiency of countermeasures which actors can implement. Examples of the application of SISMECA assessment are presented and discussed.

Chapter

Knowledge Management Model Based Approach to Profiling of Requirements: Case for Information Technologies Security Standards

Featured 2021 Studies in Big Data Springer International Publishing
AuthorsDotsenko S, Illiashenko O, Budnichenko I, Kharchenko V

The paper provides analysis of existing knowledge-management models. It justifies the need of integrated model of knowledge management for both industry and academia. It is proposed to build such a model using well-known standards of IT security—Common criteria and methodology for IT security evaluation. The formation of a model of knowledge management is carried out by analyzing the content of the relevant elements of standards and establishing the content of knowledge that determines the forms of relations between them. The architecture of four-factor models is proposed for application towards the formation of knowledge management models in the organization of the information security management system in accordance with the standards of the series ISO/IEC 27000.

Conference Proceeding (with ISSN)

Cybersecurity Case for FPGA-Based NPP Instrumentation and Control Systems

Featured 26 June 2016 2016 24th International Conference on Nuclear Engineering Volume 5: Student Paper Competition American Society of Mechanical Engineers
AuthorsIlliashenko OA, Broshevan YV, Kharchenko VS

Modern industrial instrumentation and control systems (I&Cs) used in nuclear power plants (NPP) are facing more with cybersecurity threats and vulnerabilities, which were neglected before. Cybersecurity incidents are a subject to grow into more complex attacks with worse consequences than before. The use of field programmable gate arrays (FPGA) in such critical systems causes specific risks for ensuring of safety, as the master-property of such kind of systems, and security as a subordinate property primarily to the NPP reactor trip systems (RTS).

Cybersecurity assessment results of industrial I&Cs are mainly based on subjective assessment of the expert judgment and they do not take into account all features of propagating FPGA technology. Nowadays there is a big gap in understanding how to assess and assure the security of FPGA-based NPP I&Cs (FNI&Cs). Conformance of FNI&Cs to security requirements, their verification to high-level standards often is subjective and depends on particular expert.

Regulatory and certification bodies, developers and end-users of FNI&Cs are missing the understandable methodology for security assurance of such kind of systems taking into account specific context of the operating environment which allows decreasing time-to-market and thus providing benefits for all interested parties.

The paper describes cybersecurity assurance technique of multi-version FNI&Cs. Requirements profile is formulated using the best practices from the following international regulations. The goal of the paper is presentation of the case-based methodology and tool of FNI&Cs cybersecurity assurance based on international regulations. Proposed methodology provides comparable and repeatable process of assurance.

Journal article

UAV and IoT-Based Systems for the Monitoring of Industrial Facilities Using Digital Twins: Methodology, Reliability Models, and Application

Featured 01 September 2022 Sensors22(17):6444 MDPI AG
AuthorsSun Y, Fesenko H, Kharchenko V, Zhong L, Kliushnikov I, Illiashenko O, Morozova O, Sachenko A

This paper suggests a methodology (conception and principles) for building two-mode monitoring systems (SMs) for industrial facilities and their adjacent territories based on the application of unmanned aerial vehicle (UAV), Internet of Things (IoT), and digital twin (DT) technologies, and a set of SM reliability models considering the parameters of the channels and components. The concept of building a reliable and resilient SM is proposed. For this purpose, the von Neumann paradigm for the synthesis of reliable systems from unreliable components is developed. For complex SMs of industrial facilities, the concept covers the application of various types of redundancy (structural, version, time, and space) for basic components—sensors, means of communication, processing, and presentation—in the form of DTs for decision support systems. The research results include: the methodology for the building and general structures of UAV-, IoT-, and DT-based SMs in industrial facilities as multi-level systems; reliability models for SMs considering the applied technologies and operation modes (normal and emergency); and industrial cases of SMs for manufacture and nuclear power plants. The results obtained are the basis for further development of the theory and for practical applications of SMs in industrial facilities within the framework of the implementation and improvement of Industry 4.0 principles.

Chapter

Embedding an Integrated Security Management System into Industry 4.0 Enterprise Management: Cybernetic Approach

Featured 2021 Studies in Big Data Springer International Publishing
AuthorsDotsenko S, Illiashenko O, Kamenskyi S, Kharchenko V

The paper contains the results of the analysis of methodologies and standards obtaining the requirements to security management systems of enterprises including modern enterprises implementing Industry 4.0 principles. Key standards ISO/IEC 7498, 15408, 18045, 20000, 27000 have been analyzed to suggest an approach to the development of integrated security and safety management system structure considering threats of intrusion into physical, information and signal spaces. This system is part of the enterprise management system and based on cybernetic principle of control. These subsystems check and control according with individual and general objectives for physical, information and signal spaces and requirementsbased models. The goal of the paper is to analyze the methodologies for developing an integrated security management system structure as a component of enterprise management systems in the context of Industry 4.0. The obtained results and recommendations for enhancing and implementation these systems are discussed.

Conference Proceeding (with ISSN)

SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities: SYNAPSE

Featured 30 July 2024 ARES 2024: The 19th International Conference on Availability, Reliability and Security Proceedings of the 19th International Conference on Availability, Reliability and Security ACM
AuthorsBountakas P, Fysarakis K, Kyriakakis T, Karafotis P, Aristeidis S, Tasouli M, Alcaraz C, Alexandris G, Andronikou V, Koutsouri T, Yatagha R, Spanoudakis G, Ioannidis S, Martinelli F, Illiashenko O

In an era of escalating cyber threats, the imperative for robust and comprehensive cybersecurity measures has never been more pressing. To address this challenge, SYNAPSE presents a pioneering approach by conceptualising, designing, and delivering an Integrated cybersecurity Risk & Resilience Management Platform. The innovation of this platform lies in the integration of key elements, such as situational awareness, incident response, and preparedness (i.e., cyber range), augmented by advanced AI capabilities. Through its holistic approach, SYNAPSE aims to elevate cyber resilience by not only mitigating threats but also fostering a culture of proactive defence, informed decision-making, and collaborative response within organisations and across industries.

Journal article

Generalisation of availability models for resilient systems with online verification

Featured 01 January 2025 International Journal of Electronics and Telecommunications71(3):1-7 Polish Academy of Sciences Chancellery
AuthorsKharchenko V, Ponochovnyi Y, Ivasiuk O, Illiashenko O, Ponochovna O

This paper analyses online verification methods for safety- and security-critical systems, including aerospace, nuclear instrumentation, and smart home systems. It emphasizes the need for resilience and adaptability in these systems to withstand various environmental conditions and potential threats. Several Markov models are developed to evaluate the dependability of control systems for small modular reactors. These models illustrate how online verification, by enabling early detection of failures, can enhance resilience and improve system performance. The findings suggest that optimising verification parameters is crucial for this enhancement, providing a foundation for future research in critical control systems.

Journal article

Explaining Artificial Inelligence as a Service: Metodology of Assessment and Quality Models

Featured March 2025 Cybernetics and Systems Analysis61(2):175-185 Springer Science and Business Media LLC
AuthorsKharchenko V, Yakovlev S, Veprytska O, Illiashenko O, Fesenko H

The subject of the research is Artificial Intelligence as a Service (AIaaS) and AIaaS quality models. The goal is to define quality characteristics and develop a methodology for evaluating explainable AIaaS (XAIaaS). AIaaS solutions offered by cloud providers are analysed and a classification of AI tools supported by the services is provided. The AIaaS quality assessment methodology is proposed, which is based on the principles of case-oriented assessment and the quality model of artificial intelligence systems. It combines quality models of AI tools and cloud services and metric evaluation of relevant characteristics using weighted convolutions. Examples of requirement profiling and quality characteristics for two XAIaaS are discussed.

Journal article
Cybersecurity and Artificial Intelligence: Triad-Based Analysis and Attacks Review
Featured 25 September 2025 Cybernetics and Information Technologies25(3):156-185 Walter de Gruyter GmbH
AuthorsVeprytska O, Kharchenko V, Illiashenko O

This study aims to expand the understanding of Artificial Intelligence (AI) attack scenarios and develop effective protection mechanisms against them. The triadic principle was used to investigate attacks on traditional systems and AI systems, enhance these attacks using AI, and employ AI for cybersecurity defence. By systematically analysing the interactions between these elements, we create a comprehensive set of attack scenarios and corresponding defensive strategies. Current analysis reveals distinct attack patterns and vulnerabilities associated with traditional and AI-based systems. Effective defence mechanisms and strategies were identified and tailored to various attack scenarios, leveraging AI’s capabilities for improved security measures. The findings provide a structured approach to understanding and mitigating AI-related threats in cybersecurity. By mapping out the roles of AI in both attack and defence, this study offers valuable insights for developing advanced tools and methods to assess system security and enhance countermeasures.

Journal article

ICONE19-43484 CHOICE AND COMPLEXATION OF TECHNIQUES AND TOOLS FOR ASSESSMENT OF NPP I&C SYSTEMS SAFETY

Featured 2011 The Proceedings of the International Conference on Nuclear Engineering (ICONE)2011.19(0):_ICONE1943 Japan Society of Mechanical Engineers
AuthorsIlliashenko O, Babeshko E

There are a lot of techniques to analyze and assess reliability and safety of NPP Instrumentation and Control (I&C) systems (e.g. FMEA - Failure Modes and Effects Analysis and its modifications, FTA - Fault Tree Analysis, HAZOP - Hazard and Operability Analysis, RBD - Reliability Block Diagram, Markov Models, etc.) and quantity of tools based on these techniques is constantly increasing. Known ways of safety assessment, as well as problems of their choice and complexation are analyzed. Objective of the paper is the development of general "technique of techniques choosing" and tool for support of such technique. The following criteria are used for analysis and comparison and their features are described: - compliance to normative documents; - experience of application in industry; - methods used for assessment of system NPP I&C safety; - tool architecture/framework; - reporting; - vendor support, etc. Comparative analysis results of existing T&T - Tools and Techniques for safety analysis are presented in matrix form ("Tools-Criterion") with example. Features of complexation of different safety assessment techniques (FMECA, FTA, RBD, Markov Models) are described. The proposed technique is implemented as special tool for decision-making. The proposed technique was used for development of RPC Radiy company standard CS 66. This guide contains requirements and procedures of FMECA analysis of developed and produced NPP I&C systems based on RADIY platform.

Journal article

EXPLAINABLE ARTIFICIAL INELLIGENCE AS A SERVICE: METODOLOGY OF ASSESSMENT AND QUALITY MODELS

Featured 2025 KIBERNETYKA TA SYSTEMNYI ANALIZ13-26 V.M. Glushkov Institute of Cybernetics
AuthorsKharchenko V, Yakovlev S, Veprytska O, Illiashenko O, Fesenko H

The subject of the research is Artificial Intelligence as a Service (AIaaS) and AIaaS quality models. The goal is to define quality characteristics and develop a methodology for evaluating explainable AIaaS (XAIaaS). AIaaS solutions offered by cloud providers are analysed and a classification of AI tools supported by the services is provided. The AIaaS quality assessment methodology is proposed, which is based on the principles of case-oriented assessment and the quality model of artificial intelligence systems. It combines quality models of AI tools and cloud services, and metric evaluation of relevant characteristics using weighted convolutions. Examples of requirements profiling and quality characteristics for two XAIaaS are discussed. Keywords: artificial intelligence, АІ as a Service, cloud systems, explainable AI, requirements profiling.

Journal article

Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks

Featured 2021 Information & Security: An International Journal Procon, Ltd.
AuthorsKharchenko V, Kliushnikov I, Fesenko H, Illiashenko O
Journal article

Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045

Featured 2019 Information & Security: An International Journal43(3):305-317 Procon, Ltd.
AuthorsDotsenko S, Illiashenko O, Kamenskyi S, Kharchenko V
Journal article

GAP-ANALYSIS OF ASSURANCE CASE-BASED CYBERSECURITY ASSESSMENT: TECHNIQUE AND CASE STUDY

Featured 27 May 2018 Advanced Information Systems2(1):64-68 National Technical University Kharkiv Polytechnic Institute
AuthorsIlliashenko O, Kharchenko V, Kor A-L

Предметом вивчення в статті є процеси оцінювання кібербезпеки інформаційно-керуючих систем (ІКС). Метою є розробка техніки аналізу розрив процесу проведенні аналізу кібербезпеки. Завдання: розробити метод аналізу розривів у процесі оцінювання нефункціональних вимог до функціональної та кібербезпеки ІКС, заснований на класифікації вимог з урахуванням можливості їх декомпозиції, який включає в себе побудову поліпшеного кейса запевнення інформаційної безпеки і визначення контрзаходів щодо усунення виявлених розривів. Висновки. Наукова новизна отриманих результатів полягає в наступному: отримав подальшого розвитку метод забезпечення інформаційної безпеки цифрових компонентів ІКС шляхом проведення аналізу невідповідностей вимог з використанням процедур опису вразливостей і оцінки критичності наслідків вторгнень, а також визначення множини контрзаходів за критерієм «безпека-вартість», що дозволяє зменшити ризики до прийнятного рівня.

Journal article

Choosing FMECA-Based Techniques and Tools for Safety Analysis of Critical Systems

Featured 2012 Information & Security: An International Journal28:275-285 Procon, Ltd.
AuthorsIlliashenko O, Babeshko E
Journal article

SEREIN Project: Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains

Featured 2016 Information & Security: An International Journal35:29-48 Procon, Ltd.
AuthorsBoyarchuk A, Illiashenko O, Kharchenko V, Vain J
Journal article
A general method for real-time detection of information threats with a Ukraine case study
Featured 10 September 2025 Radioelectronic and Computer Systems2025(3):202-230 National Aerospace University - Kharkiv Aviation Institute
AuthorsLipianina-Honcharenko K, Komar M, Bohuta H, Ihnatiev I, Yurkiv K, Illiashenko O, Bilovus L

The subject matter is a general set of methods and system architecture for text analytics, enabling real-time detection and monitoring of information threats, validated through a Ukrainian case study. It integrates sentiment analysis, polarity-inversion handling, and machine-learning–based thematic classification. The research is especially relevant in the context of hybrid warfare, where the information environment becomes a battlefield of disinformation, manipulative campaigns and cognitive influence. The goal is to develop and experimentally validate a comprehensive information technology system for automated threat detection in the Ukrainian information space, built on the principles of Responsible Artificial Intelligence (Responsible AI) and modern natural language processing techniques. The objectives: the formation of a multilingual corpus of news and social media texts; implementation of a sentiment analysis module that incorporates polarity inversion; development of a hybrid thematic classification method that combines keyword dictionaries with machine learning model ensembles; and the construction of a Responsible AI Evaluation (RAIE) framework with indicators for fairness, transparency and user satisfaction. The obtained results confirm all five proposed hypotheses: the developed sentime оьnt analysis module achieves macro-F1 = 0.85 and reduces MAE by 18.2% compared to the baseline model; the polarity inversion detection algorithm allows automatic reversal of sentiment score in manipulative texts, improving the detection of hostile narratives; the hybrid thematic classification achieves macro-F1=0.83, with latency of 55 ms/document and throughput of 18 documents/second; integration of all modules into a unified pipeline improves recall by 10.4% without significant increase in latency; the RAIE conceptual model ensures ΔF1 ≤ 5%, an expert user satisfaction score of 4.14/5 and less than 10% latency overhead. The conclusions demonstrate that the proposed system effectively combines high accuracy in identifying information threats with the principles of ethical AI, transparency and user trust, making it practically valuable for national cybersecurity centres, CERTs and OSINT platforms. Conclusions. The scientific novelty lies in the development of novel methods: a context-sensitive sentiment analysis approach tailored to military-related vocabulary; a polarity inversion algorithm for detecting covert hostility; a hybrid thematic classification model combining machine learning with expert dictionaries; an integrated information processing architecture with >17 documents/second throughput; a Responsible AI evaluation model incorporating Fairness Gap, Model Cards and User Satisfaction Score.

Conference Proceeding (with ISSN)

Hardware-based implementation of Intrusion Prevention System with OpenCTI

Featured 11 October 2024 2024 14th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2024 14th International Conference on Dependable Systems, Services and Technologies (DESSERT) IEEE
AuthorsPerepelitsyn A, Illiashenko O, Tetskyi A

The paper is dedicated to analysing possible tools for cyber threat prevention with the combination of hardware accelerators to support this activity. Perspectives on using Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are discussed. The signature method and anomaly detection method are analysed. An analysis of hardware accelerators based on Field Programmable Gate Array (FPGA) is conducted. The use of Smart Network Interface Controller (NIC) is discussed. The set of the most popular Original Equipment Manufacturer (OEM) of FPGA-based SmartNICs is considered. The possibility of the use of Open Cyber Threat Intelligence (OpenCTI) platform is discussed. A system structure for preventing implementations of known cyber threats using the FPGA and OpenCTI framework is studied. A sequence of steps for creating hardware-accelerated solutions to prevent implementations using information from OpenCTI-based databases is proposed.

Conference Proceeding (with ISSN)

Hardware diversity and modified NUREG/CR-7007 based assessment of NPP I&C safety

Featured 07 November 2017 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) Bucharest, Romania IEEE
AuthorsIlliashenko O, Kharchenko V, Kor A-L, Panarin A, Sklyar V

Diversity and subdiversity-oriented systems applied in safety critical industry systems are analyzed through the use of the classification scheme described in standard NUREG7007. This classification is specified considering diversity of hardware and FPGA designs. In particular, diversity of hard logic and soft processors, interfaces and buses, self-diagnostics means, etc... are described. Impact of hardware/FPGA diversity on safety of Instrumentation and Control systems (I&Cs) are analyzed. The technique for selecting such diversity is presented.

Journal article

Оцінювання інформаційної безпеки систем на програмовній логіці з використанням кейсів: таксономія, нотація, концепція

Featured 27 April 2018 Наука і техніка Повітряних Сил Збройних Сил України(2(31)):97-103 Ivan Kozhedub Kharkiv National Air Force University KNAFU
AuthorsІлляшенко ОО
Journal article

A Digital Twin for the Logistics System of a Manufacturing Enterprise Using Industrial IoT

Featured 2020 Information & Security: An International Journal47(1):125-134 Procon, Ltd.
AuthorsKharchenko V
Journal article

АНАЛІЗ МЕТОДОЛОГІЧНИХ ОСНОВ ФОРМУВАННЯ ІНФОРМАЦІЙНО-УПРАВЛЯЮЧИХ СИСТЕМ ПІДПРИЄМСТВ В ІНДУСТРІЇ 3.0: РУХ ДО ІНДУСТРІЇ 4.0

Featured 01 January 2019 RADIOELECTRONIC AND COMPUTER SYSTEMS0(2):29-44 National Aerospace University - Kharkiv Aviation Institute
AuthorsДоценко СІ, Ілляшенко ОО, Каменський С, Купрейшвілі ДР, Харченко ВС

The analysis of the level of development of industry digitalization in Industry 3.0 has shown that the main methodology of the formation of production management systems is recognized by the methodology of software and target management, which is the basis for the developed ODAS draft. The basic method of automated control systems modeling in Industry 3.0 is the method of forming a structured hierarchy. In the beginning, a hierarchy of goals is formed, and then the hierarchy of the organizational system is determined in the following identical forms of representation, namely: tasks; ranks; operations. Such an approach provides for the definition of the composition and content of operations that need to be implemented in management. The main problem of the hierarchical approach in the methodology of programmatic planning and management is the problem of forming the goal of the activity. In this approach, there is no requirement for the formation of an integral (general) purpose of the activity in the explicit form and hierarchy of goals. Simultaneously with the method of software-targeted management, the method of an architectural approach to the structuring of the system of production control dialogue was developed. The main advantage of this approach is that the architecture of the structural graph of the system does not depend on the organizational structure of the investigated organization. On this basis, a five-level structural graph of the control system was formed. For each level of management, the functional structure of the deciding system is formed. The crucial point is that the developed architecture of the functional structure of the deciding system is universal for all five layers of management and has the appropriate mathematical justification. The fundamental difference between this approach is that in the architecture of the decisive system, the model of the control object for the corresponding level is used. The structural representation of the software-target management and the functional representation in the architectural approach are integral parts of the integrated representation of the enterprise. It is the architecture of the functional structure of the control system for the layer Δ corresponding to the architecture of the intelligent control system. It follows that the development of intelligent production management systems for Industry 4.0 is not possible outside the theory of intellectual systems, which in turn is based on the theory of functional systems.

Journal article

CONCEPTION AND APPLICATION OF DEPENDABLE INTERNET OF THINGS BASED SYSTEMS

Featured 22 December 2020 Radio Electronics, Computer Science, Control0(4):139-150 Zaporizhzhia National Technical University
AuthorsIlliashenko ОО, Kolisnyk МА, Strielkina АE, Kotsiuba ІV, Kharchenko VS
Conference Proceeding (with ISSN)

Cyber security lifecycle and assessment technique for FPGA-based I&C systems

Featured September 2013 2013 11th East-West Design and Test Symposium (EWDTS) East-West Design & Test Symposium (EWDTS 2013) IEEE
AuthorsOleg I, Vyacheslav K, Andriy K

This paper presents an overview of the state-of-the-art of Field Programmable Gate Arrays (FPGA)-based Instrumentation and Control (I&C) systems cyber security assurance problem, brief analysis of regulatory documents that cover various aspects of I&C systems development and operation, FPGA technology implementation, and cyber security assessment and assurance of FPGA-based I&C systems. Cyber security assessment technique which is based on Gap Analysis (GA) and Intrusion Modes and Effects Criticality Analysis (IMECA) procedures is proposed. The technique is applicable to safety-critical FPGA-based I&C systems and complex computer-based I&C systems as a whole. Elements of GA-and-IMECA technique of assessment are described. The paper provides example of GA-and-IMECA-based cyber security analysis procedure for several types of vulnerabilities. © 2013 IEEE.

Activities (3)

Sort By:

External examiner / External advisor

BSc (Hons) Computer Science with Cybersecurity

01 October 2025
Journal editorial board

RADIOELECTRONIC AND COMPUTER SYSTEMS

01 January 2025
Editorial/Advisory Board
Journal editorial board

Computer systems and information technologies

01 September 2020
Editorial/Advisory Board

Current teaching

Teaching the following modules to L6 and L7 students at Leeds Beckett University:

  • Incident Response and Investigations;
  • Cyber Security Landscapes;
  • Systems Security;
  • Web and Network Security.

Supervising BSc students.

 

 

Teaching Activities (5)

Sort By:

Course taught

Systems Security

23 January 2026

Course taught FeaturedFeatured

Incidents Response and Investigations

22 September 2025

Course taught

Cyber Security Landscapes

22 September 2025

Course taught

Ethical Hacking

22 January 2026

Course taught FeaturedFeatured

Web and Network Security

22 January 2026

{"nodes": [{"id": "31822","name": "Dr Oleg Illiashenko","jobtitle": "Senior Lecturer","profileimage": "/-/media/images/staff/dr-oleg-illiashenko.jpg","profilelink": "/staff/dr-oleg-illiashenko/","department": "School of Built Environment, Engineering and Computing","numberofpublications": "73","numberofcollaborations": "73"},{"id": "6513","name": "Professor Ah-Lian Kor","jobtitle": "Professor","profileimage": "/-/media/images/staff/lbu-approved/beec/ah-lian-kor.jpg","profilelink": "/staff/professor-ah-lian-kor/","department": "School of Built Environment, Engineering and Computing","numberofpublications": "145","numberofcollaborations": "1"}],"links": [{"source": "31822","target": "6513"}]}
Dr Oleg Illiashenko
31822