1. Vatamaniuk, I.V., Iakovlev, R.N.: Generalized theoretical models of cyberphysical systems. Proc. Southwest State Univ. 23(6), 161–175 (2019) (In Russ.). https://doi.org/10.21869/2223-1560-2019-23-6-161-175
2. Ronzhin, A.L., Budkov, V.Y., Ronzhin, A.L.: User profile forming based on audiovisual situation analysis in smart meeting room. SPIIRAS Proc. 4(23), 482–494 (2014). https://doi.org/10.15622/sp.23.28
3. Alguliev, R., Imamerdiev, Y., Suxostat, L.: Ensuring information security of cyber-physical systems. In: 1st Republican Conference On Scientific-practical problems of Software Engineering (2017). https://doi.org/10.25045/NCSoftEng.2017.07
4. Meshcheryakov, R.V., Iskhakov, A.Y., Evsutin, O.O.: Analysis of modern methods to ensure data integrity in cyber-physical system management protocols. Inf. Autom. 19(5), 1089–1122 (2020). https://doi.org/10.15622/ia.2020.19.5.7
5. Knight, J.C., Sullivan, K.J., Elder, M. C., Wang, C.: Survivability architectures: issues and approaches. In: Proceedings of the DARPA Information Survivability Conference and Exposition. DISCEX'00, vol. 2, pp. 157–171. IEEE (2000)