- Chatterjee J. M., Jain V., Kumar V., Sharma B., Shrestha R. Smart City Infrastructure. The Blockchain Perspective. Beverly: John Wiley & Sons Limited, 2022. 380 p.
- Kamara M. K. Securing Critical Infrastructures. Bloomington: Xlibris US, 2020. 385 p.
- Mehmood R., See S., Katib I., Chlamtac I. Smart Infrastructure and Applications. Foundations for Smarter Cities and Societies. Cham: Springer Nature Switzerland AG, 2020. 655 p.
- Suzuki L., Finkelstein A. Data as Infrastructure for Smart Cities. Stevenage: Institution of Engineering and Technology, 2019. 313 p.
- Vacca J. Solving Urban Infrastructure Problems Using Smart City Technologies. Amsterdam: Elsevier, 2020. 820 p.
- Паращук И. Б., Чечулин А. А. Нейро-нечеткий метод детектирования уязвимостей для контроля защищенности процессов и средств взаимодействия “человек - интеллектуальная система” в рамках концепции “Smart Transport” // Актуальные проблемы инфотелекоммуникаций в науке и образовании (АПИНО-2023): сб. науч. ст. XII Междунар. науч.-техн. и науч.-метод. конф.: в 4 т. / под ред. С. И. Макаренко. СПб.: Изд-во СПбГУТ, 2023. Т. 1. С. 837-841. EDN: DCHWIO
- Kotenko I. V., Parashchuk I. B. Interval Analysis of Security for Information and Telecommunication Resources of Critical Infrastructures // Society 5.0. Studies in Systems, Decision and Control. Cham: Springer Nature Switzerland AG, 2023. V. 437. P. 241-250.
- Maheswaran M., Badidi E. Handbook of Smart Cities. Software Services and Cyber Infrastructure. Cham: Springer Nature Switzerland AG, 2018. 406 p.
- Kotenko I. V., Parashchuk I. B. Analysis of Threats to Information Security of Industrial Automation Systems Using Euclidean and Hamming Distances between Fuzzy Sets // 2023 International Russian Automation Conference (RusAutoCon-2023) (Sochi, 10-16 September 2023). IEEE Xplore Digital Library: Browse Conferences, 2023. N. 10272922. P. 13-18.
-
Kanchan D. K., Kumhar D. Security Threats and Challenges in Smart Cities // Journal of Emerging Technologies and Innovative Research (JETIR). 2018. V. 5. Iss. 8. P. 205-209.
-
Kitchin R., Dodge M. The Security of Smart Cities: Vulnerabilities, Risks, Mitigation, and Prevention // Journal of Urban Technology. 2019. V. 26. N. 2. P. 47-65.
-
Gambardella A., State B., Khan N., Tsourides L., Torr P., Baydin A. G. Detecting and Quantifying Malicious Activity with Simulation-based Inference // ICML workshop on Socially Responsible Machine Learning: 38-th International Conference on Machine Learning, 2021. P. 14-28.
-
Karabacak F., Ogras U., Ozev S. Malicious Activity Detection in Lightweight Wearable and IoT Devices Using Signal Stitching // Sensors. 2021. V. 21. N. 3408. P. 1-21.
-
Gabber H. The 2020 CyberSecurity & Cyber Law Guide. N. Y.: Independently published, 2020. 435 p.
-
Allodi L., Cremonini M., Massacci F., Shim W. Measuring the accuracy of software vulnerability assess-ments: experiments with students and professionals // Empirical Software Engineering. 2020. V. 25. P. 1063-1094. EDN: PKLAGQ
-
Meeuwisse R. Cybersecurity Exposed: The Cyber House Rules. London: Cyber Simplicity Ltd, 2017. 175 p.
-
Desnitsky V. A., Kotenko I. V., Parashchuk I. B. Neural Network Based Classification of Attacks on Wireless Sensor Networks // 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (St. Petersburg and Moscow, 27-30 Jan. 2020). IEEE Xplore Digital Library, 2020. P. 284-287. EDN: EQXFFG
ук И. Б., Иванов Ю. Н., Романенко П. Г. Нейросетевые методы в задачах моделирования и анализа эффективности функционирования сетей связи. СПб.: ВАС, 2010. 104 с. EDN: YRJTTF
19. Haykin S. O. Adaptive Filter Theory. Upper Saddle River, New Jersey: Prentice Hall Inc., 2002. 920 p.
20. Lo J. T.-H. Synthetic approach to optimal filtering // IEEE Trans. Neural Networks. 1994. V. 5. P. 803-811.
21. Parlos A. G., Menon S. K., Atiya A. F. An algorithmic approach to adaptive state filtering using recurrent neural networks // IEEE Trans. Neural Networks. 2001. V. 12 (6). P. 1411-1432.
22. Liang J. Y., Qian Y. H. Information granules and entropy theory in information systems // Science in China Series F: Information Sciences. 2008. V. 51. N. 10. P. 1427-1444.
23. Yao Y. Y. Information granulation and rough set approximation // International Journal of Intelligent Systems. 2001. V. 16. N. 1. P. 87-104.
24. Mikhaylichenko A. V., Рarashchuk I. B. Procedures for granular selection of analyzed parameters of technical reliability of modern disk storage systems // International Conference on Advanced InfoTelecommunications (ICAIT-2023). Saint Petersburg: SPbGUT, 2023. V. 1. P. 799-803. EDN: RKMCAC
25. Bargiela A., Pedrycz W. Granular Computing. An Introduction. N.Y.: Springer New York, 2012. V. 717. 452 p.
26. Liu H., Cocea M. Granular Computing Based Machine Learning. A Big Data Processing Approach. Cham: Springer International Publishing AG, 2018. 113 p.
27. Михайличенко А. В., Паращук И. Б. Элементы нечетко-гранулярных вычислений в приложении к задачам анализа технической надежности систем распределенной обработки данных // Прикаспийский журнал. Управление и высокие технологии. 2022. № 1 (57). С. 77-84. EDN: PSDOQB
28. Dobhal D. C., Sharma S., Purohit K. C., Nautiyal L., Singh K. Cyber Trafficking, Threat Behavior, and Malicious Activity Monitoring for Healthcare Organizations. Hershey: IGI Global, 2023. 206 p.
29. Desnitsky V. A., Kotenko I. V., Parashchuk I. B. Methods of Assessing the Effectiveness of Network Content Processing Systems for Detecting Malicious Information Taking into Account the Elimination of Uncertainty in the Semantic Content of Information Objects // 2019 XXII International Conference on Soft Computing and Measurements (SCM) (St. Petersburg, 23-25 May 2019). IEEE Xplore Digital Library, 2019. P. 41-44. EDN: ULEEHE
30. Котенко И. В., Паращук И. Б. Верификация недостоверных параметров модели обнаружения вредоносной информации // Вестн. Астрахан. гос. техн. ун-та. Сер.: Управление, вычислительная техника и информатика. 2019. № 2. С. 7-18. EDN: ECARJF
31. Rid T., Buchanan B. Attributing Cyber Attacks // The Journal of Strategic Studies. 2015. V. 38. N. 1-2. P. 4-37.