Enhanced Cyber Security For Big Data Challenges
Enhanced Cyber Security For Big Data Challenges
Abstract— the power system can be seen as a cyber-physical to a new generation of Smart Grid or Smart Electricity
system where big data plays a major role in managing the Networks [1].
overwhelming volume of data underlining the importance of big
data in both the power industry and security domain. In this Smart Grid is a complex infrastructure that describes a
article, it is presented the challenges of cyber security in power system of systems [2] with characteristics such as the
systems and machine learning techniques, like artificial neural interdisciplinary nature, operational and managerial
networks, to prevent and overcome cyber-attacks. The motivation independence of its components as well as geographical
for choosing this topic resides in the evolution of power systems distribution, high heterogeneity of network equipment,
with the need for cyber security implementation. emerging behavior and evolutionary development.
Keywords— power system; cyber security; cyber-physical Thus, the high level of integration of information and
systems; machine learning; big data. communication technology, advanced processing and control
systems with physical systems leads to an exponential increase
in the complexity of the electrical networks leading to a new
paradigm, Cyber – Physical Energy System [3, 4]. Integrating
I. INTRODUCTION computers and communications into energy systems, increasing
the complexity and diversity of energy resources with a random
generation, inevitably leads to increased vulnerability of the
Advances in control technologies and technologies for energy system.
processing and transmitting information have imposed new
standards and performance requirements for the power system. Assessing the security of a real-time system to determine
The design and development of advanced data acquisition cyber vulnerabilities proves to be a challenge because the
technologies, sensor networks and execution elements have led current conventional technology is costly and slow for a
to increased complexity of measurement and process dynamic system such as the power grid. To take into account
management systems in the energy system. the real-time attack model, new algorithms need to be designed
to validate command signals (from automatic power generation
Technological and economic trends, as well as population control, voltage control, etc.) in terms of authenticity or
growth, increased carbon emissions and the depletion of fossil provenance from another source.
fuels, have given rise to the need for quality energy production
and consumption. The growing demands for clean energy and Current security strategies consist of an outdated arsenal of
increased supplied quality energy have forced the integration of methods because they are based on blocking or anticipating
renewable energy sources into the existing power system to already existing and widely used attacks that do not take into
diversify the energy mix and create a globally distributed account the new dynamic and adaptive cyber-attacks.
generation. At the same time, as the energy portfolio changes
With the increase in complexity of the smart grid, new and
and diversifies, new challenges arise that require changes in the
more adapted cyber penetration methods appear to compromise
power system infrastructure by adopting advanced
the normal functioning of the entire energy system and for
technological strategies to support secure and reliable energy
which there are no security strategies. Inappropriate
supply to consumers.
implementations of cyber security applications could lead to
Integrating cyber components at all levels of the energy degradation of the energy system's performance. So, the next
system has increased the system's performance, but stability generation of cyber security strategies must maintain a balance
and security issues have become a priority because despite between energy systems and cyber systems through a specific
technological advances, cyber security vulnerabilities have approach. Furthermore, security methods for preventing and
emerged. detecting cyber anomalies should take into account the overall
impact on the electrical network, not just focus on the isolated
At the same time, these integrations have led to the adoption effects that cyber attacks may have.
of advanced features, such as advanced configurability,
disruption reconfiguration, continued safety and availability of The objective of this article is to focus on a thorough study
energy. The two-way flow of information for better monitoring, on cyber security in smart grids, highlighting the use of Big
diagnosis and control at each level of the network has given rise Data and machine learning in the assessment and prevention of
cyber-attacks. In Section II Big Data and machine learning are
Due to the integration and development of information and • Identifying risk scenarios for data manipulation and
communication technology in the electrical network, an IT creating a strategic plan for suspicious activity scenarios to
infrastructure is added to the transmission and distribution address the right action;
network of energy for collecting, storing and analyzing data • Monitoring and evaluating system vulnerabilities (e.g.,
through extended sensor networks and measurement units to databases).
ensure the delivery of the quality criteria for the generation,
delivery and consumption of energy. This evolutionary step
towards the intelligent power grid determines large amounts of
data that energy companies have to deal with through
specialized applications.
One of the biggest challenges for smart grid applications is
handling massive amounts of data that need to be collected from
different sources in different formats and processed to optimize
network performance. The term “Big Data” (BD) defines these
large and complex data sets, which require advanced analysis,
processing and processing algorithms to discover hidden
patterns and information.
The availability of large data volumes due to the
proliferation of Intelligent Electronic Devices (IED) in
Intelligent Power Networks opens the way to implement the Big
Data concept in detecting and preventing security incidents by
analyzing multiple network entrances looking for patterns or
anomalies, using the extraction of the attributes (deriving
distinctive properties from an initial set of input data).
Cyber-attacks on the power grid reach a sophisticated level
of adaptability and dynamism making their detection difficult
because they manifest over a long period of time on the system,
altering various vulnerable points which cumulated result in an
abnormal behavior. The contribution given by BD is the ability Fig.1. Cyber security approach integrating Big Data
to extract information from large data collected from different
sources - data packets, servers, logs, sensor data, etc. - Using a Big Data in security analysis is designed to handle large
correlation analysis to give meaning to the links between the amounts of data - collecting, storing, integrating, classifying,
multitude of data [5]. analyzing - from various sources, structured and unstructured,
The information extracted from advanced processing can be captured in real time or near real - and works closely with 2
used to determine electrical network behaviors. The given categories of information security tools:
potential in analyzing the normal and abnormal behavior • Information and Event Security Management Tools -
scenarios based on historical and real-time data will lead to the Manages the analysis of logs in system logs and can be
building of knowledge bases, transforming the security strategy configured to detect or disable only certain attacks.
into an evolved one with intelligent decision-making
capabilities in detecting behavioral behaviors network under the • Performance and Application Monitoring Tools - monitors
influence of cyber-attacks, figure 1. the performance and availability of a complex application,
identifies and isolates changes that occur in case of failure or
A proactive approach to minimizing security risks for data cyber attacks.
follows 5 steps:
62
Information security can be differentiated by BD in security • supervised learning – is a type of algorithms used to make
analysis through the following [6, 7]: predictions based on a set of examples having input labeled data
and desired output data. The algorithms in this class analyze the
• Security with BD is on a platform capable of analyzing data and identify the function to map inputs with outpus. (e.g.
large data volumes and large storage space, such as Hadoop Kernel/Linear SVM, Random Forest, Neural Network,
operating with structured and unstructured data; Decision Tree, Logistic Regression, Naïve Baise, etc.);
• In the communications network, packet data traffic flows • unsupervised learning – unlike supervised learning,
in real-time from one node to another, and packets must be labels are not used, instead it is asked to find the intrinsic
analyzed immediately after being received at the destination. relations which underlies the data (e.g. Singular Value
This required feature is the scalability property; decomposition, DBSCAN, Gaussian Mixture Model, k-means,
• Another necessary feature is the integration of reporting etc.);
and visualization tools to identify data from different sources. • reinforcement learning – is a type of learning that is based
Data framing in a context can help correlate important on the feedback from the environment to adjust the actions of
events and help improve detection of anomalies. In other words, an agent (e.g. Radom Forest, Artificial Neural Networks,
a piece of code can be considered “harmless” at first glance, but Decision Tree, Linear Regression, etc.).
by putting it in a real-time system application or in a In the Case Study section of this article, the identification of
communication channel can lead to abnormal operation. which algorithm to choose will be presented.
One of the central ideas underlying this section is that, using The power system is a complex system, modeled by
BD, the behavior of a communications network or an electrical nonlinear differential equations that require a high
network can be analyzed in depth, defining the characteristics computational processing power. To treat such a system defined
of a normal state of operation and an abnormal state (following by complex equations, the best approach considered to
cyber disturbances), identifying suspicious activity and the modeling the relationship between input data and output data,
adoption of preventive measures. where the knowledge of earlier features is less known, is the use
However, extracting patterns of behavior (or statistical of deep neural networks. DNN uses less computational power
models) of the power system for cyber security is proving and are efficient in terms of processing time. They do not need
difficult because of the large data volume and the impact of a complete set of differential equations but use pre-calculated
available noise measurements. Traditional security methods are learning outcomes to obtain precise solutions [14]. Deep
outdated and increasing data collection makes energy sector learning is a subset of machine learning, representing large
organizations orient themselves in adopting intelligent methods scale artificial neural networks that uses huge amounts of data
of data analysis and security. to be effective.
Machine learning is a data analysis method that automates Cyber infrastructure in power systems is extremely
the construction of an analytical model. It is a branch of vulnerable to cyber-attacks due to the complexity and
artificial intelligence based on the idea that systems can learn integration of heterogeneous components. Traditional methods
from data, identify models and making decisions with the for assessing security and human intervention are not sufficient
minimal intervention of a human operator. This method was to protect it.
born out of model recognition and the theory that machines can Cyber-attacks are continually evolving and adapt to new
learn without being programmed to perform specified tasks, energy sector implementations. These can be centralized,
learning only based on data sets. An important feature of the compromising a single device but with cascading effects
method is the iterative aspect because the models are exposed because the system is interconnected and distributed, targeting
to new data sets and it can adapt and learn from previous results multiple devices that can be geographically dispersed and have
to make accurate decisions. Machine learning analyzes data to a wide cascading effect [5].
find patterns, correlations, and anomalies within it.
Neural networks are able to model many nonlinear systems,
Machine learning, the subset of artificial intelligence, is also processing through many neural layers of nonlinear
used in power systems to diagnose malfunctions - recognizing transformations, raw input data to obtain the desired results. At
transient events in nuclear power plants to anticipate failures [8] the same time, due to their adaptability in handling different
- Prognosis of peak loads [9, 10], identification, modeling and types of data, their parallel processing capability allows for
prediction [11], load control [12] and real-time stability analysis increased processing speed and high precision in predicting,
[13] etc .. DNN are suited to real-time applications. Their applicability
Many machine learning algorithms have existed over time, extends to model recognition, classification and recognition of
but the ability to automatically apply complex calculations on anomalies, etc. .
large volumes of data in a fast way is a recent development. In
the study case section, the subject of machine learning is
developed as a solution in the prevention and evaluation of III. CYBERSECURITY CHALLENGES IN THE SMART GRID
cyber-attacks in the electrical networks.
The three main categories of machine learning with the The information and communications domain has already
following algorithms assigned are: structured cyber security policies addressing existing
63
vulnerabilities, analyzed and evaluated in their own data strategies usually imply to minimize the effect of cyber-attacks,
systems; the same vulnerabilities need to be assessed by the because it is a more achievable objective in comparison to
degree and type of impact on the power grid because the completely avoid any type of attack. In reference [17], it is
physical components are directly affected. discussed the impact of cyber-attacks over the stability of the
power grid.
The next generation of cyber security strategies must
maintain a balance between energy and cyber infrastructures.
Specific approaches should be considered because TABLE I SPECIFIC ELEMENTS OF THE COMMUNICATIONS NETWORK AND
inappropriate implementations of cyber security applications POSSIBLE ATTACKS
Availability
(DoS)
preventing anomalies by covering a wider range of scenarios. attacks or
Mechanisms
These mechanisms include distributed
Cyber-attacks can have local or cascading effects at any that ensure the
rules for accessing data, denial of
level of the power system. In a previous article, reference [15], security of the
ensuring their integrity, but service
communication
the different types of attacks on the electricity grid and their network and
also overseeing the smooth
impact on the generation, transport, distribution and deployment of operations
secure
performed using hardware
consumption of electricity are presented. Also, some aspects of interoperability
and software
stability (rotor rotation speed, voltage, frequency stability) are processes
analyzed when the electrical network faces different classes of
cyber-attacks. However, cyber-attacks are continuously Firewall Mechanism for packet
False data
adapting in response to new system developments. services analysis and filtering in the
injection (eg
communications network
imitation
It is necessary to design security strategies by: attacks, SQL
Communication security injection,
• algorithms that consider the real-time attack model and etc.)
Communication means a set of methods that
Integrity
which can filter massive amounts of system data and historical security prevent unauthorized access
communications data from control centers to analyze, monitor, management to network data traffic (eg. Denial of
and counteract any potential intrusion; mechanisms data encryption Service
mechanisms) (DoS)
• algorithms that check the control signals (from automatic attacks or
Mechanisms in the form of distributed
power generation control, voltage control, etc.) if they are Intrusion applications or devices that
authentic or come from another unauthorized source; denial of
Detection monitor the traffic of a service
Mechanisms communications network to
• robust security algorithms that include synergy between identify abnormal activities
cyber-protection and physical protection of the electrical Network Security protocols are those
Side-
network. security processes and methodologies
channels
protocols (eg that ensure secure transfer
Although there are some similarities between an IT network attacks
IPSec, VPN, and unauthorized access to
Confidentiality
and a communications network used in smart grids, they must TLS, etc.) transmitted data
Packet
be “seen” as two different entities. The discrepancies in the Authentication provides itnerception
Authentication
security objectives pursued by each were analyzed in the mechanisms
access to data by authorized attacks
reference [16], and in Table I are presented the elements of the parties
communications network that provide important security Specific data encoding Sniffing,
objectives for an electrical network and possible related attacks. Data encryption mechanisms for access by phishing
authorized parties only attacks etc.
Cybersecurity is an area that recently had machine learning
integrated to increase the efficiency and accuracy of operations, Even though there is a plethora of evolving cyber-attacks, it
but for years it used data science techniques to gather, process must be understood that the power grid has a set of well-defined
and analyze large amounts of data representing historical or objective and that in order to adopt the appropriate security
real-time events over wide periods of time. Existing network measures it is essential to identify the components, the role they
intrusion detection systems detect known threats using rule- play, the information they use, and the means along with what
based or signature-based methods. Machine learning kind of existing attacks could benefit from their vulnerabilities.,
algorithms upon security data can detect or predict potential as some examples are discussed in Table II.
threats with an improved precising over time. Moreover, by
analyzing historical data, the algorithms can identify the most
frequently targeted entry points or components of the power
grid classifying them as “weak-links”. The cyber security
64
TABLE II POINTS OF INTEREST TO CONSIDER IN THE EVALUATION OF CYBER- Machine learning can be used for solving various problem
ATTACKS scenarios regarding the power grid cyber security like:
Points of interest • classification – monitoring the traffic between connected
devices to identify and classify third party access to sensitive
Purpose
Parameter
Protocols
Attacks
Systems
Comm.
data, like control commands or measurements, based on
Level
Action
patterns.
PI controllers in AGC regulate • clustering – based on unsupervised learning because,
generator unit by adjusting the applied by studying the historical data regarding network
input valve to change the communication activity between various connected devices that
turbine’s mechanical power
lead to the occurrence of normal and abnormal behaviors of the
Tie-line power
output to track the electrical
Frequency
physical components and the relationships to each other that
Ethernet and Modbus, HART, PROFIBUS, DeviceNet and IEC61850, DNP 3.0, TCP, UDP, ICMP
load power change and to
The smart grid supports safe and reliable supply of quality, efficient and continuously available electrical energy to consummers
based on data from the possible features. Most of the data is highly redundant and can
SCADA.
be reduced to just the most important features by applying the
It regulates the rotor speed of a
Governor
DoS, Malware, Side channel attack mathematical procedure of dimensionality reduction [18]. This
control
certain frequency electrical can be used as a preliminary phase for data preparation
power to n alternator. preparing before adopting an anomaly detection algorithm by
The AVR maintains generator eliminating variables that have a low correlation gradient with
terminal voltage regulation other values;
Automatic Voltage
Terminal Voltage
communicating with the power • prediction (regression) – requires previous data to identify
plant control center to modify the next values over a predefined time horizon. High-
accordingly the current through dimensional data offers good insights to overcome cyber
the exciter. It controls the
reactive power and voltage
problems. In the next section, a case scenario is provided to
magnitude in the system. identify abnormal behavior of a microgrid model.
SE describes the flow of power
Load Redistribution attacks, Malware DoS, False data injection, Malware, Timing-based
using provided measurements motivation that attacks are more pervasive and diverse and
attack, Protocol Attacks, eavesdropping
from measurement devices, should be viewed not only from the point of view of their local
status
PMUs, to assure estimates of impact of the target in the power system, but rather from the
state variables: voltage perspective that different types of distributed attacks for
magnitude, bus phase angle, to injecting or modifying critical system information can have an
Transmission
balance of supply-demand and development of the DNN and power grid model was made
under certain conditions though in MATLAB/Simulink environment.
switching.off.power.to specific
areas or large consumers. The power grid is a non-linear system best approximated by
Is a network that enables an LTI system of ܴ߳ݑ input control signals and ܴ߳ݕ output
Consumption
in case of faults.
65
ݔሶ ሺݐሻ ൌ ݔܣሺݐሻ ܤሺݑሺݐሻ ݑ ሺݐሻሻ ܲሺݐሻ݀ሺݐሻ ܿሺݐሻ The premise used in the case scenario is that the power grid
ቊ system often has a predictable behavior which can be observed
ݕ ሺݐሻ ൌ ܥ ݔሺݐሻ ݒ ሺݐሻ
(1) and identified though patterns over large periods of time.
Based on these premises, the best possible fit for the
Where אଷ୬ౝ ୶ଷ୬ౝ , אଷ୬ౝ ୶ଷ୬ౝ , א୯୶ଷ୬ౝ , א
ଷ୬ౝ ୶୫మ machine learning algorithm is the supervised learning, deep
(the disturbances against the actuator matrix), C neural networks. The main objective when choosing an
denotes the output matrix, q is the number of buses where algorithm is to obtain results, understand them and use, later,
measuring units are installed, 3 represent the states of the sophisticated methods to improve their precision. Using thr
generators (rotor angles, rotor speeds, voltages), ଵ known grid nonlinear autoregressive neural network with closed loop
inputs (mechanical input power and field voltage), ଶ because it supports dynamic inputs without the need for prior
unknown grid inputs and q output measurements.ݒ୯ ሺሻ is the knowledge of the process; this is used as a network security
potential vector against the measured output of the system and strategy described by the non-linear function [19, 20]. Another
sent to the control centers. reason for choosing artificial neural networks is their resistance
to erroneous / redundant data and the ability to classify data in
The cyber-attack can occur in altering the command
classes without previous training [5].
between the control center and the controlled process as a vector
࢛ ሺ࢚ሻ introduced by a type of false data injection attack, The NAR model used has a 12-layer network with the
altering the command: (ݑሺݐሻ+ݑ ሺݐሻ). Levenberg-Marquardt training function. This network has been
trained in MATLAB for 500 epochs and a training goal with an
The chosen grid model is regarded to the equivalent of a error of less than 0.001.
multi-machine model with synchronous generators, power lines
and an uncontrollable load, model in a precious article from The extracted input data (from the simulated power grid
reference [19], as the benchmark model, IEEE-9 bus. model, equation 1 and reference [5]) for learning and testing
represents two system states: normal behavior data and attacked
Choosing the machine learning algorithm proves to be a behavior data. Once the network is trained, it is given a set of
challenge due to the fact that it is not always possible to know data for a given behavior (attacked or normal) to identify the
beforehand which is the best fit. For this case, of a power grid classification with the trained parameters. The training step is
model, the following aspects are identified to ease this process: performed off-line as the training is time and memory
• type, size, quality of data; consuming. In figure 3, the normal grid behavior is represented
by the blue color, followed by the predicted normal behavior in
• desired outcome; magenta color given by the DNN algorithm after the training
phase (the training was done also with abnormal behavior). In
• training time or computational time; green, it is represented the behavior carrying cyber
• desired accuracy of the result. disturbances.
As a complex, interconnected, continuously growing
system, the power grid has huge volumes of data coming from
measuring units do describe the state of the system. Any critical
anomaly can influence the whole system behavior. Data can be
redundant and must be cleansed and prepared before using it as
a dataset to the desire machine algorithm.
Having a set of examples, the objective is to set the outline
of what a normal behavior is. This was done though selecting a
set of clean data, representing power grid model under normal
operating conditions, as illustrated in figure 2. Fig. 3. Normal behavior attacked behavior and predicted behavior of the power
grid model
66
As one can observe, through a first attempt into applying [5]. D.I. Dogaru, I. Dumitrache – “Cyber Attacks of a Power Grid Analysis
machine learning over a set of modelled data reflecting the Using a Deep Neural Network Approach”, Journal of Control Engineering
and Applied Informatics, Martie, 2019
power grid behavior, the results are promising, and it is [6]. D. Sullivan - “Introduction to big data security analytics în the enterprise”,
necessary to state that an algorithm usually requires fine tuning Tech Target, 2015
and extensive training with large datasets to obtain its best [7]. P. Wood – “How to tackle big data from a security point of view”,
performance index. Computer Weekly, 2013
[8]. Y.D. Lukic, C.R. Stevens - “Application of A Real-Time Artificial Neural
Network for Classifying Nuclear Power Plant TransientEvents Neural
Network Computing for the Electric Power Industry: Proceedings of the
V. CONCLUSIONS 1992 INNS Summer Workshop, Editor Dejan J. Sobajic, Lawrance
Erlbaum Associates, Publishers, Hillsdale, N.J., pp. 59-62, 1993.
[9]. A. J. Germond, et al., - “Application of Artificial Neural Networks to
Load Forecasting”, Neural Network Computing for the Electric Power
Smart Grids, which integrates the two infrastructures, Industry: Proceedings of the 1992 INNSSummer Workshop, pp. 165-171,
electricity networks and ICT (information and 1992.
communications), have real-time, bidirectional, high-speed, [10]. M. Khadem, E. Dobrowolski – “Short-term Electric Load Forecasting
high-speed communication networks, intelligent measurement Using Neural Networks”, Neural Network Computing for the Electric
and control devices, etc.. Thus, the new power grids become Power Industry: Proceedings of the 1992 INNSSummer Workshop,
pp.173-178, 1992.
vulnerable to both classical natural phenomena (lightning, [11]. T. Samad – “Modeling and Identification with Neural Networks”, Neural
wind, ice, etc.) as well as human cyber-attacks. Network Computing For the Electric Power Industry: Proceedings Of The
1992 INNS Summer Workshop, pp.129-134, 1992.
The emergence and application of the concept of Cyber- [12]. D. Novosel, R.L. King – “Intelligent Load Shedding”, Neural Network
Physical Systems (CPS), practically in all socio-economic Computing for the Electric Power Industry: Proceedings of the 1992
sectors, has led to the review of strategies for the development INNS Summer Workshop, pp.107-110, 1992.
of new smart grids. [13]. D.J. Sobajic – “Neural Network Computing for the Electric Power
Industry - Proceedings of the 1992 Inns Summer Workshop”, Psychology
Machine learning and Artificial intelligence techniques Press, pp.117-120, 2013.
along with IoT and BD are important factors in developing [14]. E.T. Swain et. al. – “The Application of Neural Networks to Electric
cyber security strategies that allow risk assessment and real- Power Grid Simulation”, ICANN 2006: Artificial Neural Networks, pp
736-745, 2006.
time decision making. The challenge that ML in cybersecurity [15]. D.I. Dogaru, I. Dumitrache – “Some Aspects of Power Grid Stability în
faces is the need for high volumes of data being fed to the the Context of Cyber Attacks”, International Workshop on Cyber Physical
techniques used over large periods of time to achieve the ability Systems – IWoCPS, 2017.
of anomaly and cyber threat identification by establishing first [16]. I. Dumitrache, D.I. Dogaru – “Smart Grid Overview: Infrastructure,
a baseline of what is a normal behavior. Also, time is of the Cyber–Physical Security and Challenges”, International Conference on
utmost importance in a domain characterize by continuous real- Control Systems and Computer Science (CSCS), IEEE, 2015.
[17]. D.I. Dogaru, I. Dumitrache – “Robustness of Power Systems în the
time operations, like the power grid, making machine learning Context of Cyber Attacks”, International Conference on Control Systems
architecture in cybersecurity complex and somewhat time- and Computer Science (CSCS) 2017.
consuming for increased performance and precision. [18]. A. Polyakov – “Machine Learning for Cybersecurity 101”, Towards Data
Science, 2018
Moreover, another challenge lies in the setting the correct [19]. D.I Dogaru, I. Dumitrache – “Modelling the dynamic electrical system în
parameters for the threshold between normal behavior and the context of cyber attacks”, Universitatea Politehnica Bucuresti,
abnormal. Scientific Bulletin, Seria C: Inginerie Electrică ܈i ùtiinĠa Calculatoarelor,
2018.
In conclusion, we can state that cyber-attacks within smart [20]. N.V. Tomin et al. – “Machine Learning Techniques for Power System
grids contribute greatly to increasing their fragility and that Security Assessment”, IFAC Workshop on Control of Transmission and
protection measures have to evolve in correlation with the Distribution Smart Grids CTDSG 2016: Prague, Czech Republic, Volume
49, Issue 27, Pages 445-450, 2016. Disponibil:
evolution and complexity of these networks, and it is still https://www.sciencedirect.com/science/article/pii/S2405896316324028
necessary from the design phase to include adaptive measures
with pronounced predictor character.
REFERENCES
67