The tupel model of basic components' set formation for cyberattacks | IEEE Conference Publication | IEEE Xplore