Method for Synthesising Resilient Architectures of Virtual and Augmented Reality Systems

Authors

DOI:

https://doi.org/10.32515/2664-262X.2026.13(44).59-72

Keywords:

virtual reality (VR), resilience, VR architecture, fault tolerance, error mitigation, system reliability

Abstract

The article considers the problem of ensuring the stability of augmented (AR) and virtual (VR) reality systems, which are characterized by high sensitivity to performance violations and hardware and software failures. Most existing approaches focus on the analysis of fixed architectures, leaving open the issue of automated synthesis of systems that are stable by design.

A new method for analytical synthesis of AR/VR architectures is proposed, which is based on a formal model that links a 20-dimensional vector of mitigation parameters with seven key stability metrics: reliability, availability, fault tolerance, integrity, recovery time, performance stability, and user safety. The design problem is formulated as a multi-criteria optimization problem, for the solution of which a genetic algorithm is used.

Experimental validation conducted in the Simulink environment confirmed the effectiveness of the method. The results showed that the synthesized architecture provides an improvement in the overall resilience index by 19.4% compared to the base configuration under strict operational constraints. In particular, a significant increase in the availability indicators (+82.2%) and recovery time (+39.9%) was achieved. The proposed approach allows for quantitative assessment and optimization of architectural solutions at the design stage.

Author Biographies

Sergii Lysenko , Khmelnytskyi National University, Khmelnytskyi, Ukraine

Professor, Doctor of Technical Sciences, Professor of Computer Engineering and Information Systems Department

Artem Kachur, Khmelnytskyi National University, Khmelnytskyi, Ukraine

PhD student in Computer Engineering

Liudmyla Koretska , Khmelnytskyi National University, Khmelnytskyi, Ukraine

– Associate Professor, PhD in technical sciences, Associate Professor of Computer Engineering and Information Systems Department

References

Список літератури

1. Resilience engineering. *Wikipedia*. URL: [https://en.wikipedia.org/wiki/Resilience_engineering]

(https://en.wikipedia.org/wiki/Resilience_engineering) (дата звернення: 13.02.2026).

2. System Resilience. *SEBoK Wiki*. URL: [https://sebokwiki.org/wiki/System_Resilience] (https://sebokwiki.org/wiki/System_Resilience) (дата звернення: 13.02.2026).

3. The k-out-of-n System Model. *Wiley*. URL: [https://catalogimages.wiley.com/images/db/

pdf/047139761X.07.pdf](https://catalogimages.wiley.com/images/db/pdf/047139761X.07.pdf) (дата звернення: 13.02.2026).

4. RBDs and Analytical System Reliability. *ReliaSoft*. URL: [https://help.reliasoft.com/reference/ system_analysis/sa/rbds_and_analytical_system_reliability.html](https://help.reliasoft.com/reference/system_analysis/sa/rbds_and_analytical_system_reliability.html) (дата звернення: 13.02.2026).

5. Reliability analysis of a k-out-of-n:F system under a linear model. Ann. Inst. Stat. Math. URL: [https://www.ism.ac.jp/editsec/aism/71/0537.pdf](https://www.ism.ac.jp/editsec/aism/71/0537.pdf) (дата звернення: 13.02.2026).

6. Availability. *Wikipedia*. URL: [https://en.wikipedia.org/wiki/Availability] (https://en.wikipedia.org/wiki/Availability) (дата звернення: 13.02.2026).

7. k-out-of-n Systems. *ReliaSoft*. URL: [https://help.reliasoft.com/articles/content/reference_examples/

blocksim/k-out-of-n_systems.html](https://help.reliasoft.com/articles/content/reference_examples/

blocksim/k-out-of-n_systems.html) (дата звернення: 13.02.2026).

8. Multi-Blockchain-Based IoT Data Processing Techniques for Big Data Integrity Verification. *Sensors*. 2021. Vol. 21, no. 10. Art. no. 3515. URL: [https://www.mdpi.com/1424-8220/21/10/3515](https://www.mdpi.com/1424-8220/21/10/3515) (дата звернення: 13.02.2026).

9. Recovery Time Objective (RTO). *NIST CSRC*. URL: [https://csrc.nist.gov/glossary/term/recovery_time_objective](https://csrc.nist.gov/glossary/term/recovery_time_objective) (дата звернення: 13.02.2026).

10. Mean time to recovery. *Wikipedia*. URL: [https://en.wikipedia.org/wiki/Mean_time_to_recovery](https://en.wikipedia.org/wiki/Mean_time_to_recovery) (дата звернення: 13.02.2026).

11. Measuring System Visual Latency through Cognitive Tests. *Proc. IEEE VR 2020*. URL: [https://www.microsoft.com/en-us/research/wp-content/uploads/2020/01/ieee_vr_2020___latency.pdf](https://www.microsoft.com/en-us/research/wp-content/uploads/2020/01/ieee_vr_2020___latency.pdf) (дата звернення: 13.02.2026).

12. Measuring motion-to-photon latency for sensorimotor experiments with VR. *PLOS ONE*. 2022. URL: [https://pmc.ncbi.nlm.nih.gov/articles/PMC10616216/](https://pmc.ncbi.nlm.nih.gov/articles/PMC10616216/) (дата звернення: 13.02.2026).

13. Investigating guardian awareness techniques to promote VR user safety. *SMU*. URL: [https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=9024&context=sis_research](https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=9024&context=sis_research) (дата звернення: 13.02.2026).

14. Exploring Metaphorical Transformations of a Safety Boundary Wall for VR. *Applied Sciences*. URL: [https://pmc.ncbi.nlm.nih.gov/articles/PMC11125283/](https://pmc.ncbi.nlm.nih.gov/articles/PMC11125283/) (дата звернення: 13.02.2026).

15. Communication, Computing and Caching for Mobile VR Delivery: Modeling and Trade-off / Sun Y. et al. *arXiv preprint arXiv:1804.10335*. 2018. URL: [https://arxiv.org/abs/1804.10335](https://arxiv.org/abs/1804.10335) (дата звернення: 13.02.2026).

16. Zhang X., Xia Y., Ali M. A Smartphone Thermal Temperature Analysis for Virtual and Augmented Reality : National Science Foundation Technical Report. 2020. URL: [https://par.nsf.gov/servlets/purl/10219090](https://par.nsf.gov/servlets/purl/10219090) (дата звернення: 13.02.2026).

17. Distributed On-Sensor Compute System for AR/VR Devices: A Semi-Analytical Simulation Framework for Power Estimation / Gomez J. et al. *arXiv preprint arXiv:2203.07474*. 2022. URL: [https://arxiv.org/abs/2203.07474](https://arxiv.org/abs/2203.07474) (дата звернення: 13.02.2026).

18. Augmented Reality and Virtual Reality Displays: Emerging Technologies and Future Perspectives / Xiong J. et al. *Light: Science & Applications*. 2021. Vol. 10, no. 1. Art. no. 215. URL: [https://www.nature.com/articles/s41377-021-00658-8](https://www.nature.com/articles/s41377-021-00658-8) (дата звернення: 13.02.2026).

19. Hazarika A. Towards an Evolved Immersive Experience: Exploring 5G. *Sensors*. 2023. Vol. 23, no. 7. P. 3682. URL: [https://www.mdpi.com/1424-8220/23/7/3682](https://www.mdpi.com/1424-8220/23/7/3682) (дата звернення: 13.02.2026).

20. Transparent Fault Tolerance for Stateful Applications in Kubernetes with Checkpoint/Restore / Foerster K. T. et al. *Proc. IEEE SRDS 2023*. URL: [https://ktfoerster.github.io/paper/2023-srds.pdf](https://ktfoerster.github.io/paper/2023-srds.pdf) (дата звернення: 13.02.2026).

21. Zhao B., Guo S., Liu X. A Multipath Scheduler Based on Cross-Layer Information for Cloud VR in 5G Edge Networks. *Computer Networks*. 2024. Vol. 244. P. 110333. DOI: [https://doi.org/10.1016/j.comnet.2024.110333](https://doi.org/10.1016/j.comnet.2024.110333).

22. Kelkkanen V. Evaluation and Reduction of Temporal Issues in Remote VR : Master’s Thesis / Univ. of Oulu. Oulu, Finland, 2023. URL: [https://www.diva-portal.org/smash/get/diva2:1744902/FULLTEXT02.pdf](https://www.diva-portal.org/smash/get/diva2:1744902/FULLTEXT02.pdf) (дата звернення: 13.02.2026).

23. Feeling of Presence Maximization: mmWave-Enabled Virtual Reality Meets Deep Reinforcement Learning / Yang P. et al. *arXiv preprint arXiv:2107.01001*. 2021. URL: [https://arxiv.org/abs/2107.01001](https://arxiv.org/abs/2107.01001) (дата звернення: 13.02.2026).

24. Exploring Metaphorical Transformations of a Safety Boundary Wall for VR / Qin H. et al. *Applied Sciences*. 2024. Vol. 14, no. 6. Art. no. 2520. URL: [https://pmc.ncbi.nlm.nih.gov/articles/PMC11125283](https://pmc.ncbi.nlm.nih.gov/articles/PMC11125283) (дата звернення: 13.02.2026).

25. Recent Advances in Wearable Thermal Devices for Virtual and Augmented Reality / Park M. et al. *Micromachines*. 2025. Vol. 16, no. 3. Art. no. 338. URL: [https://pmc.ncbi.nlm.nih.gov/articles/PMC12029164](https://pmc.ncbi.nlm.nih.gov/articles/PMC12029164) (дата звернення: 13.02.2026).

26. Weech S., Kenny S., Barnett-Cowan M. Presence and Cybersickness in Virtual Reality Are Negatively Related: A Review. *Frontiers in Psychology*. 2019. Vol. 10. P. 158. URL: [https://www.frontiersin.org/articles/10.3389/fpsyg.2019.00158/full](https://www.frontiersin.org/articles/10.3389/fpsyg.2019.00158/full) (дата звернення: 13.02.2026).

27. Lysenko S., Kachur A. A Resilience Assurance Process Model for Enhancing Virtual Reality Architectural Design. *Proc. 14th Int. Conf. on Dependable Systems, Services and Technologies (DESSERT)*. Athens, Greece, 2024. P. 1–9. DOI: [https://doi.org/10.1109/DESSERT65323.2024.11122129](https://doi.org/10.1109/DESSERT65323.2024.11122129).

28. A Technique for Detection of Bots which are Using Polymorphic Code / Pomorova O. et al. *Communications in Computer and Information Science*. 2014. Vol. 431. P. 265–276.

29. Botnet Detection Technique for Corporate Area Network / Savenko O. et al. *Proc. 7th IEEE Int. Conf. on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS 2013)*. Berlin, Germany, 2013. P. 363–368.

30. Method and Rules for Determining the Next Centralization Option in Multicomputer System Architecture / Kashtalian A. et al. *International Journal of Computing*. 2025. Vol. 24, no. 1. P. 35–51. DOI: 10.47839/ijc.24.1.3875.

31. Evaluation Criteria of Centralization Options in the Architecture of Multicomputer Systems with Traps and Baits / Kashtalian A. et al. *Radioelectronic and Computer Systems*. 2025. No. 1. P. 264–297. DOI: 10.32020/reks.2025.1.18.

32. Multi-Computer Malware Detection Systems with Metamorphic Functionality / Kashtalian A. et al. *Radioelectronic and Computer Systems*. 2024. No. 1. P. 152–175. DOI: 10.32020/reks.2024.1.13.

33. A Botnet Detection Approach Based on the Clonal Selection Algorithm / Lysenko S. et al. *Proc. 2018 IEEE 9th Int. Conf. on Dependable Systems, Services and Technologies (DeSSerT 2018)*. Kyiv, Ukraine, 2018. P. 424–428.

34. A Technique for the Botnet Detection Based on DNS-Traffic Analysis / Pomorova O. et al. *Proc. 22nd Int. Conf. Computer Networks (CN 2015)*. Brunów, Poland, 2015. Vol. 522. P. 127–138.

35. UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and User Perception / Di Geronimo L. et al. *Proc. CHI*. 2020. P. 1–14. DOI: 10.1145/3313831.3376600.

36. Alshehri A., Alrehili K., Alhumaid F., Alessa A. Exploring the Privacy Concerns of Bystanders in Smart Homes. *Proc. Priv. Enhancing Technol. (PoPETs)*. 2022. Vol. 2022, no. 4. P. 253–270. DOI: 10.56553/popets-2022-0064.

37. Lin H., Bergmann N. W. IoT Privacy and Security Challenges for Smart Home Environments. *Information*. 2016. Vol. 7, no. 3. Art. 44. DOI: 10.3390/info7030044.

38. Wang Q., Cai Z., Li R., Fang X. A Comprehensive Survey on Local Differential Privacy toward Data Statistics and Analysis. *Sensors*. 2020. Vol. 20, no. 24. Art. 7030. DOI: 10.3390/s20247030.

39. Yao Y., Zimmermann T., Chin A., Schaub F. Privacy Perceptions and Designs of Bystanders in Smart Homes. *Proc. ACM Hum.–Comput. Interact. (CSCW)*. 2019. Vol. 3, no. CSCW. P. 1–24. DOI: 10.1145/3359161.

40. Bystander Privacy in Smart Homes: A Systematic Review of Concerns and Solutions / Saqib E. et al. *ACM Trans. Comput.–Hum. Interact. (TOCHI)*. 2025. P. 1–?. DOI: 10.1145/3731755.

41. Marky K., Prange S., Krell F., Mühlhäuser M., Alt F. ‘You Just Can’t Know About Everything’: Privacy Perceptions of Smart Home Visitors. *Proc. MUM*. 2020. P. 1–13. DOI: 10.1145/3428361.3428464.

42. Android Permissions: User Attention, Comprehension, and Behavior / Felt A. P. et al. *Proc. SOUPS@CHI*. 2012. P. 3–14. DOI: 10.1145/2335356.2335360.

43. Zimmermann V., Gerber P., Marky K., Böck L., Kirchbuchner F. Assessing Users’ Privacy and Security Concerns of Smart Home Technologies. *i-com*. 2019. Vol. 18, no. 3. P. 197–216. DOI: 10.1515/icom-2019-0015.

44. Alshamsi O., Shaalan K., Butt U. Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach. *Information*. 2024. Vol. 15, no. 10. Art. 631. DOI: 10.3390/info15100631.

45. Ogonji M. M., Okeyo G., Wafula J. M. A Survey on Privacy and Security of Internet of Things. *Computer Science Review*. 2020. Vol. 38. Art. 100312. DOI: 10.1016/j.cosrev.2020.100312.

References

1. Resilience engineering," Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/Resilience_engineering

2. "System Resilience," SEBoK Wiki. [Online]. Available: https://sebokwiki.org/wiki/System_Resilience

3. "The k-out-of-n System Model," Wiley. [Online]. Available: https://catalogimages.wiley.com/images/db/pdf/047139761X.07.pdf

4. "RBDs and Analytical System Reliability," ReliaSoft. [Online]. Available: https://help.reliasoft.com/reference/system_analysis/sa/rbds_and_analytical_system_reliability.html

5. "Reliability analysis of a k-out-of-n:F system under a linear model," Ann. Inst. Stat. Math. [Online]. Available: https://www.ism.ac.jp/editsec/aism/71/0537.pdf

6. "Availability," Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/Availability

7. "k-out-of-n Systems," ReliaSoft. [Online]. Available: https://help.reliasoft.com/articles/content/reference_examples/blocksim/k-out-of-n_systems.html

8. "Multi-Blockchain-Based IoT Data Processing Techniques for Big Data Integrity Verification," Sensors, vol. 21, no. 10, 2021, Art. no. 3515. [Online]. Available: https://www.mdpi.com/1424-8220/21/10/3515

9. "Recovery Time Objective (RTO)," NIST CSRC. [Online]. Available: https://csrc.nist.gov/glossary/term/recovery_time_objective

10. ["Mean time to recovery," Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/Mean_time_to_recovery

11. "Measuring System Visual Latency through Cognitive Tests," in Proc. IEEE VR 2020. [Online]. Available: https://www.microsoft.com/en-us/research/wp-content/uploads/2020/01/ieee_vr_2020___latency.pdf

12. "Measuring motion-to-photon latency for sensorimotor experiments with VR," PLOS ONE, 2022. [Online]. Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC10616216/

13. "Investigating guardian awareness techniques to promote VR user safety," SMU. [Online]. Available: https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=9024&context=sis_research

14. "Exploring Metaphorical Transformations of a Safety Boundary Wall for VR," Applied Sciences. [Online]. Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC11125283/

15. Y. Sun, Z. Jiang, C. Xu, S. Zhou, and Z. Niu, “Communication, Computing and Caching for Mobile VR Delivery: Modeling and Trade-off,” arXiv preprint arXiv:1804.10335, 2018. [Online]. Available: https://arxiv.org/abs/1804.10335

16. X. Zhang, Y. Xia, and M. Ali, “A Smartphone Thermal Temperature Analysis for Virtual and Augmented Reality,” National Science Foundation Technical Report, 2020. [Online]. Available: https://par.nsf.gov/servlets/purl/10219090

17. J. Gomez, S. Raghunathan, and K. Chowdhury, “Distributed On-Sensor Compute System for AR/VR Devices: A Semi-Analytical Simulation Framework for Power Estimation,” arXiv preprint arXiv:2203.07474, 2022. [Online]. Available: https://arxiv.org/abs/2203.07474

18. J. Xiong, Y. Li, K. Liu, X. Liu, and Z. Liu, “Augmented Reality and Virtual Reality Displays: Emerging Technologies and Future Perspectives,” Light: Science & Applications, vol. 10, no. 1, 2021, Art. no. 215. [Online]. Available: https://www.nature.com/articles/s41377-021-00658-8

19. A. Hazarika, “Towards an Evolved Immersive Experience: Exploring 5G,” Sensors, vol. 23, no. 7, p. 3682, 2023. [Online]. Available: https://www.mdpi.com/1424-8220/23/7/3682

20. K. T. Foerster, H. Schmidt, and D. P. van der Meer, “Transparent Fault Tolerance for Stateful Applications in Kubernetes with Checkpoint/Restore,” in Proc. IEEE SRDS 2023. [Online]. Available: https://ktfoerster.github.io/paper/2023-srds.pdf

21. B. Zhao, S. Guo, and X. Liu, “A Multipath Scheduler Based on Cross-Layer Information for Cloud VR in 5G Edge Networks,” Computer Networks, vol. 244, p. 110333, 2024. [Online]. Available: https://doi.org/10.1016/j.comnet.2024.110333

22. V. Kelkkanen, “Evaluation and Reduction of Temporal Issues in Remote VR,” Master’s Thesis, Univ. of Oulu, Oulu, Finland, 2023. [Online]. Available: https://www.diva-portal.org/smash/get/diva2:1744902/FULLTEXT02.pdf

23. P. Yang, Y. Zhao, J. Wu, and J. Zhang, “Feeling of Presence Maximization: mmWave-Enabled Virtual Reality Meets Deep Reinforcement Learning,” arXiv preprint arXiv:2107.01001, 2021. [Online]. Available: https://arxiv.org/abs/2107.01001

24. H. Qin, Z. Sun, S. Yao, and C. Zhang, “Exploring Metaphorical Transformations of a Safety Boundary Wall for VR,” Applied Sciences, vol. 14, no. 6, 2024, Art. no. 2520. [Online]. Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC11125283

25. M. Park, J. Kim, and D. Kang, “Recent Advances in Wearable Thermal Devices for Virtual and Augmented Reality,” Micromachines, vol. 16, no. 3, 2025, Art. no. 338. [Online]. Available: https://pmc.ncbi.nlm.nih.gov/articles/PMC12029164

26. S. Weech, S. Kenny, and M. Barnett-Cowan, “Presence and Cybersickness in Virtual Reality Are Negatively Related: A Review,” Frontiers in Psychology, vol. 10, p. 158, 2019. [Online]. Available: https://www.frontiersin.org/articles/10.3389/fpsyg.2019.00158/full

27. S. Lysenko and A. Kachur, “A Resilience Assurance Process Model for Enhancing Virtual Reality Architectural Design,” Proc. 14th Int. Conf. on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece, 2024, pp. 1–9. doi: https://doi.org/10.1109/DESSERT65323.2024.11122129

28. [O. Pomorova, O. Savenko, S. Lysenko, A. Kryshchuk, and A. Nicheporuk, “A Technique for Detection of Bots which are Using Polymorphic Code,” Communications in Computer and Information Science, vol. 431, pp. 265–276, 2014. ISSN 1865-0929.

29. O. Savenko, S. Lysenko, A. Kryshchuk, and Y. Klots, “Botnet Detection Technique for Corporate Area Network,” in Proc. 7th IEEE Int. Conf. on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS 2013), Berlin, Germany, Sept. 12–14, 2013, pp. 363–368. ISBN 978-1-4799-1426-5.

30. A. Kashtalian, S. Lysenko, T. Kysil, A. Sachenko, O. Savenko, and B. Savenko, “Method and Rules for Determining the Next Centralization Option in Multicomputer System Architecture,” International Journal of Computing, vol. 24, no. 1, pp. 35–51, 2025. doi: 10.47839/ijc.24.1.3875.

31. A. Kashtalian, S. Lysenko, A. Sachenko, B. Savenko, O. Savenko, and A. Nicheporuk, “Evaluation Criteria of Centralization Options in the Architecture of Multicomputer Systems with Traps and Baits,” Radioelectronic and Computer Systems, no. 1, pp. 264–297, 2025. doi: 10.32620/reks.2025.1.18.

32. A. Kashtalian, S. Lysenko, O. Savenko, A. Nicheporuk, T. Sochor, and V. Avsiyevych, “Multi-Computer Malware Detection Systems with Metamorphic Functionality,” Radioelectronic and Computer Systems, no. 1, pp. 152–175, 2024. doi: 10.32620/reks.2024.1.13.

33. [S. Lysenko, K. Bobrovnikova, and O. Savenko, “A Botnet Detection Approach Based on the Clonal Selection Algorithm,” in Proc. 2018 IEEE 9th Int. Conf. on Dependable Systems, Services and Technologies (DeSSerT 2018), Kyiv, Ukraine, May 24–27, 2018, pp. 424–428.

34. O. Pomorova, O. Savenko, S. Lysenko, A. Kryshchuk, and K. Bobrovnikova, “A Technique for the Botnet Detection Based on DNS-Traffic Analysis,” in Proc. 22nd Int. Conf. Computer Networks (CN 2015), Brunów, Poland, June 16–19, 2015, vol. 522, pp. 127–138.

35. L. Di Geronimo, L. Braz, E. Fregnan, F. Palomba, and A. Bacchelli, “UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and User Perception,” in Proc. CHI, 2020, pp. 1–14. doi: 10.1145/3313831.3376600.

36. A. Alshehri, K. Alrehili, F. Alhumaid, and A. Alessa, “Exploring the Privacy Concerns of Bystanders in Smart Homes,” Proc. Priv. Enhancing Technol. (PoPETs), vol. 2022, no. 4, pp. 253–270, 2022. doi: 10.56553/popets-2022-0064. (Open PDF available.)

37. H. Lin and N. W. Bergmann, “IoT Privacy and Security Challenges for Smart Home Environments,” Information, vol. 7, no. 3, art. 44, 2016. doi: 10.3390/info7030044.

38. Q. Wang, Z. Cai, R. Li, and X. Fang, “A Comprehensive Survey on Local Differential Privacy toward Data Statistics and Analysis,” Sensors, vol. 20, no. 24, art. 7030, 2020. doi: 10.3390/s20247030.

39. Y. Yao, T. Zimmermann, A. Chin, and F. Schaub, “Privacy Perceptions and Designs of Bystanders in Smart Homes,” Proc. ACM Hum.–Comput. Interact. (CSCW), vol. 3, no. CSCW, pp. 1–24, 2019. doi: 10.1145/3359161.

40. E. Saqib, S. He, J. Choy, R. Abu-Salma, J. Such, J. Bernd, and M. Javed, “Bystander Privacy in Smart Homes: A Systematic Review of Concerns and Solutions,” ACM Trans. Comput.–Hum. Interact. (TOCHI), pp. 1–?, 2025. doi: 10.1145/3731755.

41. K. Marky, S. Prange, F. Krell, M. Mühlhäuser, and F. Alt, “‘You Just Can’t Know About Everything’: Privacy Perceptions of Smart Home Visitors,” in Proc. MUM, 2020, pp. 1–13. doi: 10.1145/3428361.3428464. (Open PDF available.)

42. A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, “Android Permissions: User Attention, Comprehension, and Behavior,” in Proc. SOUPS@CHI, 2012, pp. 3–14. doi: 10.1145/2335356.2335360.

43. V. Zimmermann, P. Gerber, K. Marky, L. Böck, and F. Kirchbuchner, “Assessing Users’ Privacy and Security Concerns of Smart Home Technologies,” i-com, vol. 18, no. 3, pp. 197–216, 2019. doi: 10.1515/icom-2019-0015.

44. O. Alshamsi, K. Shaalan, and U. Butt, “Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach,” Information, vol. 15, no. 10, art. 631, 2024. doi: 10.3390/info15100631.

45. M. M. Ogonji, G. Okeyo, and J. M. Wafula, “A Survey on Privacy and Security of Internet of Things,” Computer Science Review, vol. 38, art. 100312, 2020. doi: 10.1016/j.cosrev.2020.100312.

Published

2026-03-27

How to Cite

Lysenko, S., Kachur, A., & Koretska , L. (2026). Method for Synthesising Resilient Architectures of Virtual and Augmented Reality Systems. Central Ukrainian Scientific Bulletin. Technical Sciences, (13(44), 59–72. https://doi.org/10.32515/2664-262X.2026.13(44).59-72