<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Methodology of Rational Choice of Security Incident Management System for Building Operational Security Center</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Special Communications and Information Protection of the National Technical University of Ukraine "Igor Sikorsky Kiev Polytechnic Institute"</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>This article discusses the purpose, tasks and composition of the Operational Security Center (SOC). The basic technological tools which should include modern effective SOC are indicated. The focus is on the key role of the Information Security Incident Management System (SIEM) in the SOC. The purpose of SIEM and the main tasks that it should solve are reviewed. The peculiarities of solving the problem of choosing of SIEM are analyzed. The groups of indicators that characterize the degree of fulfillment of the requirements to SIEM are highlighted. The application of fuzzy set theory for processing expert information on qualitative indicators characterizing SIEM is proposed. The formulation of the SIEM selection problem is done and the main stages of its solution are proposed: preparation of initial data; choosing the method of solving the multicriteria problem; algorithm development. The method of normalization of SIEM quantitative indicators and the method of paired comparison based on the rank estimates for processing of SIEM qualitative indicators are proposed. It is proposed to use the 9-point Saaty scale to derive functions of SIEM qualitative values based on the processing of expert assessments. The algorithm of the considered method is implemented. Methods for solving multicriteria problems are analyzed and the use of a lexographic method is proposed for solving the SIEM solution for the Security Center (SOC). An algorithm for its implementation has been developed. To illustrate the operation of the proposed algorithm, we give an example of how to apply it to choose a rational SIEM option. Recommendations for application of the results obtained are offered.</p>
      </abstract>
      <kwd-group>
        <kwd>cybersecurity</kwd>
        <kwd>Information Security Incident Management System</kwd>
        <kwd>Operational Security Center</kwd>
        <kwd>lexographic method</kwd>
        <kwd>fuzzy sets theory</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>It is impossible to counteract the modern cyber threats without the use of modern
cybersecurity technologies that enable monitoring, collection, collation and processing
of information in order to identify existing and predict future threats. Important role is
given to the special units that deal with information and cyber security issues at the
organizational and technical level – the Security Operation Centers (SOC).</p>
      <p>Modern SOC solves the following tasks [1]:
taking immediate actions to protect against cyberattacks and minimize their
damage;</p>
      <p>identification of system security vulnerabilities and taking actions to eliminate
them;
centralized security management of various devices in the system;
continuous monitoring of system threats status;
technical support for cyber security of the system and others.</p>
      <p>Structurally, the SOC has three main components: personnel – skilled
professionals using modern cybersecurity technologies with teamwork and management
competencies; processes – business processes, technological processes, operational and
analytical processes; technologies – tools for detecting, counteracting and preventing
cyber threats.</p>
      <p>Effective SOC should include the following modern technological tools to
ensure cyber security [2]: Next Generation Firewall, Intrusion Prevention System (IPS),
Web Application Firewall (WAF), Database Protection, Email Security, Endpoint
Detection and Response, Vulnerability Scanners, Data Loss Prevention, Forensics,
Network Access Control and others.</p>
      <p>However, the basis for building an effective SOC is the use of the SIEM system
(Security Information and Event Management) – a system for managing information
and security events. The use of SIEM in protection system enables proactive
management of cyber incidents. That is, to predict future events that will occur in the system
by applying automated mechanisms that use information about events that have already
occurred in the system, as well as to adapt the protection settings of the system to its
current state, thereby implementing preventive measures even before the situation in
the system becomes critical [2]. In accordance with this, SIEM system should solve a
range of tasks which include [3]:</p>
      <p>collection, processing and analysis of security events coming from a variety of
heterogeneous distributed sources;
detection of real-time or close cyber attacks and violations of security policies;
investigation of cyber incidents;
developing effective solutions for cyber security;
generation of reporting documents and visualization of system status and others.</p>
      <p>In order to solve these problems, the SIEM-system, on the basis of the initial
data collected from the log files which accumulate information about the events that
occur in the system, selects those events that may be a sign of cyber attacks or other
undesirable actions in the system.</p>
      <p>The main feature of the solution to the problem of choosing a SIEM-system for
building SOC is a large number of indicators that characterize the degree of fulfillment
the requirements for systems of this type which can be both quantitative and qualitative.
Qualitative indicators, first of all, include those that characterize how effectively the
SIEM system can be used to solve the functional tasks entrusted to it by the SOC; what
will be the cost of purchasing and using the system; how reliable it is and easy to
operate, etc.</p>
      <p>Analysis of recent publications [4-11] showed that these figures can be represented
as follows:</p>
      <p>X = {x1, x2 , x3 , x4 , x5 , x6 , x7 , x8 , x9 , x10 , x11, x12 , x13},
where x1 – event source support;
x2 – event collection;
x3 – correlation;
x4 – search and analytics;
x5 – visualization and reporting;
x6 – prioritization and notification;
x7 – general settings and installed;
x8 – scalability, fault tolerance, storing;
x9 – system component monitoring and internal audit;
x10 – ease of use;
x11 – availability of state certificates of conformity;
x12 – additional system modules;
x13 – cost.
where W − some generalized indicator of system quality;</p>
      <p>
        S − a set of possible system choices;
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
      </p>
      <p>Therefore, the problem of rational selection of SIEM-system for building the SOC
is characterized by multicriteria and the need to consider a large number of qualitative
and quantitative indicators.</p>
      <p>In its turn, the first characteristic requires the use of an effective method of solving
multicriteria problems, and the second – the application of fuzzy set theory for the
processing of expert information on qualitative indicators [12, 13].
2</p>
      <p>The problem of rational choice of SIEM</p>
      <p>The general statement of the problem of rational choice of SIEM-system can be
described as follows.</p>
      <p>It is necessary to find</p>
      <p>S0 = argoptW (X (s))
s∈S
qualitative.</p>
      <p>X (s) = x1(s), x2 (s),, xk (s), xk+1(s),, xn (s) − vector of SIEM quality indicators,
besides first k ( i = 1, k ) requirements are quantitative, and the other n-k k = k +1, n –</p>
      <p>The value of the partial indicator i, which characterizes the degree of fulfillment the
SIEM requirement i, is determined by its approximation to the optimal value.</p>
      <p>
        The main stages in solving the task (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) are: preparing initial data; choosing a method
for solving a multicriteria problem; algorithm development.
3
      </p>
    </sec>
    <sec id="sec-2">
      <title>The method of solving the problem</title>
      <p>It is advisable to use normalized values to estimate the degree of proximity of the
quantitative indicator i to the optimal value for j variant of the SIEM.
xij , i = 1, k; j = 1, k; 0 ≤ xij ≤ 1.</p>
      <p>Normalization of the value of a quantitative indicator can be made as follows:
xij =
xij − xi*j ,
xi*j* − xij
*
where xij – the value of indicator i for j variant of the system;</p>
      <p>xi*j , xi*j* – the worst and the best indicator value.</p>
      <p>Accordingly, the degree of proximity of the quality indicator i to the optimal value
for the j variant of the SIEM can be determined using the membership function μ S (xi ) .
To build a membership function μ S (xi ) it is advisable to use a rank-based method or
pairwise ranking method [14, 15].</p>
      <p>In this case, the rank of an element xi ∈ X
refers to a number rs (xi ) that
characterizes its importance in the formation of the SIEM property which is described by a fuzzy
term S. Suppose that the greater the rank of an indicator, the greater the value of its
membership function.</p>
      <p>
        If you introduce the following figures
then the distribution of membership degrees can be represented as follows:
rS (xi ) = ri ,μ S (xi ) = μ i ; i = 1, n,
μ1 = μ 2 =
r1 r2
μ n ,
rn
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
in case of normalization:
      </p>
      <p>
        On the basis of (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), the membership degree of all elements of the set is determined
by the membership degree of the so-called supporting member.
      </p>
      <p>For supporting member x1 ∈ X that has a membership function μ1 :
For supporting member x2 ∈ X that has a membership function μ 2 :</p>
      <p>r r r
μ 2 = 2 ⋅μ1; μ 3 = 3 ⋅μ1; ; μ n = n ⋅μ1;
r1 r1 r1
r r r
μ 2 = 1 ⋅μ 2; μ 3 = 3 ⋅μ 2;  ; μ n = n ⋅μ 2;</p>
      <p>
        r2 r2 r2
Accordingly, for supporting member xn ∈ X , that has a membership function μ n :
μ n = 1 ⋅μ n ; μ 2 = 2 ⋅μ n ;  ; μ n−1 = rn−1 ⋅μ n ;
r r
rn rn rn
From (
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5-7</xref>
        ) and in case of normalization (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) we obtain:
 μ1 = 1+ r2 + r3 +  + rn 
  r1 r1 r1 
μ 2 =  r1 +1+ r3 +  + rn −1
 r2 r2 r2 
      </p>
      <p>
        

  r r r −1
μ n =  1 + 2 + 3 +  +1 
  rn rn rn 
−1
On the basis of (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ), it is possirble to calculate the membership degrees μ s (xi ) on the
i = ξ ij , i, j = 1, n,
relative estimates of the ranks rj which create the following matrix:
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
      </p>
      <p>
        It is easy to see that the properties of the matrix (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ) are the following: it is diagonal,
transitive, and elements of the matrix that are symmetric about the main diagonal are
connected by dependence relation: ξ ij = 1/ξ ji .
      </p>
      <p>
        Since matrix (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ) is a matrix of paired comparison of the element ranks, a 9-point
Saaty scale can be used for expert evaluation of its elements:ξ ij = ri / rj (Table 1).
Thus, using (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ), the expert data on element ranks (their paired comparison) are
transformed into a fuzzy term membership function.
      </p>
      <p>
        The algorithm for constructing the membership function includes the following
steps.
1. Set a linguistic variable (qualitative characteristic of SIEM).
2. Determine the universal set on which the linguistic variable is set (the value of the
qualitative characteristic of SIEM).
3. Set a variety of fuzzy terms {S1, S2 , , Sn } that are used to evaluate the variable set
in the first step.
4. Form a matrix (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ) for each term S j , j = 1, m .
5. Using the formulas (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) calculate the membership functions of the elements (SIEM
characteristics) for each fuzzy term.
6. The procedure for the normalization of the received membership functions should
be carried out by dividing them by the largest value of the membership function.
      </p>
      <p>
        The most common methods for solving a multicriteria problem (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) are the following
[16]: the principal indicator method, generalized additive/multiplicative indicator
method, generalized minimax indicator method and lexographic method. The analysis
shows that they all have their pros and cons, and the choice of a method is largely
determined by the completeness and credibility of the expert knowledge of the
importance and degree of interrelation of partial quality indicators. Since lexographic
method is the least demanding for expert information about the degree of preference
for partial indicators, it is advisable to choose the lexographic method in order to solve
the problem of rational choice of SIEM-system for building the SOC. The essence of
use of this method is the following.
      </p>
      <p>At the previous stage of solving the task it is possible to find a set of “good solutions”
(Pareto-optimal solutions) by consistently comparing possible SIEM options for all
quality indicators. [17, 18, 19].</p>
      <p>Further, all the partial indicators are ordered by importance. Then the set of
alternatives with the best score by the most important indicator is outlined. When such an
alternative is the only one it is considered to be the best. Otherwise, when several
alternatives are obtained, they are distinguished by those that have a better rating on another
indicator and so on. Thus, the algorithm for implementing the lexographic method for
solving the problem of rational choice of the system consists of the following steps.
1. Partial quality indicators are ranked by importance:</p>
      <p>x1(s) &gt; x2 (s) &gt;&gt; xn (s)
2. For each indicator the value of permissible concession is determined Δxi , i = 1, n,
within which the compared SIEM variants are considered to be equivalent;
3. For the first indicator x1(s) a set Ψ1 of equivalent SIEM variants is formed which
meets the following condition:</p>
      <p>max(x1 j − x1k ) ≤ Δx1, j = 1, m ; k = 1, m ; k ≠ j.</p>
      <p>4. If the set contains only one variant, it is considered to be the best. Otherwise,
when it contains more than one alternative, you need consider all variants of the set by
indicator x2 (s) .</p>
      <p>5. For the second indicator x2 (s) , from a set of variants Ψ1 , a set of variants Ψ2 is
formed which meet the condition:</p>
      <p>max(x2 j − x2k ) ≤ Δx2 , i ∈ Ψ1 ; k ∈ Ψ1 ; k ≠ j.</p>
      <p>
        6. If the set Ψ2 contains one variant, it is considered to be the best. Otherwise, found
variants are considered by indicator x3 (s) and so on.
(
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
      </p>
      <p>7. In the case where all indicators are consistently reviewed and a set
Ψ = Ψ × Ψ ×× Ψ ,</p>
      <p>1 2 n containing more than one alternative is obtained, there are two
options: reduce the value of the permissible concession Δxi , i = 1, n, from the first most
important indicator and repeat the algorithm from the beginning or allow the decision
maker to choose the best option.
event source support which are quantitative indicators, as well as
and μ x4 (s) – ease to use which are qualitative indicators.</p>
      <p>Five options for choosing a SIEM system s j , j = 1, 5</p>
      <p>To illustrate the proposed algorithm in work we give an example of its application to
the selection of a rational variant of the SIEM system.</p>
      <p>To select a SIEM system, we use four partial indicators: x1(s) – cost and x2 (s) –
μ x3 (s)
have been selected for
consid– scalability
eration.</p>
      <p>As a result of the calculations and expert assessments, the following data were
obtained characterizing the degree of SIEM compliance with the specified requirements:
 0,8 0,8 0,7 0,5 0,6 
x1 =  ; ; ; ; 
 s1 s2 s3 s4 s5  ;
 0,7 0,8 0,6 0,7 0,8 
x2 =  ; ; ; ; 
 s1 s2 s3 s4 s5  ;
 0,4 0,6 0,7 0,8 0,7 
x3 =  ; ; ; ; 
 s1 s2 s3 s4 s5  ;
 0,5 0,6 0,5 0,6 0,3 
x4 =  ; ; ; ; </p>
      <p> s1 s2 s3 s4 s5  .</p>
      <p>x1 &gt; x2 &gt; μ S (x3 ) &gt; μ s (x4 ).</p>
      <p>Indicators are ranked by importance as follows:</p>
      <p>The value of permissible concession Δxi = 0,1, i = 1,4.</p>
      <p>
        3. With the maximum value of the first indicator x1 = 0,8 and the value of
permissible concession Δx1 = 0,1 to the set Ψ1 of equal variants for SIEM, which meet the
condition (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) the following variants are included:
4. Of the set Ψ1 , by the second indicator x2 meeting the condition (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ): x2 = 0,8 and
Δx2 = 0,1 to the set Ψ2 the following variants are included:
Ψ1 = {S1, S2 , S3}.
      </p>
      <p>Ψ2 = {S1, S2}.</p>
      <p>Ψ3 = { S2} .</p>
      <p>
        5. Of the set of variants: Ψ = Ψ1 × Ψ2 for the third indicator x3 meeting the
condition (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) x3 = 0,6 and Δx3 = 0,1 to the set Ψ3 the following variants are included:
      </p>
      <p>A rational choice of SIEM for building a SOC is the second option.
4</p>
    </sec>
    <sec id="sec-3">
      <title>Conclusion</title>
      <p>The conducted research shows that the lexographic method is an effective method
for solving the multicriteria problem of SIEM selection for SOC. Groups of quantitative
and qualitative indicators characterizing the requirements for SIEM in the SOC are
formulated. Methods of processing quantitative and qualitative indicators of SIEM are
offered. The expedience of applying the procedure for rationing quantitative indicators of
SIEM and applying the method of paired comparison based on rank evaluations for
processing its qualitative indicators is justified. The formulation of the SIEM selection
problem is done and the main stages of its solution are outlined. An algorithm for the
implementation of the lexographic method is developed and brought to practical
implementation.</p>
      <p>The results obtained can be used in practice to solve the problems of creating SOC
and rational choice of its software such as SIEM.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. KG,
          <source>Vogel Business Media GmbH &amp; Co. Was ist ein Security Operations Center (SOC)</source>
          ? - https://www.security-insider.de/was-ist
          <article-title>-ein-security-operations-center-</article-title>
          <source>soc-a617980/, , last accessed 22.06</source>
          .19.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Laskin</surname>
            <given-names>S.</given-names>
          </string-name>
          <article-title>How to build a competent, scalable and effective information security management center / LAN Network Solutions Magazine</article-title>
          . - https://www.osp.ru/lan/2017/04 /13051902/, last accessed
          <volume>28</volume>
          .03.
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Kotenko</surname>
            <given-names>I.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voroncov</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chechulin</surname>
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ulanov</surname>
            <given-names>A.V.</given-names>
          </string-name>
          :
          <article-title>Proactive security mechanisms against network worms: approach, implementation and results of the experiments</article-title>
          .
          <source>Information Technology</source>
          . Vol.
          <volume>1</volume>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>42</lpage>
          . (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Kotenko</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saenko</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polubelova</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chechulin</surname>
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Application of security information and event management technology for information security in critical infrastructures / SPIIRAS Proceeding</article-title>
          ,
          <source>ISSN: 2078-9181. Issue</source>
          <volume>1</volume>
          (
          <issue>20</issue>
          ). pp.
          <fpage>27</fpage>
          -
          <lpage>56</lpage>
          . (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. Paley L.
          <article-title>Comparison of SIEM systems</article-title>
          .
          <source>Part 1</source>
          . - https://www.anti-alware.ru/compare/ SIEM-systems, last accessed 07/04/
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. Paley L.
          <article-title>Comparison of SIEM systems</article-title>
          .
          <source>Part 2</source>
          . - https://www.anti-alware.
          <source>ru/compare/ SIEM-systems-part2</source>
          ,
          <issue>1</issue>
          /16, last accessed 08/05/
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Niyazov</surname>
            <given-names>T.</given-names>
          </string-name>
          <article-title>Comparison of SIEM solutions for building SOC</article-title>
          , https://www.jetinfo.ru/stati/ sravnenie-siem
          <article-title>-reshenij-dlya-postroeniya-soc, last accessed</article-title>
          <volume>08</volume>
          /05/
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. Comparison of SIEM systems, https://www.siem.su/compare_SIEM_systems.php, last accessed 08/05/
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Donskoy</surname>
            <given-names>K.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levin</surname>
            <given-names>L.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trushin</surname>
            <given-names>V.A.</given-names>
          </string-name>
          :
          <article-title>SIEM overview on the Russian market / Collection of scientific works of NSTU</article-title>
          . No.
          <volume>3</volume>
          (
          <issue>89</issue>
          ). pp.
          <fpage>124</fpage>
          -
          <lpage>132</lpage>
          . (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. SIEM product comparison - https://comminity.softwaregrp.com/dcvta86296, last accessed 10/18/
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. SIEM competitive comparision - https://www.securonix.com/products/competitivecomparison, last accessed 10/18/
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Boehm</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brown</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caspar H</surname>
          </string-name>
          . et al.:
          <source>Characteristics of software quality / [Translated from English]</source>
          . - Moscow: Mir. -
          <volume>208</volume>
          p. (
          <year>1981</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Borisov</surname>
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krumberg</surname>
            <given-names>O.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedorov</surname>
            <given-names>I.P.</given-names>
          </string-name>
          :
          <article-title>Decision making based on fuzzy models: examples</article-title>
          of use / Riga: Zinatne. 184 p. (
          <year>1990</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Zaichenko</surname>
            <given-names>Y.P.</given-names>
          </string-name>
          : Operations Research: Fuzzy Optimization. - Kiev: High school. 191 p. (
          <year>1991</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Rothstein</surname>
            <given-names>A.P.</given-names>
          </string-name>
          :
          <article-title>Intelligent identification technologies: fuzzy sets, genetic algorithms</article-title>
          ,
          <source>neural networks. - Vinnytsia: UNIVERSUM</source>
          . -
          <volume>320</volume>
          p. (
          <year>1999</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Gerasimov</surname>
            <given-names>B.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Divizinyuk</surname>
            <given-names>M.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subach</surname>
            <given-names>I.Y.</given-names>
          </string-name>
          :
          <article-title>Decision support systems: design, application, performance evaluation / Monograph</article-title>
          . - Sevastopol: Publishing Center SNIYE and P. -
          <volume>320</volume>
          p. (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Tutkin</surname>
            <given-names>L.S.:</given-names>
          </string-name>
          <article-title>Optimization of electronic devices according to a set of quality indicators / Moscow: Radio and communications</article-title>
          ,. - 367 p. (
          <year>1975</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Podinovsky</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gavrilov</surname>
            <given-names>V.M.</given-names>
          </string-name>
          : Optimization according to successively applied criteria / Moscow: Soviet Radio,. - 234 p. (
          <year>1975</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Podinovsky</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nogin</surname>
            <given-names>V.D.</given-names>
          </string-name>
          : Pareto-optimal solutions to multicriteria problems / Moscow: Science,
          <article-title>Main edition of the physical</article-title>
          and
          <source>mathematical literature</source>
          , -
          <volume>256</volume>
          p. (
          <year>1982</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>