<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Network Security Analysis Based on Consolidated Threat Resources</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Military-Diplomatic Academy named after Eugene Bereznyak</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Volvo IT</institution>
          ,
          <addr-line>Wrocław</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The security of the network using the consolidated threat resources that have been identified and registered in the database is analyzed in the paper. A threat analysis chart has been compiled and the risks of their spread on the network are estimated, and weaknesses in the network have been identified.</p>
      </abstract>
      <kwd-group>
        <kwd>- threat</kwd>
        <kwd>network</kwd>
        <kwd>risk</kwd>
        <kwd>consolidation</kwd>
        <kwd>e-governance</kwd>
        <kwd>crypto algorithm</kwd>
        <kwd>choice optimization</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The activities of any company or government agency are closely linked to the use of
communications information networks, which are built using electronic technologies
for the transmission, storage, processing, and use of corporate information [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. The
reliable functioning of these systems directly affects the economic activity and
financial condition of the corporation [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8 ref9">5-9</xref>
        ]. Corporate governance along with financial
risks should also take into account those related to the information systems use.
Therefore, in order to manage the risks, the information of the accounting system
should be consolidated and all events that cause losses should be consolidated, the
probabilities of their occurrence, the risks of spreading, the ways of their prevention
should be determined. This task is extremely important in modern corporate activity;
its solution is of paramount importance. The corporate network information security
management system (NISMS) is related to the various factors influence of activity of
the network users and is the basis of economic stability and maintaining a high level
of corporate security. To protect corporate information, especially confidential
information, administrators need to make timely and informed management decisions
while processing consolidated information about threats and network weaknesses
[1016]. Consolidated corporate network security information allows you to obtain
comprehensive network status information and effectively monitor events, identify
attacks, faults and vulnerabilities, and isolate corporate information security threats.
Based on the consolidated information, diagnostics, control and adaptation of
information security management, direct security control are carried out. Adaptation of
information security management is necessary to meet the desired results, despite
changing corporate governance goals, technological conditions, or expanding
corporate operations. Based on the consolidated information [
        <xref ref-type="bibr" rid="ref1 ref17 ref18 ref19 ref2 ref20 ref21">1-2, 17-21</xref>
        ], the network
vulnerability assessment and prevention of possible intrusions are created, the corporate
information security management strategy [
        <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref3 ref4">3-4, 22-29</xref>
        ] is adjusted accordingly, the
methods and data protection methods are determined, and the appropriate decisions
are made to identify hidden information threats.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Relate the highlighted issue to important practical and scientific work</title>
      <p>
        The classification of functional elements of network security and the categorization of
network security technologies of basic functional elements provide the basis for a
structured approach to the study of heterogeneous technologies that are rapidly
evolving [
        <xref ref-type="bibr" rid="ref30 ref31 ref32 ref33 ref34 ref35">30-35</xref>
        ]. An organized, hierarchical view is used to represent all traditional,
modern and emerging network security technologies. Fig. 1 shows a structure that reflects
an organized, hierarchical view of the technology of functioning of corporate
communications information security systems [
        <xref ref-type="bibr" rid="ref5 ref6">5-6</xref>
        ].
In order to maintain such architecture, the corporate communications information
security system should be operated using consolidated security resources that arise
throughout the system to prevent network attacks from progressing. By collecting all
the data from each security technology into a single consolidated resource, it is
possible to identify the weaknesses of the security system and accordingly take timely
measures to enhance the security of vulnerable sites and be able to predict events.
      </p>
      <p>
        The resultant task of network security is to secure the application systems and
information used at the input and generated at the output. As a result, you can identify
the basic functional elements of a corporate network security that are necessary to
build and operate a NISMS [
        <xref ref-type="bibr" rid="ref36 ref37 ref38 ref39 ref40 ref41 ref42">36-42</xref>
        ]:
 Confidentiality,
 Authentication,
 Authorization,
 The integrity of the message and the inability to opt out of authorship / receive the
message [
        <xref ref-type="bibr" rid="ref7 ref8">7-8</xref>
        ].
      </p>
      <p>
        These functional corporate network security elements are used in both hardware and
software execution on network devices (switches, servers, etc.) within the path
defined by the two endpoints of the communication connection (preferably a client PC
or terminal and server) [
        <xref ref-type="bibr" rid="ref10 ref9">9-10</xref>
        ]. It is important to note that not all of these functional
elements are always contained in separate elements of a corporate network security
system. In addition, there are network security services that are difficult to attribute to
these functional elements, but that work together with them to provide the desired
network security capabilities [
        <xref ref-type="bibr" rid="ref11 ref12">11-12</xref>
        ]. The relevance of theme is due to the need for
constant monitoring of network security and effective response to factors that disrupt
the network [
        <xref ref-type="bibr" rid="ref43 ref44 ref45 ref46 ref47 ref48 ref49 ref50 ref51">43-51</xref>
        ]. For information security management, consolidation of data on
threats that negatively affect the state of the network is a prerequisite for work. This
approach provides an opportunity to solve management problems: forecasting damage
from threats, identifying weak links of information protection and, accordingly,
contributes to the creation of projects of management decisions to improve the protection
system [
        <xref ref-type="bibr" rid="ref52 ref53 ref54 ref55 ref56 ref57 ref58 ref59">52-59</xref>
        ]. Consolidated threat accounting resources are created not only for
operational and current management, but also for the purpose of making long-term
decisions and predicting malicious actions of attackers. The aim of the work is to
substantiate the theoretical concept of consolidation of data on threats of the corporate
communication network and integration of the results into the information security
management system based on the analysis of consolidated resources, effective
planning, control and decision-making by the information security management system.
To achieve the goal, the following tasks were set:
 To identify threats to the network;
 Determine the activities of the NISMS;
 To carry out the consolidation of identified threats;
 Assess the risks of proliferation and impact of threats;
 Research of weak links of a network.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Recent research and publications analysis</title>
      <p>
        Consolidated information is obtained from multiple sources and systematically
integrated multifaceted information resources, which are collectively endowed with the
features of integrity, completeness, consistency and constitute an adequate
information problem area model for its processing, analysis and effective use in decision
support processes. A corporate communications network management system must have
procedures in place to monitor and monitor the quality of its work. These procedures
determine the compliance of the corporate network with the strategic plan of the
corporation and the analysis of the impact of specific risks on its overall activity. In
particular, they include checking the functions of electronic channels of information
delivery, their compliance with the strategic plan of activity; the ability of electronic
tools to process the intended amount of information [
        <xref ref-type="bibr" rid="ref13 ref14">13-14</xref>
        ].
      </p>
      <p>
        The management system procedures determine whether the corporation's
management and responsible units receive the information they need and examine the
functioning of each electronic system implemented, analyze it, including:
 Determining whether various aspects of the functioning of electronic systems are
taken into account, including analysis of critical cases, failures;
 Definition for each electronic system that cooperates with the main operating
system of the corporation, databases their compatibility and security;
 Verification of the accuracy and intelligence of scheduling software, calculations,
etc. available through the communications network;
 Determining whether a duplicate system is in place for users in the event that
eservices systems do not operate for an extended period;
 Check for the developed procedures existence for notification of the management
of the management system in case of technical problems of the network;
 Checking for the distribution of physical access to computer equipment, software,
communications equipment and communication lines with clearly identified
personnel, depending on their functions and positions within the corporation [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
The organization of the corporation's activities must be tailored to the conditions of
use of electronic means, so incompetence of management or imperfect technology
used can affect the economic condition of the institution. Also, an existing
organization of activities may not provide sufficient protection for sensitive electronic
information. Existing procedures and procedures may not take into account the speed of
transactions and the extended reach of electronic channels that transmit corporate
information. Therefore, the management system includes:
1. Observation of operating procedures and procedures, which is to determine their
suitability in the conditions of use of electronic channels of information
transmission. Determines whether the applicable work organization procedures for the
applicable personnel meet the requirements of implementation in new corporate
products and services; how electronic technologies affect information transmission
channels. A corporation must have a proper security system that includes the
following elements:
 Control access and protection of confidential information of clients;
 The methods for determining the right of request of each participant in electronic
data transmission systems;
 Highlighting information that may be accessible to third parties.
2. Determination of the ability to improve procedures and procedures in accordance
with the use of electronic technologies to ensure access and change of confidential
information:
 What information and how it is allowed to be transmitted to third parties;
 Whether confidential information is part of contracts and agreements with third
parties that are hired by the corporation.
3. Determining the existence of mandatory authorization procedures. The presence of
protection of tracking and prevention of duplicate transactions in each electronic
system is confirmed. The quality of client training regarding security and safety
when using electronic corporate systems is checked. Periodically, according to the
established schedule, the entire spectrum of transactional corporate capabilities is
checked, the resources of activity of each segment of the secure corporate
communication network are consolidated, the operational procedures and procedures for
conducting transactions and compliance with the requirements of protection and
security of corporate information [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>Effective management of information security requires understanding of network
attacks. As a rule, attacks are carried out in several steps.</p>
      <p>
        The first is research or network intelligence. The attacker collects information
about the use of the target database and documents, the availability of monitoring
tools for the corporate network. Then the attacker tries to identify vulnerabilities in
the hardware, software or organizational information security, continues additional
research and looks for a tool that can disrupt the work. Attack detection systems
classify scans as low threat because they do not harm servers or corporation activity.
Scanning is a prerequisite for attacks. If the port is found open or unsecured, then the
attacker usually goes into the pre-attack phase. Some services and applications are
targets for attack. Despite the use of security technology, network administrators must
address the challenge of protecting systems from malicious attacks and accidental
failures. One method called intelligence is used by hackers to select networks and
domains to search for targets. Intelligence allows a hacker to identify targets for
attack or use them for attack [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Statement of a problem</title>
      <p>The assessment of the risks associated with a breach of protection must identify,
quantify and decide on their prevention. The results should guide and determine the
appropriate management action and the risk management priorities associated with
the breach of information security, as well as the implementation priorities of the
selected management tools, to protect against these risks. The risk assessment and
management selection process can be performed several times to cover different parts
of the organization or individual NISMS.</p>
      <p>
        The risk assessment should include a systematic assessing the magnitude method
for the risks (risk analysis) and a process of comparing the predicted risks against the
risk criteria in order to determine the significance of the risks. Risk assessments
should also be undertaken periodically to take account of changes in security
requirements and risk situations, such as assets, threats, weaknesses, negative impacts,
risk assessment, and when significant changes occur. These risk assessments should
be carried out in a methodological manner capable of producing comparisons and
reproducible results. The assessment of risks associated with a breach of information
security should have a clearly defined scope in order to be effective, and should
include a linkage to risk assessments in other areas, where appropriate. In accordance
with the requirements of ISO / IEC 27002: 2007, which defines the basic directions
and general principles of development, implementation, support and improvement of
management of information security of the organization, we will present the diagram
of analysis of threats to the corporation network (Fig. 2) for their consolidation and
definition information security management strategies (Fig. 3).
Monitoring the use of corporate electronic information systems, in particular their
technical components, is an extremely important factor in ensuring the reliability and
efficiency of modern corporation activities. Electronic systems monitoring data,
consolidation of primary data in the areas we define is one of the main sources of
information for management decisions and risk management programs in corporate
activities. The source [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] presents the stages of risk analysis and forecasting:
      </p>
      <p>In the general case, the average over a certain period of time the combined risk of a
dangerous event A can be calculated by the formula:</p>
      <p>R(A)=P(A)Y(A),
(1)
where P(A) is a statistical probability of event A (or event risk), Y(A) is a one-time
loss is possible (or, if P(A) = 1, cost risk). In turn, the event risk is equal:
P( A) 
v(t )
T
,
where v(t) is the number of occurrences of events of А over time t; Т is the
observation period.
where Mt is a number of affected elements, Ma is a total number of items, the total
number of items that were in the affected area. Then a possible one-time loss Y(A) can
be determined by the following formula:
where Yn(A) is a conditional total loss, which is numerically equal to the number or
value of all elements of the computer technology (or all elements that are in the area
of damage). Thus, taking into account expression (2) and (4), formula (1) becomes:
That is, the physical content of R(A) is the number or cost of risk during the element
study period. We introduce a new characteristic - the degree of vulnerability to the
impact of event А:
This is a general formula for calculating risk. When considering the partial risks
inherent in a particular type of network threat element (viruses, malware, trojans,
C y ( A) </p>
      <p>M t ,</p>
      <p>M a</p>
      <p>Y ( A)  C y ( A)Yn ( A) ,
R( A) 
v(t)
T
|A C y ( A)Yn ( A) .
(2)
(3)
(4)
(5)
worms), the necessary modifications should be made. Then this formula looks like
this:
v(t)</p>
      <p>T
R f ( A) 
|A P(H )Cc ( A)H ,
(6)
where R f ( A) is a partial risk, Р(Н) is a probability of being of elements of a certain
type in the affected area, Н is their number, Cc ( A) is a degree of affection of this
group of elements.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Analysis of the results</title>
      <p>Consolidation of network threats was carried out at ISN department. The study period
covers 18 days. The network consists of 3 computers on which 5 software products
are installed. During the study, the following threats were identified:
 18 computers (network 5);
 unauthorized access to information - 3;
 malicious intent or mistakes of staff - 5;
 external threats - 2.</p>
      <p>A program for assessing the risks of threats (Fig. 4) was written, using formulas 1-6.
 Four events (problems) were investigated:
 Event I (technique) - failure, malfunctions, failures;
 Event II (Interception / access to information) - Interception of information or
obtained in a sociotechnical way;
 Event III (malicious intent of the staff) - intentional or incorrect handling of
information;
 Event IV (technogenic threat) is a negative impact of the environment.
The results are listed in the table (Fig. 4), where R is the average risk of an event; C is
a degree of damage to the network elements; Ro is simultaneous losses; Ca is a partial
degree of equipment damage; Cp is a partial degree of software vulnerability; Ra is a
partial risk of an event for the hardware; Rp is a partial risk from event for the
software.</p>
      <p>As a result of calculations by formulas (1-6) the following results are obtained:
1. Average risks:
(a) I event = 3.18
(b) II event = 0.54
(c) 3rd event = 0.9
(d) IV event = 0.36
2. Degree of involvement:
(a) I event = 1.06
(b) II event = 0.18
(c) 3rd event = 0.3
(d) IV event = 0.12
3. One-time losses:
(a) I event = 3.3708
(b) II event = 0.0972
(c) 3rd event = 0.27
(d) IV event = 0.0432
4. Combined losses = 3.7812
5. Combined average loss = 4.98
6. Partial degree of involvement 1 AZ = 0,265
 Partial severity of 1 software = 0.265
 Partial risk 1 AZ = 0.210675
 Partial risk 1 software = 1.053375</p>
      <p>7. Partial severity of 2 AZ = 0,09
 Partial severity of 2 software = 0.09
 Partial risk 2 AZ = 0.0243
 Partial risk 2 software = 0.1221</p>
      <p>8. Partial severity of 3 AZ = 0.3
 Partial severity of 3 software = 0.3
 Partial risk 3 AZ = 0.27
 Partial risk 3 software = 1.35</p>
      <p>9. Partial degree of involvement 4 AZ = 0,12
 Partial severity of 4 software = 0.12
 Partial risk 4 AZ = 0.0432
 Partial risk 4 software = 0.216
10. Total risk = 3.28905
For certain risks, it is noticeable that the level of protection of the ISN department
network is insufficient and the greatest threat to the network is the event I. Therefore,
let us investigate in this aspect the threat using the system of finding logical rules.
WithWhy (Demo, which has a limit on the number of records only), we derive logical
rules based on the consolidated data about detected threats of event I (Fig. 4).
We use the following rules, which revealed deficiencies in the security system,
namely the distribution of access to the local network and the Internet in software
products, which overloaded the operating system and spread viruses:</p>
      <p>The information security management system aims to counter attacks from the outside
and promote secure communication within the organization as well as beyond. The
essence of the management system includes the need to consolidate information about
the state of the computer system and effective ways of its use, and therefore the main
task of the information security management system is the ability to solve problems
with consideration of a number of specific limitations of the corporation, as well as to
quickly and correctly diagnose and best troubleshoot systems.</p>
      <p>It should be remembered that any measures taken to protect the information should
not cost more than the information itself. Setting up physically isolated secure
communication channels for secure information exchange between remote nodes is an
extremely expensive and not always justifiable measure. Therefore, consolidated
information resources on the state of corporate communications are the basis for the
information security management system.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>In order to coordinate the NISMS to address the problems of weak links in the
communication network, it is necessary to distinguish from the general system of threats
consolidation as an integral part of information security, which is the basis for
preparing the necessary information for acquiring new knowledge. An important way to
improve network security is to assess the risks of threats that are generated by
consolidated threat resources. Using this approach creates the prerequisites for making
optimal decisions at the SMIB planning stage and improving it. In order to organize
the totality of threats according to the ISMS objectives, it is advisable to use
consolidated resources, which forms the methodological basis of ISMS and allows obtaining
the necessary information to solve specific problems. Quite often, security personnel
are responsible for monitoring and analyzing the data presented in one system.
Security personnel only periodically review the data and do not report in a timely manner
the results of the analysis of the security management reports to all concerned.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matsuik</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veretennikova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vaskiv</surname>
          </string-name>
          , R.:
          <source>Selective Dissemination of Information - Technology of Information Support of Scientific Research. Advances in Intelligent Systems and Computingб</source>
          <volume>871</volume>
          ,
          <fpage>235</fpage>
          -
          <lpage>245</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Rzheuskiy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veretennikova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kunanets</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kut</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The information support of virtual research teams by means of cloud managers</article-title>
          .
          <source>International Journal of Intelligent Systems and Applications</source>
          ,
          <volume>10</volume>
          (
          <issue>2</issue>
          ),
          <fpage>37</fpage>
          -
          <lpage>46</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kunanets</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kut</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Methodology of research the library information services: The case of USA university libraries</article-title>
          .
          <source>Advances in Intelligent Systems and Computing</source>
          ,
          <volume>689</volume>
          ,
          <fpage>450</fpage>
          -
          <lpage>460</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kunanets</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kut</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The analysis of the United States of America universities library information services with benchmarking and pairwise comparisons methods</article-title>
          .
          <source>In: Computer Sciences and Information Technologies</source>
          ,
          <fpage>417</fpage>
          -
          <lpage>420</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Schneier</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          : Applied Cryptography: Protocols, Algorithms, and
          <article-title>Source Code in C (second Edition</article-title>
          . N.Y. : John Wiley &amp; Sons, Inc. (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Draft</surname>
          </string-name>
          , E.:
          <article-title>Authentication Policy for Federal Agencies</article-title>
          . In: Federal Register,
          <volume>68</volume>
          . (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Advanced</given-names>
            <surname>Encryption</surname>
          </string-name>
          <article-title>Standart (AES</article-title>
          ) http://www.intuit.ru/department/security/networksec/4/5.html. (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Horton</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mugge</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Network Security - Portable Reference</surname>
          </string-name>
          . In:
          <string-name>
            <surname>McGraw-Hill</surname>
          </string-name>
          ,
          <article-title>(</article-title>
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Atkinson</surname>
          </string-name>
          , R.:
          <source>IETF RFC</source>
          <year>1825</year>
          :
          <article-title>Security Architecture for the Internet Protocol</article-title>
          . (
          <year>1995</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Saaty</surname>
            ,
            <given-names>T. L.</given-names>
          </string-name>
          :
          <article-title>An eingenvalue allocation model for prioritization and planning</article-title>
          .
          <source>In: Energy Management and Policy Center</source>
          . University of Pennsylvania (
          <year>1972</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Saadat</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Network Security Principles and Practices</article-title>
          . In: Cisco Press. (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Technology for the Psychological Portraits Formation of Social Networks Users for the IT Specialists Recruitment Based on Big Five, NLP and Big Data Analysis</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2392</volume>
          ,
          <fpage>147</fpage>
          -
          <lpage>171</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Khribi</surname>
            ,
            <given-names>M. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jemni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nasraoui</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Automatic recommendations for e-learning personalization based on web usage mining techniques and information retrieval</article-title>
          .
          <source>In: International Conference on Advanced Learning Technologies</source>
          ,
          <volume>241</volume>
          -
          <fpage>245</fpage>
          . (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Web content support method in electronic business systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2136</volume>
          ,
          <fpage>20</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Demchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dilai</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Methods and Means of Web Content Personalization for Commercial Information Products Distribution</article-title>
          .
          <source>In: Lecture Notes in Computational Intelligence and Decision Making</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>332</fpage>
          -
          <lpage>347</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>P. L.</given-names>
          </string-name>
          :
          <article-title>Multiple Criteria Decision Making: Concepts, Techniques, and Extensions</article-title>
          . Plenum Press,
          <string-name>
            <surname>N.Y.</surname>
          </string-name>
          (
          <year>1985</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Saaty</surname>
            ,
            <given-names>T. L.</given-names>
          </string-name>
          :
          <article-title>Multicriteria Decision Making. The Analytic Hierarchy Process: Planning. Priority Setting</article-title>
          . Resource Allocation. University of Pittsburgh, RWS Publications (
          <year>1990</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. Antonyu,k N.,
          <string-name>
            <surname>Medykovskyy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dverii</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oborska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krylyshyn</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotsky</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsiura</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naum</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Online Tourism System Development for Searching and Planning Trips with User's Requirements</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV, Springer Nature Switzerland AG</source>
          <year>2020</year>
          ,
          <volume>1080</volume>
          ,
          <fpage>831</fpage>
          -
          <lpage>863</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savchuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasichnyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Individual Sign Translator Component of Tourist Information System</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV, Springer Nature Switzerland AG 2020</source>
          , Springer, Cham,
          <volume>1080</volume>
          ,
          <fpage>593</fpage>
          -
          <lpage>601</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kutyuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voloshyn</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalska-Styczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voloshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>The Intellectual System Development of Distant Competencies Analyzing for IT Recruitment</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV</source>
          , Springer, Cham,
          <volume>1080</volume>
          ,
          <fpage>696</fpage>
          -
          <lpage>720</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kubik</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryshkovets</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V. B.</given-names>
          </string-name>
          :
          <article-title>The Mobile Application Development Based on Online Music Library for Socializing in the World of Bard Songs and Scouts' Bonfires</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV</source>
          , Springer,
          <volume>1080</volume>
          ,
          <fpage>734</fpage>
          -
          <lpage>756</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mykhailyshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kohut</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Intelligent system of a smart house</article-title>
          .
          <source>In: 3rd International Conference on Advanced Information and Communications Technologies</source>
          ,
          <fpage>282</fpage>
          -
          <lpage>287</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm</article-title>
          .
          <source>In: 3rd International Conference on Advanced Information and Communications Technologies, AICT</source>
          ,
          <fpage>447</fpage>
          -
          <lpage>450</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Gaming method of ontology clusterization</article-title>
          .
          <source>In: Webology</source>
          ,
          <volume>16</volume>
          (
          <issue>1</issue>
          ),
          <fpage>55</fpage>
          -
          <lpage>76</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Web service interaction modeling with colored petri nets</article-title>
          .
          <source>In: Proceedings of the 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          ,
          <string-name>
            <surname>IDAACS</surname>
          </string-name>
          <year>2019</year>
          ,
          <volume>1</volume>
          ,
          <issue>8924400</issue>
          , pp.
          <fpage>319</fpage>
          -
          <lpage>323</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Shu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Building of the Predicate Recognition System for the NLP Ontology Learning Module</article-title>
          .
          <source>In: Proceedings of the 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          , IDAACS,
          <fpage>802</fpage>
          -
          <lpage>808</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shatskykh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borzov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>An intelligent system of the content relevance at the example of films according to user needs</article-title>
          .
          <source>In: CEUR Workshop Proceedings 2516</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>23</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Antonyuk</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotsky</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demchuk</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lyudkevych</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobyk</surname>
            <given-names>І</given-names>
          </string-name>
          .:
          <article-title>Consolidated Information Web Resource for Online Tourism Based on Data Integration and Geolocation</article-title>
          .
          <source>In: 14th International Scientific and Technical Conference on Computer Science and Information Nechnologies</source>
          ,
          <fpage>15</fpage>
          -
          <lpage>20</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Lytvyn</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basyuk</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalchuk</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kubinska</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salo</surname>
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Identifying Textual Content Based on Thematic Analysis of Similar Texts in Big Data</article-title>
          .
          <source>In: 2019 IEEE 14th International Scientific and Technical Conference on Computer Science and Information Nechnologies (CSIT)</source>
          ,
          <fpage>84</fpage>
          -
          <lpage>91</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Vysotsky</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lyudkevych</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antonyuk</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naum</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotskyi</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Slyusarchuk</surname>
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Online Tourism System for Proposals Formation to User Based on Data Integration from Various Sources</article-title>
          .
          <source>In: 14th International Scientific and Technical Conference on Computer Science and Information Nechnologies (CSIT)</source>
          ,
          <fpage>92</fpage>
          -
          <lpage>97</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Vysotska</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalchuk</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kubinska</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dilai</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brodyak</surname>
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Method of Similar Textual Content Selection Based on Thematic Information Retrieval</article-title>
          .
          <source>In: 2019 IEEE 14th International Scientific and Technical Conference on Computer Science and Information Nechnologies (CSIT'2019)</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shakhovska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mykhailyshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Medykovskyy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shcherbak</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A Smart Home System Development</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV</source>
          ,
          <volume>1080</volume>
          ,
          <fpage>804</fpage>
          -
          <lpage>830</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalska-Styczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rak</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voloshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Noennig</surname>
            ,
            <given-names>J. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nykolyshyn</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pryshchepa</surname>
          </string-name>
          , H.:
          <article-title>Aviation Aircraft Planning System Project Development</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing IV</source>
          , Springer, Cham,
          <volume>1080</volume>
          ,
          <fpage>315</fpage>
          -
          <lpage>348</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shatskykh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kohut</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petruchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dzyubyk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobrivetc</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panasyuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Komar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Design of a recommendation system based on Collaborative Filtering and machine learning considering personal needs of the user</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>4</volume>
          (
          <issue>2</issue>
          -
          <fpage>100</fpage>
          ),
          <fpage>6</fpage>
          -
          <lpage>28</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Methods of information resources processing in electronic content commerce systems</article-title>
          .
          <source>In: Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2015- February</source>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Andrunyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Electronic content commerce system development</article-title>
          .
          <source>In: Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2015-February</source>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Alieksieieva</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
          </string-name>
          , V.:
          <article-title>Technology of commercial web-resource processing</article-title>
          .
          <source>In: Proceedings of 13th International Conference: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2015-February</source>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Lytvyn</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravets</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demchuk</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berko</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryshkovets</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shcherbak</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naum</surname>
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Methods and Models of Intellectual Processing of Texts for Building Ontologies of Software for Medical Terms Identification in Content Classification</article-title>
          .
          <source>In: CEUR Workshop Proceedings, of the 2nd International Workshop on Informatics &amp; Data-Driven Medicine (IDDM 2019)</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>354</fpage>
          -
          <lpage>368</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharonova</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hamon</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cherednichenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grabar</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>KowalskaStyczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Preface: Computational Linguistics and Intelligent Systems (COLINS-</article-title>
          <year>2019</year>
          ).
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandes</surname>
            ,
            <given-names>V. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Preface: Modern Machine Learning Technologies and Data Science (MoMLeT&amp;DS2019)</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mykhailyshyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rzheuskyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semianchuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>System Development for Video Stream Data Analyzing</article-title>
          .
          <source>In: In Advances in Intelligent Systems and Computing</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>315</fpage>
          -
          <lpage>331</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Zdebskyi</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krylyshyn</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>An Application Development for Recognizing of View in Order to Control the Mouse Pointer</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          ,
          <fpage>55</fpage>
          -
          <lpage>74</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oleshek</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <source>Automated Monitoring of Changes in Web Resources. In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>348</fpage>
          -
          <lpage>363</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <article-title>Ontological approach to plot analysis and modeling</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>22</fpage>
          -
          <lpage>31</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demkiv</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ukhanska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hladun</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalchuk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petruchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dzyubyk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokulska</surname>
          </string-name>
          , N.:
          <article-title>Design of the architecture of an intelligent system for distributing commercial content in the internet space based on SEOtechnologies, neural networks, and Machine Learning</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>2</volume>
          (
          <issue>2</issue>
          -
          <fpage>98</fpage>
          ),
          <fpage>15</fpage>
          -
          <lpage>34</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          46.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
          </string-name>
          , R.:
          <article-title>Satellite spectral information recognition based on the synthesis of modified dynamic neural networks and holographic data processing techniques</article-title>
          ,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>330</fpage>
          -
          <lpage>334</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          47.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <source>Web Resources Management Method Based on Intelligent Technologies, Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>206</fpage>
          -
          <lpage>221</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          48.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Method for ontology content and structure optimization, provided by a weighted conceptual graph</article-title>
          ,
          <source>Webology</source>
          ,
          <volume>15</volume>
          (
          <issue>2</issue>
          ),
          <fpage>66</fpage>
          -
          <lpage>85</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          49.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oborska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Methods of Building Intelligent Decision Support Systems Based on Adaptive Ontology</article-title>
          ,
          <source>Proceedings of the 2018 IEEE 2nd International Conference on Data Stream Mining and Processing</source>
          ,
          <string-name>
            <surname>DSMP</surname>
          </string-name>
          <year>2018</year>
          ,
          <volume>145</volume>
          -
          <fpage>150</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          50.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The method of web-resources management under conditions of uncertainty based on fuzzy logic</article-title>
          ,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 - Proceedings 1</source>
          ,
          <fpage>343</fpage>
          -
          <lpage>346</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          51.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Emmerich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>The Virtual Library System Design and Development</article-title>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          ,
          <volume>871</volume>
          ,
          <fpage>328</fpage>
          -
          <lpage>349</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          52.
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Model and architecture for virtual library information system</article-title>
          ,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 - Proceedings 1</source>
          ,
          <fpage>37</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          53.
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : Model of Touristic Information Resources Integration According to User Needs,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018 - Proceedings 2</source>
          ,
          <fpage>113</fpage>
          -
          <lpage>116</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          54.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makara</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>The consolidated information web-resource about pharmacy networks in city</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          ,
          <fpage>239</fpage>
          -
          <lpage>255</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          55.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Analysis features of information resources processing</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>124</fpage>
          -
          <lpage>128</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          56.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Information Technology of Processing Information Resources in Electronic Content Commerce Systems</article-title>
          . In: Computer Science and Information Technologies, CSIT'
          <year>2016</year>
          ,
          <fpage>212</fpage>
          -
          <lpage>222</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          57.
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , Chyrun L.:
          <article-title>Analysis and evaluation of risks in electronic commerce</article-title>
          ,
          <source>CAD Systems in Microelectronics, 9th International Conference</source>
          ,
          <volume>332</volume>
          -
          <fpage>333</fpage>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          58.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Time Dependence of the Output Signal Morphology for Nonlinear Oscillator Neuron Based on Van der Pol Model</article-title>
          .
          <source>In: International Journal of Intelligent Systems and Applications</source>
          ,
          <volume>10</volume>
          ,
          <fpage>8</fpage>
          -
          <lpage>17</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          59.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
          </string-name>
          , H.:
          <article-title>The Risk Management Modelling in Multi Project Environment.</article-title>
          .
          <source>In: Computer Science and Information Technologies, Proc. of the Int. Conf. CSIT</source>
          ,
          <fpage>32</fpage>
          -
          <lpage>35</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>