<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>DDOS Attacks Analysis Based On Machine Learning in Challenges of Global Changes</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>De Montfort University</institution>
          ,
          <addr-line>Leicester</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Mathematics University of Colorado</institution>
          ,
          <addr-line>Colorado Springs</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>This article will allow users to search for the necessary information about DDOS attacks around the world and predict future attacks, check whether their network protection is working, and help to debug it. The purpose is to investigate possible DDOS attacks, predict possible attacks on specified IP addresses, attack duration, server load. The object of work is DDOS attacks in the world. The subject of work is the research of DDOS attacks collected from around the world during 2019. The main task of this work is to develop software implementation of the product, machine learning methods that will help to investigate and predict the activities of DDOS attacks. The program should help predict and predict DDOS risks based on previous hacker attacks; predict attack time, number of packets transmitted, server load, etc. This subject area is now, no matter how, but remains one of the most relevant topics from the beginning of the 21st century to the present day and will most likely be relevant in the coming years.</p>
      </abstract>
      <kwd-group>
        <kwd>DDoS Attacks</kwd>
        <kwd>Machine Learning</kwd>
        <kwd>Data Analysis</kwd>
        <kwd>Classification</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>One of the most popular analogs of research and work is Microsoft's DDoS Protection</title>
    </sec>
    <sec id="sec-2">
      <title>Attack Analytics and rapid response for the Microsoft Azure cloud service. As the</title>
      <p>frequency of DDoS attacks continues to rise, affecting almost two out of five
companies. DDoS attacks are the most common reason for disabling the service.</p>
    </sec>
    <sec id="sec-3">
      <title>Another analog is «Secure Watch Analytics». Corero SecureWatch® Analytics is a powerful security analytics web portal that provides a comprehensive and easy-toread security dashboard. The information panels are based on specialized distributed denial of service (DDoS) channels from the SmartWall Corero defense system. Co</title>
      <p>rero uses Splunk's big data and advanced visualization software to convert complex
security event data into a toolbar available through the
SecureWatch-Analytics</p>
    </sec>
    <sec id="sec-4">
      <title>Dashboard-Thumbnail-ImageSecureWatch portal. This analytics portal provides host</title>
      <p>
        ing providers, service providers and businesses with a window for DDoS attacks and
cyber threats targeted at their online services. Real-time security dashboards on the
portal provide unprecedented visibility to the organization's network and security
activities to respond quickly to these threats [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7">1-7</xref>
        ].
2
      </p>
      <sec id="sec-4-1">
        <title>Related Work</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>In this work, the existing data sets are comprehensively used and the new proposed</title>
      <p>
        system for DDoS-attacks is used [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. A new data set, named CICDDoS2019, was
generated. It eliminates all current shortcomings. A new approach to family
identification and classification based on a set of network flow functions is proposed using
the generated data set. It also provides the most important feature sets for detecting
different types of DDoS attacks with the appropriate weight.
      </p>
      <p>Basic Attributes of the selected Dataset are such ones:
•
•
•
•
•
•
•
•
•
•
•
•
Besides, there are other signs of dataset selection. Additional information about the
data set are as follows:
• The number of instances of objects is&gt; 1,000,000 for different types of servers.
• Related tasks: Classification, clustering, regression.
• Published by the Canadian Institute of Cyber Security in the 4th quarter of 2019
with data collected from various companies.
• This dataset contains 54 attributes.
• Data was collected from different IP servers using different ports, collected data on
the length of packet transmission, time spent on packet transmission, etc.
• Data were also collected based on different machines (OS) such as Ubuntu,</p>
    </sec>
    <sec id="sec-6">
      <title>Fortinet, Win 7, 8, 8.1, 10, and on different days.</title>
    </sec>
    <sec id="sec-7">
      <title>The Data set supports classification, clustering, and regression methods. The decision tree method, which is implemented here, is the classification tree one. The tree structure contains the following elements: "leaves" and "branches" [1] (Fig. 1).</title>
    </sec>
    <sec id="sec-8">
      <title>Each leaf shows the target variable value changed by moving from root to leaves.</title>
      <p>
        Each internal node corresponds to one of the input variables [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref13 ref14 ref15 ref8 ref9">1, 8-15</xref>
        ]. Dividing the
target variable sets into subsets based on testing attribute values is used at the
classification tree. This process is repeated on each of the resulting subsets. The recursion
ends when the subset at the node achieves the same target variable values. Therefore,
it does not add value to the predictions [
        <xref ref-type="bibr" rid="ref1 ref16 ref17 ref18 ref19 ref20 ref21">1, 16-21</xref>
        ] The top-down induction of decision
tree (TDIDT) belongs to an absorbing "greedy" algorithm and is currently the most
common decision tree strategy for data [
        <xref ref-type="bibr" rid="ref2 ref22 ref23 ref24 ref25 ref26 ref27 ref28">2, 22-28</xref>
        ]. In data mining method, decision
trees can be used as mathematical and computational methods to help describe,
classify, and generalize a set of data that can be written as follows: Implementation: C #
(WPF / Class TreeView) [
        <xref ref-type="bibr" rid="ref2 ref29 ref30 ref31 ref32 ref33 ref34">2, 29-34</xref>
        ].
3
      </p>
      <sec id="sec-8-1">
        <title>Case Study</title>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>Firstly, let us load the data into pandas Dataframe:</title>
      <p>pd.set_option("display.max_rows", None, "display.max_columns", None)
df = pd.read_csv('C:/Users/monuel/Desktop/01-12/DrDoS_DNS.csv', sep=",")</p>
    </sec>
    <sec id="sec-10">
      <title>Secondly, let's describe it and check for zero values, etc.:</title>
    </sec>
    <sec id="sec-11">
      <title>Thirdly, let's select the attributes needed to work with the model (see Fig.2):</title>
      <p>Next, let's construct charts to illustrate how attribute values depend on their values
and peaks (see Fig.3-8):
ette='GnBu')
plt.show()</p>
    </sec>
    <sec id="sec-12">
      <title>Next, let's break the data into learning and test [8-9]. This can be achieved by a scaler train test split model.</title>
    </sec>
    <sec id="sec-13">
      <title>Next, let's scale the data:</title>
    </sec>
    <sec id="sec-14">
      <title>Next, let's create a linear regression model using the available data. Let's create an instance of the LinearRegression class, which will represent a regres-sion model [811]:</title>
      <p>model = LogisticRegression(solver='liblinear', max_iter=99999,
random_state=0)</p>
    </sec>
    <sec id="sec-15">
      <title>Using .fit () let's calculate the optimal values of the weights  ₀ and  ₁, using the exist</title>
      <p>ing input and output (x and y) as arguments. In other words, .fit () corresponds to the
model.
model.fit(X_train, y_train)
print(model.classes_)</p>
    </sec>
    <sec id="sec-16">
      <title>Next, let’s derive the accuracy of the predicted model and other data (Fig.9).</title>
    </sec>
    <sec id="sec-17">
      <title>The Intercept and coefficient models are shown in Fig.10:</title>
      <p>modelIntercept = model.intercept_
print(modelIntercept)
modelCoef = model.coef_
print(modelCoef)</p>
    </sec>
    <sec id="sec-18">
      <title>Next, let’s run a test probation of the model (Fig.11):</title>
      <p>predictProbationOfModel = model.predict_proba(X_train)</p>
    </sec>
    <sec id="sec-19">
      <title>Next, let’s test the model at 0 and 1 (Fig.12):</title>
      <p>predictOfModel = model.predict(X_train)</p>
    </sec>
    <sec id="sec-20">
      <title>Obtained results of the model are shown in Fig.13:</title>
    </sec>
    <sec id="sec-21">
      <title>Next, let’s build a Confusion matrix (Fig.14).</title>
    </sec>
    <sec id="sec-22">
      <title>Next, let’s build a report on the classification as a string or dictionary:</title>
    </sec>
    <sec id="sec-23">
      <title>Next, let’s build a report on the classification as a line or dictionary.</title>
    </sec>
    <sec id="sec-24">
      <title>Next, let’s improve the model:</title>
    </sec>
    <sec id="sec-25">
      <title>As results, we get the accuracy of the improved model and other data (Fig.15):</title>
      <sec id="sec-25-1">
        <title>Conclusions</title>
      </sec>
    </sec>
    <sec id="sec-26">
      <title>In this article, we looked at DDos attacks in the world, looked at the growth of DDos</title>
      <p>and the relevance of this topic. We researched the dataset of the Canadian University
of Cybersecurity and described it. We considered how long it takes to send Fwd and</p>
    </sec>
    <sec id="sec-27">
      <title>Backward packets. Also, the number of packet transmissions over a period has been</title>
      <p>investigated. The distribution and confusion matrices for given attributes have been
built. An accuracy of 0.08 has got, but that is because we used a small amount of data.</p>
    </sec>
    <sec id="sec-28">
      <title>Also the result to 0.09. has been improved. Python tools, namely: pandas, matplotlib, numpy, sklearn have been used for creating a model, learning, data storage, and visualization.</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Shpyrko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koval</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Fraud detection models and payment transactions analysis using machine learning</article-title>
          ,
          <source>SHS Web of Conferences</source>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Kupin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muzyka</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ivchenkm</surname>
            <given-names>R</given-names>
          </string-name>
          .: .
          <source>Information Technologies of Processing Big Industrial Data and Decision-Making Methods"</source>
          , 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>DDoS</given-names>
            <surname>Evaluation Dataset</surname>
          </string-name>
          , https://www.unb.ca/cic/datasets/ddos-2019.html.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>4. What is DDos Attacks, https://aws.amazon.com/ru/shield/ddos-attack-protection/</mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bublyk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rybytska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karpiak</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matseliukh</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Structuring the fuzzy knowledge base of the IT industry impact factors</article-title>
          .
          <source>In: Computer sciences and information technologies : Proceed. of the 2018 IEEE 13th International Scientific and Technical Conference</source>
          , (
          <year>2018</year>
          ). DOI: https://doi.org/10.1109/STC-CSIT.
          <year>2018</year>
          .
          <volume>8526760</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Matseliukh</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bublyk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Intelligent system of visual simulation of passenger flows</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          ,
          <volume>2604</volume>
          ,
          <fpage>906</fpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bublyk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matseliukh</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Motorniuk</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Terebukh</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Intelligent system of passenger transportation by autopiloted electric buses in Smart City</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          ,
          <volume>2604</volume>
          ,
          <fpage>1280</fpage>
          . (
          <year>2020</year>
          ) http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2604</volume>
          /paper81.pdf
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>8. Linear Regression in Python, https://realpython.com/linear-regression-in-python/</mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Linear</given-names>
            <surname>Reggression</surname>
          </string-name>
          , https://scikitlearn.org/stable/modules/generated/sklearn.linear_model.LinearRegression.html
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Pandas</surname>
            <given-names>DataFrame</given-names>
          </string-name>
          , https://www.geeksforgeeks.org/python-pandas-dataframe/
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>11. Plotting with MatPlotLib, https://pandas.pydata.org/pandasdocs/version/0.13.1/visualization.html</mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Adaptive method of pursuit game problem solution</article-title>
          . In: Modern Problems of Radio Engineering, Telecommunications and Computer Science Proceedings of International Conference, TCSET,
          <fpage>62</fpage>
          -
          <lpage>65</lpage>
          . (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Game methods of construction of adaptive grid areas</article-title>
          .
          <source>In: The Experience of Designing and Application of CAD Systems in Microelectronics</source>
          ,
          <volume>513</volume>
          -
          <fpage>516</fpage>
          . (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ilchuk</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kots</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Application of Data Mining to Exchange Rate Influence Identification</article-title>
          .
          <source>In: Computational Linguistics and Intelligent Systems, COLINS, CEUR workshop proceedings</source>
          , Vol-
          <volume>2604</volume>
          ,
          <fpage>1117</fpage>
          -
          <lpage>1126</lpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>An Evaluation of the Information Technology of Gene Expression Profiles Processing Stability for Different Levels of Noise Components</article-title>
          .
          <source>In: Data</source>
          ,
          <volume>3</volume>
          (
          <issue>4</issue>
          ), art. no.
          <issue>48</issue>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Durnyak</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pikh</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Senkivskyy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>An Evaluation of the Objective Clustering Inductive Technology Effectiveness Implemented Using Density-Based and Agglomerative Hierarchical Clustering Algorithms</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>532</fpage>
          -
          <lpage>553</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aliekseyeva</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          :
          <article-title>Quality evaluation of information resources in webprojects</article-title>
          .
          <source>In: Actual Problems of Economics</source>
          <volume>136</volume>
          (
          <issue>10</issue>
          ),
          <fpage>226</fpage>
          -
          <lpage>234</lpage>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Malachivskyy</surname>
            ,
            <given-names>P.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pizyur</surname>
            ,
            <given-names>Y.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andrunyk</surname>
            ,
            <given-names>V.A.</given-names>
          </string-name>
          :
          <article-title>Chebyshev Approximation by the Sum of the Polynomial and Logarithmic Expression with Hermite Interpolation</article-title>
          .
          <source>In: Cybernetics and Systems Analysis</source>
          ,
          <volume>54</volume>
          (
          <issue>5</issue>
          ),
          <fpage>765</fpage>
          -
          <lpage>770</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Orekhov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malyhon</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liutenko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goncharenko</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Using Internet News Flows as Marketing Data Component</article-title>
          .
          <source>In: Computational Linguistics and Intelligent Systems, COLINS, CEUR workshop proceedings</source>
          , Vol-
          <volume>2604</volume>
          ,
          <fpage>358</fpage>
          -
          <lpage>373</lpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Lutskiv</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Popovych</surname>
          </string-name>
          , N.:
          <article-title>Big Data Approach to Developing Adaptable Corpus Tools</article-title>
          .
          <source>In: Computational Linguistics and Intelligent Systems, COLINS, CEUR workshop proceedings</source>
          , Vol-
          <volume>2604</volume>
          ,
          <fpage>374</fpage>
          -
          <lpage>395</lpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Pavlenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tymofieieva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Search Query Data Analysis: Challenges and Opportunities</article-title>
          .
          <source>In: Computational Linguistics and Intelligent Systems, COLINS, CEUR workshop proceedings</source>
          , Vol-
          <volume>2604</volume>
          ,
          <fpage>452</fpage>
          -
          <lpage>461</lpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alieksieiev</surname>
          </string-name>
          , V.:
          <article-title>A Method to Solve Uncertainty Problem for Big Data Sources</article-title>
          .
          <source>In: International Conference on Data Stream Mining and Processing</source>
          , DSMP,
          <fpage>32</fpage>
          -
          <lpage>37</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Berko</surname>
          </string-name>
          , A.Y.:
          <article-title>Models of data integration in open information systems</article-title>
          . In: Actual Problems of Economics, (
          <volume>10</volume>
          ),
          <fpage>147</fpage>
          -
          <lpage>152</lpage>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Berko</surname>
          </string-name>
          , A.Y.:
          <article-title>Methods and models of data integration in E-business systems</article-title>
          .
          <source>In: Actual Problems of Economics (10)</source>
          ,
          <fpage>17</fpage>
          -
          <lpage>24</lpage>
          . (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Consolidated data models for electronic business systems</article-title>
          .
          <source>In: The Experience of Designing and Application of CAD Systems in Microelectronics</source>
          ,
          <volume>341</volume>
          -
          <fpage>342</fpage>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Zhezhnych</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markiv</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Recognition of tourism documentation fragments from webpage posts</article-title>
          .
          <source>In: 14th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering, TCSET,
          <fpage>948</fpage>
          -
          <lpage>951</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Zhezhnych</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markiv</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Linguistic comparison quality evaluation of web-site content with tourism documentation objects</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          <volume>689</volume>
          ,
          <fpage>656</fpage>
          -
          <lpage>667</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Zhezhnych</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markiv</surname>
            ,
            <given-names>O.:</given-names>
          </string-name>
          <article-title>A linguistic method of web-site content comparison with tourism documentation objects</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>340</fpage>
          -
          <lpage>343</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Game method for coalitions formation in multi-agent systems</article-title>
          .
          <source>In: International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prodanyuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Game task of resource allocation</article-title>
          .
          <source>In: Experience of Designing and Application of CAD Systems in Microelectronics, CADSM</source>
          ,
          <fpage>437</fpage>
          -
          <lpage>438</lpage>
          . (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Game methods of the stochastic boundary problem solution</article-title>
          .
          <source>In: Perspective Technologies and Methods in MEMS Design, MEMSTECH</source>
          ,
          <fpage>71</fpage>
          -
          <lpage>74</lpage>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Smart data integration by goal driven ontology learning</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>529</volume>
          ,
          <fpage>283</fpage>
          -
          <lpage>292</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The similarity metric of scientific papers summaries on the basis of adaptive ontologies</article-title>
          .
          <source>In: Proceedings of 7th International Conference on Perspective Technologies and Methods in MEMS Design, MEMSTECH</source>
          ,
          <fpage>162</fpage>
          . (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsmots</surname>
            ,
            <given-names>O.I.:</given-names>
          </string-name>
          <article-title>The process of managerial decision making support within the early warning system</article-title>
          .
          <source>In: Actual Problems of Economics</source>
          ,
          <volume>149</volume>
          (
          <issue>11</issue>
          ),
          <fpage>222</fpage>
          -
          <lpage>229</lpage>
          . (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>