<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Cybersecurity Providing in Information and Telecommunication Systems, January</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Approach of the Attack Analysis to Reduce Omissions in the Risk Management</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhii Zybin</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Khoroshko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuliia Khokhlachova</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valerii Kozachok</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Liubomyra Huzara ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>28</volume>
      <issue>2021</issue>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The article is dedicated the attack analysis and reducing mistakes and miscalculations in risk management. Widespread use of game theory in the analysis of attacks on information resources and countering them can significantly reduce errors and miscalculations that occur in risk management, which in turn minimizes the negative and adverse political, social, and financial consequences for the subjects of information warfare. The solution to the problems of information confrontation is impossible without the development of new theoretical and methodological principles for the analysis of confrontation processes. The authors have offered and studied the scheme of finding sustainable strategies, which ensure the neutralization of the enemy. The scheme for finding sustainable strategies always turns out to be useful in many problems.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Cyberspace</kwd>
        <kwd>risk management</kwd>
        <kwd>sustainable strategy</kwd>
        <kwd>cyberwar</kwd>
        <kwd>hybrid war</kwd>
        <kwd>game theory</kwd>
        <kwd>payoff function</kwd>
        <kwd>counteraction</kwd>
        <kwd>neutralization</kwd>
        <kwd>attack on information</kwd>
        <kwd>conflict management</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In recent years, due to the rapid development of operations research of systems engineering in
solving risk management problems, it has become possible to study conflict situations taking into
account situations of uncertainty.</p>
      <p>The theoretical basis of risk management in conflict situations is game theory. Hybrid war and cyber
warfare contributed to the widespread adoption of game theory [1]. New forms and methods of
counteraction have appeared. The classic forms of confrontation have been replaced by hybrid methods.
They are of a hidden nature and are carried out mainly in the political, economic, informational, and
other spheres. Solving the issues of risk management and information protection, countering attacks,
and information impacts remain relevant for all of us.</p>
      <p>Nowadays, game-theoretic methods [2] are successfully used to solve a wide variety of issues. The
application of game theory in solving problems of risk estimating in information wars, information and
information-psychological confrontation, information and geopolitical areas gives especially great
benefit.</p>
      <p>Game theory is a mathematical theory of conflict situations. In these situations, the interests of two
or more parties collide, which pursue different, opposite goals. The direct subject of study of the game
theory is the mathematical analysis of a formalized model of conflict, which takes into account the
peculiarities of a real conflict situation. The technique itself is the formalization of a specific conflict
situation does not apply to the mathematical theory of games. It is within the competence of specialists
in the field, which is affected by this conflict situation.</p>
      <p>Each conflict situation, in terms of risk assessment, is a complex situation. Risk analysis is hampered
by many secondary factors. Therefore, in order to make possible a mathematical analysis of the
situation, it is necessary to abstract from random factors and builds a simplified formalized model of
the process and risk management factors. In this case, the formalization should be such that the possible
ways of behavior of the participants and the results are visible, to which all possible combinations of
actions of all participants in the conflict lead.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Survey</title>
      <p>Following modern research trends can be identified in this field: building influence models
(information cascades (IC) [3]; linear thresholds (LT) [4], probabilistic models [5]; construction of
effective algorithms for maximizing the impact (based on the apparatus of submodular functions
(greedy algorithm) and its improvement, CELF [6], CELF ++ [7]); using local properties of the graph
(LDAG [8], SimPath [9]); thinning the graph [10]; simulated annealing [11]; network monitoring
optimization algorithms [6]; variations of the influence maximization problem and solution algorithms
(maximizing influence blocking [12], maximizing influence taking into account time [13], thematic
distribution of influence [14]); game-theoretic models of information influence [15, 16].</p>
    </sec>
    <sec id="sec-3">
      <title>3. Purpose and Objectives</title>
      <p>The analysis of scientific and technical literature [17–21] showed that to date the following issues
of game theory application have not been solved within the problem of risk management for information
protection:
 The task of risk management for information protection has not been structured.
 No areas of risk quantitative estimates have been found.
 No guaranteed assessments of the risk level of information security were found.
 Optimal strategies for attacking and protecting information have not been found.
 The solution of information protection issues described by stochastic models is not fully found;
 The behavior of information attacks during information confrontations has not been studied.</p>
      <p>Modeling of information attack processes involves the risk management and reflection in the
developed models of dynamic properties due to the conflicting nature and related ideas about the
optimal distribution of information resources of players [22].</p>
      <p>Mathematical modeling of physical processes by methods of game theory is based on the following
factors that verbally determine the essence of this theory [23]:</p>
      <p> The presence of a system of differential equations, which describes the change over time in the
parameters of the processes being modeled.</p>
      <p> Definition of admissible controls of players, in the form of a class of functions on which the
corresponding restrictions are imposed.</p>
      <p> Goals of players in the form of functionalities.
 Information that is available to players at the beginning of the game and in the process.</p>
      <p>Thus, the use of game theory in information warfare for the purpose of risk management requires
detailed research, which is the purpose of this article.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Solutions of Games with a Choice of Time</title>
      <p>Tasks related to the timing of actions occur in many problems of information confrontation, which
use game theory applications [24]. In such situations, the possible actions of the players are set in
advance. During the action, the goal is set by strategic decisions of the players (the attacker and the
defending side). In general, the payoff function of such games has the following form [25]
 ( ,  ) 
 ( ,  ) = {  ( ) 
 ( ,  )</p>
      <p>
        &lt;  ,
 =  ,
&gt; 
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
 &lt;  ,
 &gt;  ,
 ( , ) =  ( , )
 ( ) = (∝  0, ( ),  1),
 ( ) = (  0,ℎ( ),  1).
definition.
  ( , )and
      </p>
      <p>( , )are strictly negative for  ≥  .</p>
      <p>The functions  and  satisfy the following conditions:
1. The functions  ( , ) and  ( , ) have continuous third partial derivatives in their domains of
2. The derivatives  
( , ) and</p>
      <p>( , ) are strictly negative for  ≤  , and the derivatives
3. The function  ( , ) strictly increases in y and strictly decreases in x, and the function  ( , )
strictly increases in x and strictly decreases in y.</p>
      <sec id="sec-4-1">
        <title>Then both sides have unique optimal mixed strategies of the following form</title>
        <p>Here, the function  ( ) and ℎ( )are continuous in the entire interval [0,1] and are obtained as the
only solutions of a pair of integral equations:
∝  1 +   2 =  +   ,
 1 +   2 = ℎ+  ℎ
here various restrictions can be imposed on the functions  ,  , and  . They are determined by the
specific conditions of the problem being solved.</p>
        <p>
          Many kinds of research [26, 27] have been devoted to the study of games with payoff function (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ).
The corresponding mutually exclusive classification of all types of games are given in Karlin’s
monograph [27]. Before starting the results, we introduce some notation. We denote the distribution
function P(x), which has a jump in  at zero and a jump in  at unity, by  ( ) = (  0, 
( ),  1)
where the distribution density
        </p>
        <p>( )is a continuous function in the entire interval [ , ] ⊂ [0,1].</p>
      </sec>
      <sec id="sec-4-2">
        <title>Therefore, the following theorem is true. Theorem 1 [27]. Let the payoff function of a continuous game has the following form: 320</title>
        <p>0   ( , )−   ( , )
 ( )
ℎ( )


1
1
+ ∫  ( , )−   ( , )</p>
        <p>( )
 
 
( , )
( , )
+ ∫  ( , )−   ( , )</p>
        <p>
          ℎ( )
  (0, )
  (1, )
 1 = −  ( , )−   ( , )
 2 = −  ( , )−   ( , )
 1 = −  ( , )−   ( , )
  ( ,0)
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
(
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
(
          <xref ref-type="bibr" rid="ref9">9</xref>
          )
(
          <xref ref-type="bibr" rid="ref10">10</xref>
          )
The constants ∝,  ,  ,  are determined from the following conditions:
1
0
1
0
The functions  ,  ,  satisfy the following conditions:
1. The functions  ( ,  ) and  ( ,  ) are defined and have continuous second partial derivatives on
closed triangles 0 ≤ 
≤  ≤ 1 and 0 ≤
        </p>
        <p>
          ≤  ≤ 1, respectively.
2. The  (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) value lies between  (
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ) and  (
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ); the  (0) value lies between  (0,0) and  (0,0).
3.   ( ,  ) &gt; 0 and   ( ,  ) &gt; 0 are located in the corresponding closed triangles with the possible
exception of   (
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ) = 0;   ( ,  ) &lt; 0 and   ( ,  ) &lt; 0 in the corresponding closed triangles with
the possible exception of   (
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ) = 0.
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>Then, both sides have optimal strategies of the following form</title>
        <p>( ) = (∝  0,  ∝1,   1),
 ( ) = (  0, ℎ∝1,   1),
equations:</p>
        <p>The distribution densities  ∝1 and ℎ∝1 are determined as solutions of the following integral

1

1
  1( ) − ∫   1
( ,  ) ∝1( )</p>
        <p>=∝  1( ) +   2( );
ℎ 1( ) − ∫   1( ,  )ℎ∝1( )</p>
        <p>=   1( ) +   2( );
  1( ,  ) =</p>
        <p>−  ( ,  )
 ( ,  ) −  ( ,  )</p>
        <p>
          −  ( ,  )
{  ( ,  ) −  ( ,  )
;  ≤  &lt;  ≤ 1;
; a ≤  ≤  ≤ 1;
(
          <xref ref-type="bibr" rid="ref11">11</xref>
          )
(
          <xref ref-type="bibr" rid="ref12">12</xref>
          )
(13)
(14)
(15)
(16)
        </p>
        <p>( ) = 1−∝ − ,(0 ≤∝, ≤ 1)
∫ℎ 1( ) = 1−  −  ,(0 ≤  , ≤ 1)</p>
      </sec>
      <sec id="sec-4-4">
        <title>The constants ∝, , , and  are determined from the following conditions</title>
        <p>
          Remark 1. It follows from the equation (13) that if  (
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ) &lt;  (
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ), then the point  = 1and  =
        </p>
      </sec>
      <sec id="sec-4-5">
        <title>1 is a saddle point for  ( , ). This follows from condition (2) of Theorem 1.</title>
        <p>Corollary 1. For the case of  ( ) = 0 and − ( , ) =  ( , ), the game is called symmetric.</p>
        <p>The symmetric game is investigated for the case when the function  ( , ) in the region 0≤ ( ≤
 ≤ 1) is continuous in both variables and has continuous first-order partial derivatives   ( , ) ≥
0,  ( , ) ≤ 0 for  ≤  and the set of points for which   ( , ) = 0 or   ( , ) = 0 does not
contain any interval of the form 
= 
,  1 &lt;  &lt;  2 or the form 
= 
, ∝1&lt;  &lt;∝2.</p>
      </sec>
      <sec id="sec-4-6">
        <title>The optimal strategy is unique and has the following form for  (1,1,) ≤ 0</title>
        <p>
          There is an optimal strategy of the following form for  (
          <xref ref-type="bibr" rid="ref1">0,1,</xref>
          ) &gt; 0:
 ( ) =  1 = {0 
 ( ) =  0 = {1
1
(17)
(18)
(19)
(20)
(21)
(22)
(23)
 ( ) =
{


0 &lt;  ≤  ,
∝ − ∫   1
( )
        </p>
        <p>&lt;  ≤ 1

1
∫   1
( )</p>
        <p>= 1−∝

1
and is determined from the normalization equation:</p>
        <p>The function   1( ) is a continuous, positive function. The parameter ∝ is the jump of  ( ) at zero
From Theorem 1 it follows that the optimal strategy  ( ) for a symmetric game in the case under
consideration exists only if it is possible to find numbers  , ∝, that satisfy the conditions 0 ≤  , ∝&lt; 1
and such a continuous non-negative function   1( ) for  &lt;  &lt; 1 such that
(24)
(25)
(26)
(27)
(28)
(29)
(30)</p>
        <p>
          Further, consider a special class of symmetric games for which  ( ,  ) is not necessarily continuous
in the set of variables at the points (0,0) and (
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ), and it is only required that the following limits exist
We will assume that
 (0,0) = lim  (0,  ) ;  (
          <xref ref-type="bibr" rid="ref1 ref1">1,1</xref>
          ) = lim  ( , 1).
        </p>
        <p>→0</p>
        <p>→0
 ( ,  ) =  ( ),</p>
        <p>Remark 2. The case of the function  ( ,  ), which increases in  and decreases in  , using the
substitution  = 1 −  ,  = 1 −  reduces to the case of increasing in  and decreasing in  , which was
considered in the Theorem 1.</p>
      </sec>
      <sec id="sec-4-7">
        <title>Remark 3.</title>
        <p>∝,  ,  ,  ≥ 0, and the function</p>
        <p>( ) and ℎ
eigenfunctions of the conjugate integral equations</p>
        <p>
          If in the Theorem 1, instead of the condition (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), we assume that (  ( ,  ) −   ( ,  )) &gt; 0 and
(  ( ,  ) −   ( ,  )) &gt; 0, then one can verify [27, 28] that the optimal strategies of both parties have
the form of the distribution function  ( ) = (∝   ,   ( ),    ) and  ( ) = (   , ℎ
( ),    ), where
( ) are obtained in the form of Neumann series in the







 ( ) − ∫  
( ,  ) 
( )
        </p>
        <p>=∝  1( ) +   2( )
ℎ ( ) − ∫  
( ,  )ℎ ( )</p>
        <p>=  1( ) +   2( )
 1( ,  ) = ∫  ( ,  ) ( ) − ∫  ( ,  ) ( ),</p>
        <p>1( , 0) = − ∫  (0,  ) ( ).</p>
        <p>∫  (0,  ) ( ) − ∫  ( ,  ) ( ) +
+ ∫ ( (0,  ) −  ( ,  )) ( ) =  1 +  2 +  3.
following expression
(31)
(32)
(33)
(34)
(35)
(36)</p>
        <p>The function  ( ) is continuously differentiable in the interval 0 ≤  ≤ 1, and its derivative  ′( )
does not change the sign on this interval. Moreover, the set of points  for which  ′( ) = 0 does not
contain any interval.
strategies. For this, we write the equality</p>
        <p>
          It is easy to see that for the equation  ′( ) ≥ 0, the negative strategy is  ( ) =  1, for the equation
 (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) ≤ 0 and  ( ) =  0, for  (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) ≥ 0. The proof of this fact is based on the idea of finding sustainable
 1( , +0) =  1( , 0)+∝  (0,0) =  1( , 0)+∝  (0).
        </p>
        <p>The validity of this equality is established using (29). Indeed, for the equation  &gt; 0 we have the
It is obvious from (35) that all | | ≤  /4,  = 1,2,3. Hence, this proves the validity of (31).</p>
        <p />
        <p>Let us first take the value  = 0. From  1( ,  ) = 0 for  &lt;  &lt; 1 it follows that  1( , +0) = 0.
For  &gt; 0, it should be  1( , 0) = 0. It leads to a contradiction with (31), due to the expression  (0) &lt;
0. On the other hand, for ∝= 0 we have the following expression
 1( , +0) = − ∫  (0) ( )
= − (0) ∫  ( )
= − (0) &gt; 0
we obtain
that it is also impossible. If we take ∝&gt; 0, then from  1( ,  ) = 0, and strict decrease of the function</p>
      </sec>
      <sec id="sec-4-8">
        <title>Thus</title>
        <p>1( ,  ) −  1( , 0) =
 −0
+0
=∝  (0,  ) + ∫  ( ,  ) ( ) − ∫  ( ,  ) ( ) + ∫  (0,  ) ( )</p>
        <p>
          The first term on the right-hand side of formula (34) as  → 0, taking into account (29), tends to ∝
 (0,0). In order to estimate the integrals in (34), for a given  &gt; 0, we choose  such that the total
variation of  ( ) in [0,  ] is less than  /4 0, where  0 = 
less than  /4, and the next two can be represented as:
| ( ,  )|. Then the first integral will be

1+0
1+0

1
0
on the interval 0 &lt;  ≤∝ we get  1( , +0) &gt; 0. If ∝&gt; 0 and  1( , 0) = 0, then from expression (31)
we obtain  1( , +0) =∝  (0) &lt; 0. This is a contradiction. Hence ∝&gt; 0 and ∝= 0. In this case,
expression (26) is equivalent to the expression  1( ,  ) = 0 on the interval (∝ ,1) under the condition
С1′( ,  ) = 0. It follows from this expression that, we obtain an integral equation for determining the
2 (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) ( ) = ∫



 2


 ′ ( )  ( )
        </p>
        <p>1
+ ∫
 ( )



 ′ (
) 
, ( &lt;  &lt; 1).</p>
      </sec>
      <sec id="sec-4-9">
        <title>In this case, the normalization condition must be satisfied (37) (38)</title>
      </sec>
      <sec id="sec-4-10">
        <title>The Remark 4.</title>
        <p>addition, it is easy to check the validity of the following expressions</p>
        <p>For the case of  ′( ) ≤ 0, it can be shown [28, 29] that optimal strategies are  ( ) =∝  0 +   1. In
 ( ) = {∝  0( ) + (1−∝) 1( )</p>
        <p>(0) = 0 (0 ≤∝≤ 1),
 (0) &lt; 0,
 (0) &gt; 0.
the condition</p>
        <p>The solution of the game  ( , [0,1]) with the payoff function  ( ,  ), (0 ≤  ,  ≤ 1) is called a
pair of distribution functions (strategies)  1∗ and  2∗ and a real number  (value of the game) that satisfies
1
0
∫  ( ,  )  2∗( ) ≤  ≤ ∫  ( ,  )  1∗( ), 0 ≤  ,  ≤ 1.</p>
        <p>( 1∗,  2) = ∬  ( ,  )  1∗( )  2∗( ).
calculated by the following formula</p>
        <p>It follows from this expression that if the player  1 uses the strategy  1∗, then the average payoff is
This payoff cannot be less than the number  , i.e. the player  1, as it were, neutralizes the opponent’s
actions. And, conversely, if the player  2 applies the strategy  2∗, then his average loss  ( 1,  2∗) will
always be greater than the number  , regardless of the actions of the player  1. Therefore, it is natural
that each player should strive to choose such distribution functions  1∗ and  2∗, which could neutralize
the opponent’s actions. Indeed, for the player  1, the best strategy is a strategy that makes his average
winnings as large as possible within reason, regardless of the opponent’s actions. Moreover, conversely,
the player  2 must choose a strategy that would provide him, within reasonable limits, the smallest
possible loss, regardless of the actions of the player 1. Naturally, if the game has an equilibrium</p>
      </sec>
      <sec id="sec-4-11">
        <title>Here</title>
        <p>Here
1
0
1
0
position on the space of distribution functions, then only in this case the players can choose optimal
strategies [30].</p>
      </sec>
      <sec id="sec-4-12">
        <title>In general, the player  1 can guarantee himself a payoff of at least</title>
        <p>1 = max min ∫  1( 1)  2( ) = max min  1[ 1( )].</p>
        <p>1( 1) = ∫  ( ,  )  1( ).
himself a loss of no more than</p>
        <p>Similarly, the player  2, by the appropriate choice of the distribution function  2( ), can guarantee
 2</p>
        <p>1
 2 = min max ∫  2( 2)  1( ) = min max  2[ 2( )].
(39)
(40)
(41)
1
0
1
0
 2( 2) = ∫  ( ,  )  2( ).</p>
        <p>1 ≥ min  1( 1)
 2 ≤ max  2( 2),</p>
      </sec>
      <sec id="sec-4-13">
        <title>From equations (39) and (40) we obtain</title>
        <p>Let the player  2 choose the distribution function  20( ) as his strategy, and let the player  1 know
this choice. Naturally, assuming such an opportunity, the  2 player should strive to find a sustainable
 1 will always get the best result, choosing a point  0 that corresponds to this maximum
strategy. It follows from (41), it becomes clear that if the value  2( 2) has a maximum, then the player
 0 ≤  2( 2( 0)) = max  2( 2( )).</p>
        <p>minimum.</p>
        <p>It would be beneficial for the player  2 to bring the value of  2( 2( )) to a minimum, but this is
not always possible. The player cannot influence the form of the payoff function and the choice of  0
by the player  1. Nevertheless, the player  2 can, in any case, try to choose the strategy  20( ) so that
the value of  2( 2</p>
        <p>) does not have a single maximum, that is, so that its “curve” has a flat top.</p>
        <p>Similarly, if the player  2 has learned the strategy of the player  1, then he will always choose the
point  0 at which the function  1( 1( )) will take the minimum value. In this case, the task of the
player  1 is to choose such a strategy  10( ) so that the function  1( 1( )) does not have a single
We denote Ω1 = { :  2( 2( )) =  1 = 
} and Ω2 = { :  1( 1( )) =  2 = 
}, where  1
and  2 are arbitrary numbers, and  1 ≤  1 ≤  2 ≤  2.</p>
        <p>If there is such a pair of real numbers ( 1 ≤  2) and a pair of distribution functions ( 1,  2),
which simultaneously satisfies the following conditions
then the functions  1 and  2 will be called stable [27, 30] strategies.</p>
        <p>The question of the existence of sustainable strategies for the payoff function  ( ,  ) in most cases
remains unsolved. The scheme itself finding sustainable strategies is always useful in many applications
and, in particular, in the game theory with a choice of a moment in time. Such games do not require the
definition of strategies that neutralize the enemy. It turns out [27, 30] that instead of them one can be
content with partially stable strategies, i.e. strategies that provide the player with a stable position in a
certain subinterval of the unit interval.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>Widespread use of game theory in the analysis of attacks on information resources and countering
them can significantly reduce errors and miscalculations that occur in the risk management of
information security, which in turn minimizes the negative and adverse political, social, and financial
consequences for the subjects of information warfare.</p>
      <p>Systematic studies of the behavior for complex dynamic processes require consideration of a large
number of risks, features, and relationships of typical attacks on information and informational
influences. The investigated features contradict one another; however, each of them cannot be
neglected, since they give us a complete picture of the process that is investigated or simulated.</p>
    </sec>
    <sec id="sec-6">
      <title>6. References</title>
      <p>[13] X. He, et al., Influence blocking maximization in social networks under the competitive linear
threshold model, in: 12th SIAM International Conference on Data Mining, SDM, 2012.
[14] W. Chen, W. Lu, N. Zhang, Time-critical influence maximization in social networks with
timedelayed diffusion process, in: 26th Conference on Artificial Intelligence, AAAI, 2012.
[15] J. Tang, Social influence analysis in large-scale networks, KDD, 2009.
[16] M. Jain, et al., A double oracle algorithm for zero-sum security games on graphs, in 10th</p>
      <sec id="sec-6-1">
        <title>International Conference on Autonomous Agents and Multiagent Systems, 2011.</title>
        <p>[17] J. Tsai, T. H. Nguyen, M. Tambe, Security Games for Controlling Contagion, AAAI, 2012.
[18] S. V. Lenkov, D. A. Peregudov, V. A. Khoroshko, Metody i sredstva zashhity informacii: v 2-h t,</p>
      </sec>
      <sec id="sec-6-2">
        <title>Arij, 2008. [In Russian].</title>
        <p>[19] A. A. Kobozeva, V. A. Khoroshko, Analiz informacionnoj bezopasnosti, GUIKT, 2009. [In</p>
      </sec>
      <sec id="sec-6-3">
        <title>Russian].</title>
        <p>[20] Differential Games: A Mathematical Theory with Applications to Warfare and Pursuit, Control
and Optimization. Rufus Isaacs. Courier Corporation, 1999.
[21] Differential Games. Avner Friedman. Courier Corporation, 2013.
[22] E. R. Smoljakov Teorija antagonizmov i differencial’nye igry, Jeditorial URSS, 2000. [In Russian].
[23] V. V. Vasylev, V. L. Baranov, Modelyrovanye zadach optymyzatsyy i dyfferentsyalnykh yhr,</p>
      </sec>
      <sec id="sec-6-4">
        <title>Naukova dumka, 1989. [In Ukraininan].</title>
        <p>[24] L. A. Petrosjan, N. A. Zenkevich, E. V. Shevkopljas, Teorija igr, BXB-Peterburg, 2012. [In</p>
      </sec>
      <sec id="sec-6-5">
        <title>Russian].</title>
        <p>[25] A. V. Krushevskij. Teorija igr, Kniga po Trebovaniju, 2013. [In Russian].
[26] M. Dresher, Games of Strategy: Theory and Applications, Prentice Hall, 1961.
[27] S. Karlin, Matematicheskie metody v teorii igr, programmirovanii i jekonomike, Mir, 1964. [In</p>
      </sec>
      <sec id="sec-6-6">
        <title>Russian].</title>
        <p>
          [28] L. Wolfersdorf, Eine Bemerkung zur Theorie der symmetrischen Zeltspide, Elektron. Juf. – verarb
und Kybernet 3(
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) (1999) 54–68.
[29] R. V. Hryshchuk, Teoretychni osnovy modeliuvannia protsesiv napadu na informatsiiu metodamy
teorii dyferentsialnykh ihor ta dyferentsialnykh peretvoren, Ruta, 2010. [In Ukrainian].
[30] V. Khoroshko, et al., The use of Game Theory to Study Processes in the Informational
        </p>
      </sec>
      <sec id="sec-6-7">
        <title>Confrontation, Scientific and Practical Cyber Security Journal 4(3) 45–51.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L.</given-names>
            <surname>Pirchalava</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Khoroshko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Khohlachjova</surname>
          </string-name>
          ,
          <string-name>
            <surname>Shelest M.E.</surname>
          </string-name>
          <article-title>Informacionnoe protivoborstvo v sovremennyh uslovijah</article-title>
          ,
          <source>CP Komprint</source>
          ,
          <year>2019</year>
          . [in Russian].
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Dixit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Skeath</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>McAdams</surname>
          </string-name>
          . Games of Strategy (5th ed.), W.W. Norton,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Kempe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kleinberg</surname>
          </string-name>
          , E. Tardos,
          <article-title>Maximizing the spread of influence through a social network, in: 9th ACM SIGKDD international conference on Knowledge discovery and data mining</article-title>
          , ACM New York, NY, USA,
          <year>2003</year>
          , pp.
          <fpage>137</fpage>
          ‒
          <lpage>146</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Z. B.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          , Implementation of Social Engineering Attack at Institution of Higher Education,
          <source>in: 1th International Workshop on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CybHyg) 2654</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>155</fpage>
          -
          <lpage>164</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Domingos</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Richardson, Mining the Network Value of Customers</article-title>
          .
          <source>Proceedings of the Seventh International Conference on Knowledge Discovery and Data Mining</source>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , et al.,
          <article-title>Learning influence among interacting Markov chains</article-title>
          .
          <source>Advances in Neural Information Processing Systems</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>J.</given-names>
            <surname>Leskovec</surname>
          </string-name>
          ,
          <article-title>Cost-effective outbreak detection in networks</article-title>
          ,
          <source>in: 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>420</fpage>
          ‒
          <lpage>429</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Goyal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Lu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. V. S.</given-names>
            <surname>Lakshmanan</surname>
          </string-name>
          , CELF++
          <article-title>: Optimizing the greedy algorithm for influence maximization in social networks</article-title>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. Zhang,</surname>
          </string-name>
          <article-title>Scalable influence maximization in social networks under the linear threshold model</article-title>
          . ICDM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Goyal</surname>
          </string-name>
          ,
          <string-name>
            <surname>SIMPATH:</surname>
          </string-name>
          <article-title>An Efficient Algorithm for Influence Maximization un-der the Linear Threshold Model</article-title>
          ,
          <source>in: 2011 IEEE 11th International Conference on Data Mining</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mathioudakis</surname>
          </string-name>
          , et al.,
          <article-title>Sparsification of influence networks</article-title>
          .
          <source>KDD</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>529</fpage>
          ‒
          <lpage>537</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Jiang</surname>
          </string-name>
          , et al.,
          <source>Simulated Annealing Based Influence Maximization in Social Networks, AAAI</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>