<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Approach of the Attack Analysis to Reduce Omissions in the Risk Management</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Serhii</forename><surname>Zybin</surname></persName>
							<email>serhii.zybin@npp.nau.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Liubomyra Huzara ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Khoroshko</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Liubomyra Huzara ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yuliia</forename><surname>Khokhlachova</surname></persName>
							<email>hohlachova@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>1 Liubomyra Huzara ave</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Valerii</forename><surname>Kozachok</surname></persName>
							<email>v.kozachok@kubg.edu.ua</email>
							<affiliation key="aff1">
								<orgName type="institution">Borys Grinchenko Kyiv University</orgName>
								<address>
									<addrLine>18/2 Bulvarno-Kudriavska str</addrLine>
									<postCode>04053</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">Cybersecurity Providing in Information and Telecommunication Systems</orgName>
								<address>
									<addrLine>January 28</addrLine>
									<postCode>2021</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Approach of the Attack Analysis to Reduce Omissions in the Risk Management</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">EF992201FE5CA07AAECE7E2673270635</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T10:32+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cyberspace</term>
					<term>risk management</term>
					<term>sustainable strategy</term>
					<term>cyberwar</term>
					<term>hybrid war</term>
					<term>game theory</term>
					<term>payoff function</term>
					<term>counteraction</term>
					<term>neutralization</term>
					<term>attack on information</term>
					<term>conflict management</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article is dedicated the attack analysis and reducing mistakes and miscalculations in risk management. Widespread use of game theory in the analysis of attacks on information resources and countering them can significantly reduce errors and miscalculations that occur in risk management, which in turn minimizes the negative and adverse political, social, and financial consequences for the subjects of information warfare. The solution to the problems of information confrontation is impossible without the development of new theoretical and methodological principles for the analysis of confrontation processes. The authors have offered and studied the scheme of finding sustainable strategies, which ensure the neutralization of the enemy. The scheme for finding sustainable strategies always turns out to be useful in many problems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>In recent years, due to the rapid development of operations research of systems engineering in solving risk management problems, it has become possible to study conflict situations taking into account situations of uncertainty.</p><p>The theoretical basis of risk management in conflict situations is game theory. Hybrid war and cyber warfare contributed to the widespread adoption of game theory <ref type="bibr" target="#b0">[1]</ref>. New forms and methods of counteraction have appeared. The classic forms of confrontation have been replaced by hybrid methods. They are of a hidden nature and are carried out mainly in the political, economic, informational, and other spheres. Solving the issues of risk management and information protection, countering attacks, and information impacts remain relevant for all of us.</p><p>Nowadays, game-theoretic methods <ref type="bibr" target="#b1">[2]</ref> are successfully used to solve a wide variety of issues. The application of game theory in solving problems of risk estimating in information wars, information and information-psychological confrontation, information and geopolitical areas gives especially great benefit.</p><p>Game theory is a mathematical theory of conflict situations. In these situations, the interests of two or more parties collide, which pursue different, opposite goals. The direct subject of study of the game theory is the mathematical analysis of a formalized model of conflict, which takes into account the peculiarities of a real conflict situation. The technique itself is the formalization of a specific conflict situation does not apply to the mathematical theory of games. It is within the competence of specialists in the field, which is affected by this conflict situation.</p><p>Each conflict situation, in terms of risk assessment, is a complex situation. Risk analysis is hampered by many secondary factors. Therefore, in order to make possible a mathematical analysis of the situation, it is necessary to abstract from random factors and builds a simplified formalized model of the process and risk management factors. In this case, the formalization should be such that the possible ways of behavior of the participants and the results are visible, to which all possible combinations of actions of all participants in the conflict lead.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Literature Survey</head><p>Following modern research trends can be identified in this field: building influence models (information cascades (IC) <ref type="bibr" target="#b2">[3]</ref>; linear thresholds (LT) <ref type="bibr" target="#b3">[4]</ref>, probabilistic models <ref type="bibr" target="#b4">[5]</ref>; construction of effective algorithms for maximizing the impact (based on the apparatus of submodular functions (greedy algorithm) and its improvement, CELF <ref type="bibr" target="#b5">[6]</ref>, CELF ++ <ref type="bibr" target="#b6">[7]</ref>); using local properties of the graph (LDAG <ref type="bibr" target="#b7">[8]</ref>, SimPath <ref type="bibr" target="#b8">[9]</ref>); thinning the graph <ref type="bibr" target="#b9">[10]</ref>; simulated annealing <ref type="bibr" target="#b10">[11]</ref>; network monitoring optimization algorithms <ref type="bibr" target="#b5">[6]</ref>; variations of the influence maximization problem and solution algorithms (maximizing influence blocking <ref type="bibr" target="#b11">[12]</ref>, maximizing influence taking into account time <ref type="bibr" target="#b12">[13]</ref>, thematic distribution of influence <ref type="bibr" target="#b13">[14]</ref>); game-theoretic models of information influence <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Purpose and Objectives</head><p>The analysis of scientific and technical literature <ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref> showed that to date the following issues of game theory application have not been solved within the problem of risk management for information protection:</p><p> The task of risk management for information protection has not been structured.  No areas of risk quantitative estimates have been found.  No guaranteed assessments of the risk level of information security were found.  Optimal strategies for attacking and protecting information have not been found.  The solution of information protection issues described by stochastic models is not fully found;  The behavior of information attacks during information confrontations has not been studied. Modeling of information attack processes involves the risk management and reflection in the developed models of dynamic properties due to the conflicting nature and related ideas about the optimal distribution of information resources of players <ref type="bibr" target="#b21">[22]</ref>.</p><p>Mathematical modeling of physical processes by methods of game theory is based on the following factors that verbally determine the essence of this theory <ref type="bibr" target="#b22">[23]</ref>:</p><p> The presence of a system of differential equations, which describes the change over time in the parameters of the processes being modeled.</p><p> Definition of admissible controls of players, in the form of a class of functions on which the corresponding restrictions are imposed.</p><p> Goals of players in the form of functionalities.  Information that is available to players at the beginning of the game and in the process. Thus, the use of game theory in information warfare for the purpose of risk management requires detailed research, which is the purpose of this article.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Solutions of Games with a Choice of Time</head><p>Tasks related to the timing of actions occur in many problems of information confrontation, which use game theory applications <ref type="bibr" target="#b23">[24]</ref>. In such situations, the possible actions of the players are set in advance. During the action, the goal is set by strategic decisions of the players (the attacker and the defending side). In general, the payoff function of such games has the following form <ref type="bibr" target="#b24">[25]</ref> 𝑀(𝑥, 𝑦) = { 𝐾(𝑥, 𝑦) 𝑓𝑜𝑟 𝑥 &lt; 𝑦, 𝐼(𝑥) 𝑓𝑜𝑟 𝑥 = 𝑦, 𝐿(𝑥, 𝑦) 𝑓𝑜𝑟𝑥 &gt; 𝑦 <ref type="bibr" target="#b0">(1)</ref> here various restrictions can be imposed on the functions 𝐾, 𝐼, and 𝐿. They are determined by the specific conditions of the problem being solved.</p><p>Many kinds of research <ref type="bibr" target="#b25">[26,</ref><ref type="bibr" target="#b26">27]</ref> have been devoted to the study of games with payoff function <ref type="bibr" target="#b0">(1)</ref>. The corresponding mutually exclusive classification of all types of games are given in Karlin's monograph <ref type="bibr" target="#b26">[27]</ref>. Before starting the results, we introduce some notation. We denote the distribution function P(x), which has a jump in 𝛼 at zero and a jump in 𝛽 at unity, by 𝑃(𝑥) = (𝛼𝐼 0 , 𝑃 𝑎𝑏 (𝑥), 𝛽𝐼 1 ) where the distribution density 𝑃 𝑎𝑏 (𝑥) is a continuous function in the entire interval [𝑎, 𝑏] ⊂ [0,1].</p><p>Therefore, the following theorem is true.</p><p>Theorem 1 <ref type="bibr" target="#b26">[27]</ref>. Let the payoff function of a continuous game has the following form:</p><formula xml:id="formula_0">𝑀(𝑥, 𝑦) = { 𝐾(𝑥, 𝑦) 𝑓𝑜𝑟 𝑥 &lt; 𝑦, 𝐿(𝑥, 𝑦) 𝑓𝑜𝑟 𝑥 &gt; 𝑦, 𝐾(𝑥, 𝑦) = 𝐿(𝑥, 𝑥)<label>(2)</label></formula><p>The functions 𝐾 and 𝐿 satisfy the following conditions:</p><p>1. The functions 𝐾(𝑥, 𝑦) and 𝐿(𝑥, 𝑦) have continuous third partial derivatives in their domains of definition.</p><p>2. The derivatives 𝐾 𝑥𝑥 (𝑥, 𝑦) and 𝐾 𝑦𝑦 (𝑥, 𝑦) are strictly negative for 𝑥 ≤ 𝑦, and the derivatives 𝐿 𝑥𝑥 (𝑥, 𝑦) and 𝐿 𝑦𝑦 (𝑥, 𝑦) are strictly negative for 𝑥 ≥ 𝑦.</p><p>3. The function 𝐾(𝑥, 𝑦) strictly increases in y and strictly decreases in x, and the function 𝐿(𝑥, 𝑦) strictly increases in x and strictly decreases in y.</p><p>Then both sides have unique optimal mixed strategies of the following form</p><formula xml:id="formula_1">𝐹(𝑥) = (∝ 𝐼 0 , 𝑓(𝑥), 𝛽𝐼 1 ),<label>(3)</label></formula><formula xml:id="formula_2">𝐻(𝑦) = (𝛾𝐼 0 , ℎ(𝑦), 𝛿𝐼 1 ).<label>(4)</label></formula><p>Here, the function 𝑓(𝑥) and ℎ(𝑦) are continuous in the entire interval [0,1] and are obtained as the only solutions of a pair of integral equations:</p><formula xml:id="formula_3">∝ 𝑝 1 + 𝛽𝑝 2 = 𝑓 + 𝑇 𝑓 ,<label>(5)</label></formula><formula xml:id="formula_4">𝛾𝑝 1 + 𝛿𝑝 2 = ℎ + 𝑅 ℎ<label>(6)</label></formula><formula xml:id="formula_5">𝑇 𝑓 = ∫ 𝐾 𝑦𝑦 (𝑥, 𝑦) 𝐾 𝑦 (𝑦, 𝑦) − 𝐿 𝑦 (𝑦, 𝑦) 𝑓(𝑥)𝑑𝑥 𝑦 0 + ∫ 𝐿 𝑦𝑦 (𝑥, 𝑦) 𝐾 𝑦 (𝑦, 𝑦) − 𝐿 𝑦 (𝑦, 𝑦) 𝑓(𝑥)𝑑𝑥 1 𝑦<label>(7)</label></formula><formula xml:id="formula_6">𝑅 ℎ = ∫ 𝐿 𝑥𝑥 (𝑥, 𝑦) 𝐿 𝑥 (𝑥, 𝑥) − 𝐾 𝑥 (𝑥, 𝑥) ℎ(𝑦)𝑑𝑦 𝑥 0 + ∫ 𝐾 𝑥𝑥 (𝑥, 𝑦) 𝐿 𝑥 (𝑥, 𝑥) − 𝐾 𝑥 (𝑥, 𝑥) ℎ(𝑦)𝑑𝑦 1 𝑥<label>(8)</label></formula><formula xml:id="formula_7">𝑝 1 = − 𝐾 𝑦𝑦 (0, 𝑦) 𝐾 𝑦 (𝑦, 𝑦) − 𝐿 𝑦 (𝑦, 𝑦)<label>(9)</label></formula><formula xml:id="formula_8">𝑝 2 = − 𝐿 𝑦𝑦 (1, 𝑦) 𝐾 𝑦 (𝑦, 𝑦) − 𝐿 𝑦 (𝑦, 𝑦) 𝑞 1 = − 𝐿 𝑥𝑥 (𝑥, 0) 𝐿 𝑥 (𝑥, 𝑥) − 𝐾 𝑥 (𝑥, 𝑥)<label>(10)</label></formula><p>𝑞 2 = − 𝐾 𝑥𝑥 (𝑥, 1) 𝐿 𝑥 (𝑥, 𝑥) − 𝐾 𝑥 (𝑥, 𝑥)</p><p>The constants ∝, 𝛽, 𝛾, 𝛿 are determined from the following conditions:</p><formula xml:id="formula_9">∫ 𝑓(𝑥)𝑑𝑥 1 0 = 1−∝ −𝛽, (0 ≤∝, 𝛽 ≤ 1)<label>(11)</label></formula><p>∫ ℎ(𝑦)𝑑𝑦</p><formula xml:id="formula_10">1 0 = 1 − 𝛾 − 𝛿, (0 ≤ 𝛾, 𝛿 ≤ 1)<label>(12)</label></formula><p>Thus, the solution of the game under consideration is reduced to the solution of integral equations. This solution is a simple task. These equations are classic integral equations. In particular, we use the expansion of unknown functions 𝑓 and ℎ in a Neumann series in order to find analytical solutions.</p><p>There are general results that can be formulated as the following theorem <ref type="bibr" target="#b26">[27]</ref>. Theorem 2. Let the payoff function of a continuous game has the following form:</p><formula xml:id="formula_11">𝑀(𝑥, 𝑦) = { 𝐾(𝑥, 𝑦) 𝑓𝑜𝑟𝑥 &lt; 𝑦, 𝑙(𝑥) 𝑓𝑜𝑟 𝑥 = 𝑦, 𝐿(𝑥, 𝑦) 𝑓𝑜𝑟 𝑥 &gt; 𝑦 (13)</formula><p>The functions 𝐾, 𝑙, 𝐿 satisfy the following conditions: 1. The functions 𝐾(𝑥, 𝑦) and 𝐿(𝑥, 𝑦) are defined and have continuous second partial derivatives on closed triangles 0 ≤ 𝑥 ≤ 𝑦 ≤ 1 and 0 ≤ 𝑦 ≤ 𝑥 ≤ 1, respectively.</p><p>2. The 𝑙(1) value lies between 𝐾(1,1) and 𝐿(1,1); the 𝑙(0) value lies between 𝐾(0,0) and 𝐿(0,0). 3. 𝐾 𝑥 (𝑥, 𝑦) &gt; 0 and 𝐿 𝑥 (𝑥, 𝑦) &gt; 0 are located in the corresponding closed triangles with the possible exception of 𝐿 𝑥 (1,1) = 0; 𝐾 𝑦 (𝑥, 𝑦) &lt; 0 and 𝐿 𝑦 (𝑥, 𝑦) &lt; 0 in the corresponding closed triangles with the possible exception of 𝐾 𝑦 (1,1) = 0.</p><p>Then, both sides have optimal strategies of the following form</p><formula xml:id="formula_12">𝐹(𝑥) = (∝ 𝐼 0 , 𝑓 ∝ 1 , 𝛽𝐼 1 ), 𝐻(𝑦) = (𝛾𝐼 0 , ℎ ∝ 1 , 𝛿𝐼 1 ),</formula><p>The distribution densities 𝑓 ∝ 1 and ℎ ∝ 1 are determined as solutions of the following integral equations: </p><formula xml:id="formula_13">𝑓 𝑎 1 (𝑡) − ∫ 𝑇 𝑎 1 (𝑥, 𝑡)𝑓 ∝ 1 (𝑥)𝑑𝑥 1 𝑎 =∝ 𝑝 1 (𝑡) + 𝛽𝑝 2 (𝑡);<label>(14)</label></formula><formula xml:id="formula_14">ℎ 𝑎 1 (𝑢) − ∫ 𝑈 𝑎 1 (𝑢, 𝑦)ℎ ∝ 1 (𝑦)𝑑𝑦 1 𝑎 = 𝛾𝑞 1 (𝑢) + 𝛿𝑞 2 (𝑢);<label>(15</label></formula><p>𝑞 2 (𝑢) = 𝐾 𝑥 (𝑢, 1) 𝑈(𝑢, 𝑢) − 𝐿(𝑢, 𝑢)</p><p>The constants ∝, 𝛽, 𝛾, 𝛿 and 𝑎 are determined from the following conditions</p><formula xml:id="formula_16">∫ 𝑓 𝑎 1 (𝑥)𝑑𝑥 1 𝑎 = 1−∝ −𝛽, (0 ≤∝, 𝛽 ≤ 1)<label>(20)</label></formula><formula xml:id="formula_17">∫ ℎ 𝑎 1 (𝑦)𝑑𝑦 1 𝑎 = 1 − 𝛾 − 𝛿, (0 ≤ 𝛾, 𝛿 ≤ 1)<label>(21)</label></formula><p>Remark 1. It follows the equation ( <ref type="formula">13</ref>) that if 𝐾(1,1) &lt; 𝐿(1,1), then the point 𝑥 = 1 and 𝑦 = 1 is a saddle point for 𝑀(𝑥, 𝑦). This follows from condition (2) of Theorem 1.</p><p>Corollary 1. For the case of 𝑙(𝑥) = 0 and −𝐾(𝑥, 𝑦) = 𝐿(𝑥, 𝑦), the game is called symmetric. The symmetric game is investigated for the case when the function 𝑀(𝑥, 𝑦) in the region 0≤ (𝑥 ≤ 𝑦 ≤ 1) is continuous in both variables and has continuous first-order partial derivatives 𝑀 𝑥 (𝑥, 𝑦) ≥ 0, 𝑀 𝑦 (𝑥, 𝑦) ≤ 0 for 𝑥 ≤ 𝑦 and the set of points for which 𝑀 𝑥 (𝑥, 𝑦) = 0 or 𝑀 𝑦 (𝑥, 𝑦) = 0 does not contain any interval of the form 𝑥 = 𝑐𝑜𝑛𝑠𝑡, 𝛽 1 &lt; 𝑦 &lt; 𝛽 2 or the form 𝑦 = 𝑐𝑜𝑛𝑠𝑡, ∝ 1 &lt; 𝑥 &lt;∝ 2 .</p><p>The optimal strategy is unique and has the following form for 𝐾(1,1, ) ≤ 0</p><formula xml:id="formula_18">𝐹(𝑥) = 𝐼 1 = { 0 𝑓𝑜𝑟 0 ≤ 𝑥 &lt; 1, 1 𝑓𝑜𝑟 𝑥 = 1.<label>(22)</label></formula><p>There is an optimal strategy of the following form for 𝐾(0,1, ) &gt; 0:</p><formula xml:id="formula_19">𝐹(𝑥) = 𝐼 0 = { 0 𝑓𝑜𝑟 𝑥 = 0, 1 𝑓𝑜𝑟 0 &lt; 𝑥 ≤ 1.<label>(23)</label></formula><p>In the case 𝐾(0,1, ) &lt; 0 &lt; 𝐾(1,1), we can assume without loss of generality 𝐾(𝑥, 𝑥, ) &gt; 0 for 0 &lt; 𝑥 ≤ 1. Then there is a uniquely defined interval of the form [𝑎, 1], 0 ≤ 𝑎 ≤ 1, such that the optimal strategy is as follows:</p><formula xml:id="formula_20">𝐹(𝑥) = { 0 𝑓𝑜𝑟 𝑥 = 0, ∝ 𝑓𝑜𝑟 0 &lt; 𝑥 ≤ 𝑎, ∝ − ∫ 𝑓 𝑎 1 (𝑧)𝑑𝑧 𝑓𝑜𝑟 𝑎 &lt; 𝑥 ≤ 1 𝑥 𝑎 (24)</formula><p>The function 𝑓 𝑎 1 (𝑥) is a continuous, positive function. The parameter ∝ is the jump of 𝐹(𝑥) at zero and is determined from the normalization equation:</p><formula xml:id="formula_21">∫ 𝑓 𝑎 1 (𝑧)𝑑𝑧 1 𝑎 = 1−∝<label>(25)</label></formula><p>From Theorem 1 it follows that the optimal strategy 𝐹(𝑥) for a symmetric game in the case under consideration exists only if it is possible to find numbers 𝑎, ∝, that satisfy the conditions 0 ≤ 𝑎, ∝&lt; 1 and such a continuous non-negative function 𝑓 𝑎 1 (𝑥) for 𝑎 &lt; 𝑥 &lt; 1 such that</p><formula xml:id="formula_22">𝑎𝐾(0, 𝑦) + ∫ 𝐾(𝑥, 𝑦)𝑓 𝑎 1 (𝑥)𝑑𝑥 𝑦 𝑎 − ∫ 𝐾(𝑦, 𝑥)𝑓 𝑎 1 (𝑥)𝑑𝑥 1 𝑦 = 0, (𝑎 &lt; 𝑦 &lt; 1)<label>(26)</label></formula><p>Remark 2. The case of the function 𝑀(𝑥, 𝑦), which increases in 𝑦 and decreases in 𝑥, using the substitution 𝑧 = 1 − 𝑥, 𝜂 = 1 − 𝑦 reduces to the case of increasing in 𝑥 and decreasing in 𝑦, which was considered in the Theorem 1.</p><p>Remark 3.</p><p>If in the Theorem 1, instead of the condition (1), we assume that (𝐾 𝑦 (𝑦, 𝑦) − 𝐿 𝑦 (𝑦, 𝑦)) &gt; 0 and (𝐾 𝑥 (𝑥, 𝑥) − 𝐿 𝑥 (𝑥, 𝑥)) &gt; 0, then one can verify <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b27">28]</ref> that the optimal strategies of both parties have the form of the distribution function 𝐹(𝑥) = (∝ 𝐼 𝑎 , 𝑓 𝑎𝑏 (𝑥), 𝛽𝐼 𝑏 ) and 𝐻(𝑦) = (𝛾𝐼 𝑎 , ℎ 𝑎𝑏 (𝑦), 𝛿𝐼 𝑏 ), where ∝, 𝛽, 𝛾, 𝛿 ≥ 0, and the function 𝑓 𝑎𝑏 (𝑥) and ℎ 𝑎𝑏 (𝑦) are obtained in the form of Neumann series in the eigenfunctions of the conjugate integral equations</p><formula xml:id="formula_23">𝑓 𝑎𝑏 (𝑡) − ∫ 𝑇 𝑎𝑏 (𝑥, 𝑡)𝑓 𝑎𝑏 (𝑥)𝑑𝑥 𝑏 𝑎 =∝ 𝑝 1 (𝑡) + 𝛽𝑝 2 (𝑡) (27) ℎ 𝑎𝑏 (𝑡) − ∫ 𝑈 𝑎𝑏 (𝑢, 𝑦)ℎ 𝑎𝑏 (𝑦)𝑑𝑦 𝑏 𝑎 = 𝛾𝑞 1 (𝑢) + 𝛿𝑞 2 (𝑢)<label>(28)</label></formula><p>Further, consider a special class of symmetric games for which 𝑀(𝑥, 𝑦) is not necessarily continuous in the set of variables at the points (0,0) and (1,1), and it is only required that the following limits exist 𝐾(0,0) = lim 𝑦→0 𝐾(0, 𝑦) ; 𝐾(1,1) = lim 𝑥→0 𝐾(𝑥, 1).</p><p>(</p><formula xml:id="formula_24">)<label>29</label></formula><p>We will assume that</p><formula xml:id="formula_25">𝐾(𝑥, 𝑦) = 𝑘 ( 𝑥 𝑦 ),<label>(30)</label></formula><p>The function 𝑘(𝑢) is continuously differentiable in the interval 0 ≤ 𝑢 ≤ 1, and its derivative 𝑘′(𝑢) does not change the sign on this interval. Moreover, the set of points 𝑢 for which 𝑘 ′ (𝑢) = 0 does not contain any interval.</p><p>It is easy to see that for the equation 𝑘 ′ (𝑢) ≥ 0, the negative strategy is 𝐹(𝑥) = 𝐼 1 , for the equation 𝑘(1) ≤ 0 and 𝐹(𝑥) = 𝐼 0 , for 𝑘(1) ≥ 0. The proof of this fact is based on the idea of finding sustainable strategies. For this, we write the equality 𝐶 1 (𝐹, +0) = 𝐶 1 (𝐹, 0)+∝ 𝐾(0,0) = 𝐶 1 (𝐹, 0)+∝ 𝑘(0).</p><p>(31)</p><p>The validity of this equality is established using <ref type="bibr" target="#b28">(29)</ref>. Indeed, for the equation 𝛿 &gt; 0 we have the following expression</p><formula xml:id="formula_26">𝐶 1 (𝐹, 𝛿) = ∫ 𝐾(𝑥, 𝛿)𝑑𝐹(𝑥) 𝛿−0 0 − ∫ 𝐾(𝛿, 𝑥)𝑑𝐹(𝑥) 1 𝛿 ,<label>(32)</label></formula><formula xml:id="formula_27">𝐶 1 (𝐹, 0) = − ∫ 𝐾(0, 𝑥)𝑑𝐹(𝑥) 1 +𝛿 .<label>(33)</label></formula><p>Thus</p><formula xml:id="formula_28">𝐶 1 (𝐹, 𝛿) − 𝐶 1 (𝐹, 0) = =∝ 𝐾(0, 𝛿) + ∫ 𝐾(𝑥, 𝛿)𝑑𝐹(𝑥) 𝛿−0 +0 − ∫ 𝐾(𝛿, 𝑥)𝑑𝐹(𝑥) 1 𝛿 + ∫ 𝐾(0, 𝑥)𝑑𝐹(𝑥) 1 +𝛿<label>(34)</label></formula><p>The first term on the right-hand side of formula (34) as 𝛿 → 0, taking into account <ref type="bibr" target="#b28">(29)</ref>, tends to ∝ 𝐾(0,0). In order to estimate the integrals in (34), for a given 𝜀 &gt; 0, we choose 𝜂 such that the total variation of 𝐹(𝑥) in [0, 𝜂] is less than 𝜀/4𝐾 0 , where 𝐾 0 = 𝑠𝑢𝑝|𝐾(𝑥, 𝑦)|. Then the first integral will be less than 𝜀/4, and the next two can be represented as:</p><formula xml:id="formula_29">∫ 𝐾(0, 𝑥)𝑑𝐹(𝑥) 𝜂 1+0 − ∫ 𝐾(𝛿, 𝑥)𝑑𝐹(𝑥) 𝜂 𝛿 + + ∫ (𝐾(0, 𝑥) − 𝐾(𝛿, 𝑥))𝑑𝐹(𝑥) 1+0 𝜂 = 𝐼 1 + 𝐼 2 + 𝐼 3 .<label>(35)</label></formula><p>It is obvious from (35) that all |𝐼 𝑖 | ≤ 𝜀/4, 𝑖 = 1,2,3. Hence, this proves the validity of (31). Let us first take the value 𝑎 = 0. From 𝐶 1 (𝐹, 𝑦) = 0 for 𝑎 &lt; 𝑦 &lt; 1 it follows that 𝐶 1 (𝐹, +0) = 0. For 𝑎 &gt; 0, it should be 𝐶 1 (𝐹, 0) = 0. It leads to a contradiction with (31), due to the expression 𝑘(0) &lt; 0. On the other hand, for ∝= 0 we have the following expression</p><formula xml:id="formula_30">𝐶 1 (𝐹, +0) = − ∫ 𝑘(0)𝑓(𝑥)𝑑𝑥 1 0 = −𝑘(0) ∫ 𝑓(𝑥)𝑑𝑥 1 0 = −𝑘(0) &gt; 0 (<label>36</label></formula><formula xml:id="formula_31">)</formula><p>that it is also impossible. If we take ∝&gt; 0, then from 𝐶 1 (𝐹, 𝑎) = 0, and strict decrease of the function we obtain</p><formula xml:id="formula_32">𝐶 1 (𝐹, 𝑦) =∝ 𝑘(0) − ∫ 𝑘 ( 𝑦 𝑥 ) 𝑓(𝑥)𝑑𝑥 1 𝑎<label>(37)</label></formula><p>on the interval 0 &lt; 𝑦 ≤∝ we get 𝐶 1 (𝐹, +0) &gt; 0. If ∝&gt; 0 and 𝐶 1 (𝐹, 0) = 0, then from expression (31) we obtain 𝐶 1 (𝐹, +0) =∝ 𝑘(0) &lt; 0. This is a contradiction. Hence ∝&gt; 0 and ∝= 0. In this case, expression ( <ref type="formula" target="#formula_22">26</ref>) is equivalent to the expression 𝐶 1 (𝐹, 𝑦) = 0 on the interval (∝ ,1) under the condition С 1 ′ (𝐹, 𝑦) = 0. It follows from this expression that, we obtain an integral equation for determining the density 𝑓(𝑥) 2𝑘( <ref type="formula" target="#formula_38">1</ref> </p><p>In this case, the normalization condition must be satisfied</p><formula xml:id="formula_34">∫ 𝑓(𝑥)𝑑𝑥 1 𝑎 = 1.</formula><p>The Remark 4.</p><p>For the case of 𝑘 ′ (𝑢) ≤ 0, it can be shown <ref type="bibr" target="#b27">[28,</ref><ref type="bibr" target="#b28">29]</ref> that optimal strategies are 𝐹(𝑥) =∝ 𝐼 0 + 𝛽𝐼 1 . In addition, it is easy to check the validity of the following expressions It follows from this expression that if the player 𝐺1 uses the strategy 𝐹 1 * , then the average payoff is calculated by the following formula position on the space of distribution functions, then only in this case the players can choose optimal strategies <ref type="bibr" target="#b29">[30]</ref>.</p><p>In general, the player 𝐺1 can guarantee himself a payoff of at least</p><formula xml:id="formula_35">𝜐 1 = max 𝐹 1 min 𝑦 ∫ 𝐶 1 (𝐹 1 )𝑑 1 0 𝐹 2 (𝑦) = max 𝐹 1 min 𝑦 𝐶 1 [𝐹 1 (𝑦)].<label>(39)</label></formula><p>Here</p><formula xml:id="formula_36">𝐶 1 (𝐹 1 ) = ∫ 𝑀(𝑥, 𝑦)𝑑𝐹 1 (𝑥) 1 0 .</formula><p>Similarly, the player 𝐺2, by the appropriate choice of the distribution function 𝐹 2 (𝑦), can guarantee himself a loss of no more than</p><formula xml:id="formula_37">𝜐 2 = min 𝐹 2 max 𝐹 1 ∫ 𝐶 2 (𝐹 2 )𝑑 1 0 𝐹 1 (𝑥) = min 𝐹 2 max 𝑥 𝐶 2 [𝐹 2 (𝑥)].<label>(40)</label></formula><p>Here</p><formula xml:id="formula_38">𝐶 2 (𝐹 2 ) = ∫ 𝑀(𝑥, 𝑦)𝑑𝐹 2 (𝑦)<label>1 0</label></formula><p>.</p><p>From equations (39) and (40) we obtain</p><formula xml:id="formula_39">𝜐 1 ≥ min 𝑦 𝐶 1 (𝐹 1 ) 𝜐 2 ≤ max 𝑥 𝐶 2 (𝐹 2 ),<label>(41)</label></formula><p>Let the player 𝐺2 choose the distribution function 𝐹 20 (𝑦) as his strategy, and let the player 𝐺1 know this choice. Naturally, assuming such an opportunity, the 𝐺2 player should strive to find a sustainable strategy. It follows from (41), it becomes clear that if the value 𝐶 2 (𝐹 2 ) has a maximum, then the player 𝐺1 will always get the best result, choosing a point 𝜒 0 that corresponds to this maximum</p><formula xml:id="formula_40">𝜐 0 ≤ 𝐶 2 (𝐹 2 (𝜒 0 )) = max 𝜒 𝐶 2 (𝐹 2 (𝜒)).</formula><p>It would be beneficial for the player 𝐺2 to bring the value of 𝐶 2 (𝐹 2 (𝑥)) to a minimum, but this is not always possible. The player cannot influence the form of the payoff function and the choice of 𝜒 0 by the player 𝐺1. Nevertheless, the player 𝐺2 can, in any case, try to choose the strategy 𝐹 20 (𝑦) so that the value of 𝐶 2 (𝐹 2 ) does not have a single maximum, that is, so that its "curve" has a flat top.</p><p>Similarly, if the player 𝐺2 has learned the strategy of the player 𝐺1, then he will always choose the point 𝑦 0 at which the function 𝐶 1 (𝐹 1 (𝑦)) will take the minimum value. In this case, the task of the player 𝐺1 is to choose such a strategy 𝐹 10 (𝑥) so that the function 𝐶 1 (𝐹 1 (𝑦)) does not have a single minimum.</p><p>We denote Ω 1 = {𝑥: 𝐶 2 (𝐹 2 (𝑥)) = 𝜈 1 = 𝑐𝑜𝑛𝑠𝑡} and Ω 2 = {𝑦: 𝐶 1 (𝐹 1 (𝑦)) = 𝜈 2 = 𝑐𝑜𝑛𝑠𝑡}, where 𝜈 1 and 𝜈 2 are arbitrary numbers, and 𝜐 1 ≤ 𝜈 1 ≤ 𝜈 2 ≤ 𝜐 2 .</p><p>If there is such a pair of real numbers (𝜈 1 ≤ 𝜈 2 ) and a pair of distribution functions (𝐹 1 , 𝐹 2 ), which simultaneously satisfies the following conditions 𝐶 1 (𝐹 </p><p>then the functions 𝐹 1 and 𝐹 2 will be called stable <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b29">30]</ref> strategies. The question of the existence of sustainable strategies for the payoff function 𝑀(𝑥, 𝑦) in most cases remains unsolved. The scheme itself finding sustainable strategies is always useful in many applications and, in particular, in the game theory with a choice of a moment in time. Such games do not require the definition of strategies that neutralize the enemy. It turns out <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b29">30]</ref> that instead of them one can be content with partially stable strategies, i.e. strategies that provide the player with a stable position in a certain subinterval of the unit interval.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>Widespread use of game theory in the analysis of attacks on information resources and countering them can significantly reduce errors and miscalculations that occur in the risk management of information security, which in turn minimizes the negative and adverse political, social, and financial consequences for the subjects of information warfare.</p><p>Systematic studies of the behavior for complex dynamic processes require consideration of a large number of risks, features, and relationships of typical attacks on information and informational influences. The investigated features contradict one another; however, each of them cannot be neglected, since they give us a complete picture of the process that is investigated or simulated.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>) 17 )</head><label>17</label><figDesc>𝑇 𝑎 1 (𝑥, 𝑡) = { −𝐾 𝑦 (𝑥, 𝑡) 𝐾(𝑡, 𝑡) − 𝐿(𝑡, 𝑡) ; 𝑎 ≤ 𝑥 &lt; 𝑡 ≤ 1; −𝐿 𝑦 (𝑥, 𝑡) 𝐾(𝑡, 𝑡) − 𝐿(𝑡, 𝑡) ; a ≤ 𝑡 ≤ 𝑥 ≤ 1; (16) 𝑈 𝑎 1 (𝑢, 𝑦) = { 𝐿 𝑥 (𝑢, 𝑦) 𝐾(𝑢, 𝑢) − 𝐿(𝑢, 𝑢) ; 𝑎 ≤ 𝑦 &lt; 𝑢 ≤ 1; 𝐾 𝑥 (𝑢, 𝑦) 𝐾(𝑢, 𝑢) − 𝐿(𝑢, 𝑢) ; 𝑎 ≤ 𝑢 ≤ 𝑦 ≤ 1; (𝑝 1 (𝑡) = −𝐾 𝑦 (0, 𝑡) 𝐾(𝑡, 𝑡) − 𝐿(𝑡, 𝑡) (18) 𝑝 2 (𝑡) = −𝐿 𝑦 (1, 𝑡) 𝐾(𝑡, 𝑡) − 𝐿(𝑡, 𝑡) 𝑞 1 (𝑢) = 𝐿 𝑥 (𝑢, 0) 𝐾(𝑢, 𝑢) − 𝐿(𝑢, 𝑢)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>𝐹(𝑥) = { 𝐼 1 (𝑥)𝑓𝑜𝑟 𝑘(0) &lt; 0, ∝ 𝐼 0 (𝑥) + (1−∝)𝐼 1 (𝑥) 𝑓𝑜𝑟 𝑘(0) = 0 (0 ≤∝≤ 1), 𝐼 0 (𝑥) 𝑓𝑜𝑟 𝑘(0) &gt; 0.The solution of the game 𝐺(𝑀, [0,1]) with the payoff function 𝑀(𝑥, 𝑦), (0 ≤ 𝑥, 𝑦 ≤ 1) is called a pair of distribution functions (strategies) 𝐹 1 * and 𝐹 2 * and a real number 𝜐 (value of the game) that satisfies the condition ∫ 𝑀(𝑥, 𝑦)), 0 ≤ 𝑥, 𝑦 ≤ 1.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>1 (𝑦)) { = 𝜈 1 𝑓𝑜𝑟 𝑦 ∈ Ω 2 , &gt; 𝜈 1 𝑓𝑜𝑟 𝑦 ∉ Ω 2 .</figDesc><table><row><cell>(42)</cell></row><row><cell>= 𝜈 2 𝑓𝑜𝑟 𝑥 ∈ Ω 1 , &gt; 𝜈 2 𝑓𝑜𝑟 𝑥 ∉ Ω 1 , 𝐶 2 (𝐹 2 (𝑥)) {</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Pirchalava</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Khoroshko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Khohlachjova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">E</forename><surname>Shelest</surname></persName>
		</author>
		<title level="m">Informacionnoe protivoborstvo v sovremennyh uslovijah</title>
				<imprint>
			<publisher>CP Komprint</publisher>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Dixit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Skeath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Mcadams</surname></persName>
		</author>
		<title level="m">Games of Strategy</title>
				<imprint>
			<publisher>W.W. Norton</publisher>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note>5 th ed</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Maximizing the spread of influence through a social network</title>
		<author>
			<persName><forename type="first">D</forename><surname>Kempe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kleinberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Tardos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">9 th ACM SIGKDD international conference on Knowledge discovery and data mining</title>
				<meeting><address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="137" to="146" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Implementation of Social Engineering Attack at Institution of Higher Education</title>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">B</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Buriachok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">1 th International Workshop on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CybHyg)</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2654</biblScope>
			<biblScope unit="page" from="155" to="164" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Mining the Network Value of Customers</title>
		<author>
			<persName><forename type="first">P</forename><surname>Domingos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Richardson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Seventh International Conference on Knowledge Discovery and Data Mining</title>
				<meeting>the Seventh International Conference on Knowledge Discovery and Data Mining</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Learning influence among interacting Markov chains</title>
		<author>
			<persName><forename type="first">D</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Neural Information Processing Systems</title>
				<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Cost-effective outbreak detection in networks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Leskovec</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">13 th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)</title>
				<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="420" to="429" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">CELF++: Optimizing the greedy algorithm for influence maximization in social networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Goyal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">V S</forename><surname>Lakshmanan</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Scalable influence maximization in social networks under the linear threshold model</title>
		<author>
			<persName><forename type="first">W</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ICDM</title>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">SIMPATH: An Efficient Algorithm for Influence Maximization un-der the Linear Threshold Model</title>
		<author>
			<persName><forename type="first">A</forename><surname>Goyal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 11th International Conference on Data Mining</title>
				<imprint>
			<date type="published" when="2011">2011. 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Sparsification of influence networks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mathioudakis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">KDD</title>
		<imprint>
			<biblScope unit="page" from="529" to="537" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Simulated Annealing Based Influence Maximization in Social Networks</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Jiang</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>AAAI</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Influence blocking maximization in social networks under the competitive linear threshold model</title>
		<author>
			<persName><forename type="first">X</forename><surname>He</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">12 th SIAM International Conference on Data Mining</title>
				<imprint>
			<publisher>SDM</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Time-critical influence maximization in social networks with timedelayed diffusion process</title>
		<author>
			<persName><forename type="first">W</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">26 th Conference on Artificial Intelligence</title>
				<imprint>
			<publisher>AAAI</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Social influence analysis in large-scale networks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Tang</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>KDD</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">A double oracle algorithm for zero-sum security games on graphs</title>
		<author>
			<persName><forename type="first">M</forename><surname>Jain</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">10 th International Conference on Autonomous Agents and Multiagent Systems</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">H</forename><surname>Nguyen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tambe</surname></persName>
		</author>
		<title level="m">Security Games for Controlling Contagion</title>
				<imprint>
			<publisher>AAAI</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Lenkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Peregudov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Khoroshko</surname></persName>
		</author>
		<title level="m">Metody i sredstva zashhity informacii: v 2-h t</title>
				<imprint>
			<publisher>Arij</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">Analiz informacionnoj bezopasnosti</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Kobozeva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Khoroshko</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>GUIKT</publisher>
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m">Differential Games: A Mathematical Theory with Applications to Warfare and Pursuit, Control and Optimization</title>
				<imprint>
			<publisher>Courier Corporation</publisher>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m">Differential Games</title>
				<imprint>
			<publisher>Courier Corporation</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">Smoljakov Teorija antagonizmov i differencial&apos;nye igry</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">R</forename></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Jeditorial URSS</publisher>
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Modelyrovanye zadach optymyzatsyy i dyfferentsyalnykh yhr, Naukova dumka</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Vasylev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Baranov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1989">1989</date>
		</imprint>
	</monogr>
	<note>In Ukraininan</note>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Petrosjan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Zenkevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">V</forename><surname>Shevkopljas</surname></persName>
		</author>
		<title level="m">Teorija igr</title>
				<meeting><address><addrLine>BXB-Peterburg</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Krushevskij</surname></persName>
		</author>
		<title level="m">Teorija igr, Kniga po Trebovaniju</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Dresher</surname></persName>
		</author>
		<title level="m">Games of Strategy: Theory and Applications</title>
				<imprint>
			<publisher>Prentice Hall</publisher>
			<date type="published" when="1961">1961</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Karlin</surname></persName>
		</author>
		<title level="m">Matematicheskie metody v teorii igr, programmirovanii i jekonomike</title>
				<imprint>
			<publisher>Mir</publisher>
			<date type="published" when="1964">1964</date>
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Eine Bemerkung zur Theorie der symmetrischen Zeltspide, Elektron. Juf</title>
		<author>
			<persName><forename type="first">L</forename><surname>Wolfersdorf</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">-verarb und Kybernet</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="54" to="68" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m" type="main">Teoretychni osnovy modeliuvannia protsesiv napadu na informatsiiu metodamy teorii dyferentsialnykh ihor ta dyferentsialnykh peretvoren</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">V</forename><surname>Hryshchuk</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
			<pubPlace>Ruta</pubPlace>
		</imprint>
	</monogr>
	<note>In Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">The use of Game Theory to Study Processes in the Informational Confrontation</title>
		<author>
			<persName><forename type="first">V</forename><surname>Khoroshko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Scientific and Practical Cyber Security Journal</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="45" to="51" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
