<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analysis of Features and Prospects of Application of Dynamic Iterative Assessment of Information Security Risks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Denis Berestov</string-name>
          <email>berestov@ukr.net</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleg Kurchenko</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuri Shcheblanin</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Korshun</string-name>
          <email>n.korshun@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana Opryshko</string-name>
          <email>t.opryshko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State Enterprise “Ukrainian Special Systems</institution>
          ,”
          <addr-line>83b Yuri Illenko str., Kyiv, 04119</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>24Bohdan Hawrylyshyn str., Kyiv, 04116</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>329</fpage>
      <lpage>335</lpage>
      <abstract>
        <p>The article is devoted to the approach to information security risk analysis. The factors influencing the risk analysis process are defined. In such a task there is always a prior probabilistic information about the implementation of threats, which may be changed after the receipt of new expert assessments or as a result of observation of relevant events. One way of “revision” of the relative acceptability of probabilistic models is Bayesian approach, the essence of which implies that the degrees of trust in possible probabilistic models to obtain data are considered. After the information has been received, the probabilities are re-evaluated. In the analysis of information security risks, probabilistic models of the studied systems are used. Probabilistic space of events in the field of information security is determined and in probabilistic space the probabilistic measure is set by this or that method. To solve this problem an artificial neural network can be used. As an alternative to Bayesian approach, the method of maximum function of likelihood can be considered, which is used in the statistical estimation of distribution parameters. Bayesian approach to solving problems has advantages, as many properties of estimates obtained using the likelihood ratio are not performed in the case of a small sample size. Applying Bayesian approach also helps to solve the question of mathematical methods of assessment of prior values that can take the parameters of information security risk. In the presence of a large amount of statistics, the wrong choice of a prior distribution of probabilities will not significantly affect a posterior one. In the absence of such data it is expedient to choose a distribution that minimally affects a posterior distribution. The estimation of probability of realization of threats to information security exploiting relevant vulnerabilities is obtained by using Bayesian network.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Risk</kwd>
        <kwd>Bayesian approach</kwd>
        <kwd>vulnerability</kwd>
        <kwd>information system model</kwd>
        <kwd>prognostication</kwd>
        <kwd>neural network</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <sec id="sec-1-1">
        <title>Formulation of the problem. In conditions of increasing complexity of automated systems, issues</title>
        <p>of information security are becoming more and more important for the state and business. Particular
attention is beginning to be paid to the analysis of information security risks as a necessary component
of an integrated approach to information security. As a result, a large number of standards and
approaches, the basic concepts and definitions in this field are characterized by plurality.</p>
      </sec>
      <sec id="sec-1-2">
        <title>The most appropriate definition of risk for most practical applications of information security is given in the ISO 27005 Standard and the BS7799 Standard. According to ISO 27005, “Information security risk is a potential opportunity to exploit asset vulnerabilities or a group of assets of a specific</title>
        <p>threat to the detriment of the organization.” As follows from this definition, risk is a complex quantity
defined as a function (or functional) of a number of other quantities. Difficulties in conducting risk
analysis are directly related to difficulties and errors in the analysis of risk components.</p>
      </sec>
      <sec id="sec-1-3">
        <title>In addition to organizational problems we can identify the following main issues:</title>
        <p> Obvious lack of information about the components of risk and their ambiguous properties.
 Creating a model of information system.
 The duration of the process and the rapid loss of relevance of the evaluation results.
 Aggregation of data from various sources including statistics and expert assessments.
 The need to involve specialists in risk analysis.</p>
        <p>In this regard, the methods of continuous audit and analysis of information security risks, which are
actively being developed, have acquired special relevance. Together with modern models of
management of information systems, information security management systems, monitoring and
security analysis, these methodologies allow to quickly and efficiently build and develop the
organization’s information security system. The main types of audit of security in the preparation of
terms of reference for the design and development of information protection system and - after its
implementation - assessing the level of its effectiveness and the main stages of the audit are discussed
in detail in the work [9].</p>
        <p>The system of continuous dynamic audit and risk analysis allows specialists to conduct iterative risk
assessment taking into account the available data on the business landscape, relevant information on
technologies that are used or intended for implementation. A special role in the continuous risk analysis
should be played by the function of forecasting information security risks. By automating the process
of accounting for threats associated with the emergence of new vulnerabilities in the standard software,
formalizing changes in the business landscape and information system, aggregation of data from
different sources, an environment can ве created that allows professionals to make reports on the level
of security of a particular information system, based on a series of consecutive reports compiled in a
short period of time.</p>
        <p>Processing the data using the methods of statistical forecasting will determine the optimal set of
countermeasures taking into account “future risks” and thus increasing the efficiency of their
implementation. Therefore, it is necessary to synthesize an approach to obtaining a quantitative estimate
and information security risk management in an automated system, taking into account:
 Possibility of aggregation of heterogeneous data.
 The opportunity to learn in the process of work and refine the assessments obtained at previous
stages.
 The ability to work with deliberately inaccurate data.
 The ability to automate most decision-making processes.</p>
      </sec>
      <sec id="sec-1-4">
        <title>To create such an environment requires the construction of a model of an automated system, which in itself is a complex task that usually implies significant simplifications. In order to solve these problems it is necessary to synthesize an automated system that allows to fully or partially automate the process of describing the operating environment and derivation of risk values.</title>
        <p>
          Analysis of recent research and publications. The issue of applying Bayesian approach to
information security risk analysis is affected in a number of works by Ukrainian and foreign authors,
among which we can highlight [
          <xref ref-type="bibr" rid="ref1 ref2">4–6</xref>
          ]. For example, in [
          <xref ref-type="bibr" rid="ref1">4</xref>
          ] an algorithm in decision - making in
operational management of information security tools based on Bayesian networks of trust and the
method of analysis of hierarchies are proposed, which allows to predict the state of protected resource
and prevent the development of dangerous situations in a timely manner.
        </p>
      </sec>
      <sec id="sec-1-5">
        <title>The use of Bayesian networks for information security risk assessment is substantiated in [5]. For</title>
        <p>calculation of conditional probabilities the approach on the basis of trees of attack as Bayesian special
networks is proposed . Bayesian networks provide an efficient way to combine historical quantitative
data with qualitative ones. It is possible to use conditional probabilities to take into account the
interdependence of vulnerabilities. Also the model of using Bayesian networks to assess the damage
from information security events is suggested.</p>
      </sec>
      <sec id="sec-1-6">
        <title>In the work [6] an attempt was made to compare Bayesian approach to risk analysis of information security with the approach based on the calculation of fuzzy logic (the integral of Choquet). 330</title>
      </sec>
      <sec id="sec-1-7">
        <title>In the works [7] and [8] it is shown that an artificial neural network can be used for solution of this</title>
        <p>problem. The most common approach is to train neural network so that it implements the nonlinear
function of discrimination, which provides a direct division of the observed input vectors into classes.</p>
      </sec>
      <sec id="sec-1-8">
        <title>More general and a promising approach is to teach the neural network so that the output values of the</title>
        <p>system were the posterior probabilities of belonging of input data to the set classes.</p>
      </sec>
      <sec id="sec-1-9">
        <title>It was also shown in [7] that it is possible to build a neural network, which after its training will</title>
        <p>directly obtain estimates of the conditional probability p (| y). It is also possible to define methods of
training of such networks and methods of evaluating the results obtained.</p>
      </sec>
      <sec id="sec-1-10">
        <title>The purpose of the article. The aim of the article is to highlight the application of Bayesian</title>
        <p>approach and the apparatus of Bayesian networks for the analysis of information security risks in the
implementation of security breaches by exploitation of the greatest vulnerability.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Theoretical Fundamentals of Research</title>
      <sec id="sec-2-1">
        <title>Bayesian approach in risk analysis. If it is necessary to estimate quantitative value of the risk, it is accepted to use the definition given in the BS 7799 Standard. Accordingly, definition of risk R can be given by the following expression:</title>
        <p>=  ∙ 
(1)
where P is the probability of realization of the threat and S is the magnitude of the consequences.</p>
      </sec>
      <sec id="sec-2-2">
        <title>In its turn the probability of realization of the threat is the product of the probability of realization</title>
        <p>of vulnerability to the probability of exploitation of this vulnerability. In this interpretation of the
probability of a random event, the realization of the threat can be considered as a random variable.</p>
      </sec>
      <sec id="sec-2-3">
        <title>Given the complexity of calculating the probability of threats based on analytical approach there is a</title>
        <p>need to assess the probability P for risk analysis tasks expertly or based on statistics on the frequency
of implementation of this class of threats for a given type of automated systems at a given time interval.</p>
      </sec>
      <sec id="sec-2-4">
        <title>In this case, the implementation of the second approach requires the use of a fairly large statistical material, accumulated over a certain period of time.</title>
      </sec>
      <sec id="sec-2-5">
        <title>The methodologies considered during the analysis do not contain direct instructions as to the</title>
        <p>methods of analysis of the statistical data used. In this regard it is expedient to study ways of solving
this problem in terms of mathematical statistics.The tasks similar to information security risk analysis
arise in different areas. Among them are risk analysis in the field of finance and management of software
projects.</p>
      </sec>
      <sec id="sec-2-6">
        <title>The main mathematical methods used in these fields are traditional school of statistical inference</title>
        <p>described in the works of Newman, Pearson, Fisher and others. A number of works offer alternative
methods of analysis. Methods based on Bayesian approach are of particular interest.</p>
      </sec>
      <sec id="sec-2-7">
        <title>As mentioned above, the task of risk analysis always has a prior probabilistic information on the</title>
        <p>mplementation implementation of threats that may be changed after receiving new expert assessments
or as the result of observing relevant events related to assets that confirm or refute a prior information.</p>
      </sec>
      <sec id="sec-2-8">
        <title>Many statistical tasks regardless of the methods of their solution have a common property: before a specific data set is obtained, as potentially acceptable for the situation under study, several probabilistic models should be considered. Once the data is obtained, there appears some form of knowledge of the relative acceptability of these models.</title>
      </sec>
      <sec id="sec-2-9">
        <title>One way to “revise” the relative acceptability of probabilistic models is Bayesian approach, which</title>
        <p>is based on Bayes’ theorem. Bayesian approach in the science of management is formulated in [1] as a
scientific discipline, which is based on the principle of maximum use of available prior information, its
regular review and revaluation taking into account the obtained sample data on the phenomenon or
process being investigated. Such a review is interpreted as learning, and the process of management
itself in the Bayesian approach is understood as a process of learning (adaptation).</p>
        <p>The essence of Bayesian approach is that it considers the degrees of trust in the possible probabilistic
models to obtain data. Degrees of trust are presented in the form of probabilities. After obtaining the
information using Bayes’ theorem, probabilities are revalued, i.e. new values of probabilities are
calculated, reflecting degrees of confidence in probabilistic models taking into account the newly
obtained data. Probabilistic models are used in the analysis of information security risks of the studied
systems.</p>
        <p>Their essence is that the probabilistic space of events is determined in the field of information
security and in probabilistic space a probabilistic measure is set by one or other method. In the
conditions of probabilistic models the observed parameter of information security system can be
considered as a random variable Yc with the density of probability P (y |). Based on these observations,
a conclusion is made about the probability distribution of random variable. Then according to Bayesian
formula:
or
 ( | )=  ( | ()∙)( )
 ( | )=  (</p>
        <p>)∙ ( )
 ( )
(2)
(3)</p>
        <p>
          Bayesian approach has found application in many areas, including cryptographic analysis, in the
field of risk analysis in various modern systems of artificial intelligence designed to work in conditions
of uncertainty. The most obvious is the use of this approach when using the apparatus of Bayesian
networks. The probabilistic model, called Bayesian network, is built using many variables and their
probability dependences, which are presented in the form of directional acyclic graph. The vertices of
the graph are variables or hypotheses, and the edges represent conditional dependence of variables or
hypotheses. There are effective methods [
          <xref ref-type="bibr" rid="ref7">2, 3</xref>
          ] of creation (calculation) and Bayesian network training.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Research Results</title>
      <sec id="sec-3-1">
        <title>Let’s consider the application of Bayesian approach to information security risk analysis in more</title>
        <p>
          detail. In [
          <xref ref-type="bibr" rid="ref9">10</xref>
          ] it is shown that the model of security violator, which is constantly adjusted on the basis
of new knowledge gained about the capabilities of the violator, and changes in the protection system
based on the analysis of the causes of violations that have occurred, will influence these causes and
more precisely determine the requirements for the information security system.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>We use this model of information security violator. In the case of implementation of network</title>
        <p>security threat an attacker develops an attack script that uses one vulnerability. In this case, the security
breach occurs through the exploitation of the largest vulnerability. If several vulnerabilities are
equivalent, one of them is chosen arbitrarily. Let’s consider the following Bayesian network. Its
interpretation in terms of risk analysis can be next.</p>
      </sec>
      <sec id="sec-3-3">
        <title>Let us denote the possible threat to the information security of the system as T, the probability of</title>
        <p>successful implementation of the threat—as p(T), the existing vulnerabilities—as U1, ..., Un, and the
probability of successful exploitation of vulnerabilities—p(U1), ..., p(Un) respectively. The conditional
“attack potential” value is denoted by A. The variable A[0,1] is a random variable with distribution f(A).</p>
      </sec>
      <sec id="sec-3-4">
        <title>Values i u1; ..., un [0,1]. We will say that the threat U is not realized if A &gt; p(Ui), and is realized if A &lt;</title>
        <p>p(Ui). For ease of writing, we denote as Ui the fact of exploitation of the vulnerability, and Ui is the
absence of the fact of exploitation of the vulnerability. As part of the analysis of risks it is important to
consider the likelihood of threats being realized through the exploitation of the relevant vulnerabilities.</p>
      </sec>
      <sec id="sec-3-5">
        <title>Probability of events in the common space in the conditions of the model of independent threats is defined by the expression:</title>
        <p>( , ( 1, … ,   ),  )=  ( |( 1, … ,   )) ( )∏
 =1  (  | )</p>
      </sec>
      <sec id="sec-3-6">
        <title>Performing marginalization to P (T) we obtain:</title>
        <p>( )= ∫  ( |( 1, … ,   ))
 [∫∏ =1  (  | ) ( )
)] ( 1, … ,   )
From the dichotomous nature of variables and conditions (6)
it follows that</p>
        <p>≤  (  )⇒  (  )= 0 and  &gt;  (  )⇒  (  )= 1
 (   )= 0 if  ≤  (  )and  (   )= 1 if  &gt;  (  )
 (  
)= 0 if 
≤  (  )and  (  
)= 1 if  &gt;  (  )</p>
      </sec>
      <sec id="sec-3-7">
        <title>This conclusion can be represented graphically for some values of p (Uj) and p (Uk) as follows. According to this approach we obtain</title>
        <p>=1
∫ ∏  (  | ) ( ) = min(1 −  1, … , 1 −   )(8)
∫  (¬   )∏  (</p>
        <p>) ( ) =  (0,   − ∑   ) (9)
 ≠
 ≠
(4)
(5)
(6)
(7)</p>
        <p>Substituting these expressions in (6) we obtain an estimate of the probability of implementation of
threats to information security. This conclusion can be applied to practical tasks of information security
risk assessment. Let’s consider the solution of this expression in the case of uniform distribution of f(A)
for two threats.</p>
        <p>∫  ( 1| ) ( 2| ) ( )</p>
        <p>= min(1 −  1, 1 −  2 ) (10)
∫  ( 1| ) (¬ 2| ) ( )</p>
        <p>= max(0,  2 −  1 )=
= max(0, (1 −  1)+ (1 − (1 −  2))− 1)(11)
∫  (¬ 1| ) ( 2| ) ( )</p>
        <p>= max(0,  2 −  1 )=
= max(0, (1 − (1 −  1))+ (1 −  2)− 1)(12)</p>
      </sec>
      <sec id="sec-3-8">
        <title>Substituting the obtained probabilities into expression (6), we obtain:</title>
        <p>( )=  ( | 1,  2)min(1 −  1, 1 −  2)+
+ ( | 1, ¬ 2)max(0,  2 −  1)+  ( |¬ 1,  2)max(0,  1 −  2)(13)</p>
      </sec>
      <sec id="sec-3-9">
        <title>After simple transformations, expression 14 takes the following form:</title>
        <p>( )=  ( | 1, ¬ 2)(1 −  1)+  ( |¬ 1,  2)(1 −  2)+
+( ( | 1,  2)−  ( |¬ 1,  2)−  ( | 1, ¬ 2))×
× 
(1 −  1, 1 −  2). (14)</p>
      </sec>
      <sec id="sec-3-10">
        <title>As an alternative to Bayesian approach, the method of maximum function of likelihood, which is used in the statistical estimation of distribution parameters, can be considered. Bayesian approach to solving the assigned problems has advantages, as many properties of estimates obtained using the likelihood ratio, are not performed in the case of a small sample size.</title>
      </sec>
      <sec id="sec-3-11">
        <title>Applying Bayesian approach also helps to address mathematical issues of methods for estimating</title>
        <p>the prior values that can take risk parameters of information security. An important feature is that in the
presence of a large volume of statistics, the wrong choice of prior probability distribution will not
essentially affect the posterior probability. However, what is especially true for solving problems of
analysis of information security risks, in the absence of such data it is advisable to choose distribution
that minimally affects the posterior distribution (so-called non-informative distribution).</p>
      </sec>
      <sec id="sec-3-12">
        <title>These conclusions are very important for the tasks of analysis of information security risks and can</title>
        <p>be very useful for solving the problem of their iterative dynamic analysis.</p>
        <p>The use of artificial neural networks to solve the assigned problem allows us to provide a number of
important properties of the system as well, including provision of the ability to teach the system in the
process of functioning and its adaptation to different conditions of functioning. When using them, there
is also no need for the previous detailed modeling of the automated system. The direction of further
research is aimed at the use of approximate estimates of a posterior probability of realization of events.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          4. Conclusions and Prospects of Further Research [1]
          <string-name>
            <surname>L. I. Lopatnikov</surname>
          </string-name>
          , Economic and Mathematical Dictionary: Dictionary of Modern Economic
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Science</surname>
          </string-name>
          , 5-th ed., Moscow, Russia: Delo,
          <year>2013</year>
          . [2]
          <string-name>
            <given-names>F. V.</given-names>
            <surname>Jensen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Nielsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Bayesian</given-names>
            <surname>Networks</surname>
          </string-name>
          and
          <string-name>
            <given-names>Decision</given-names>
            <surname>Graphs</surname>
          </string-name>
          . New York, NY: Springer
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          New York,
          <year>2016</year>
          . [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Russell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pearl</surname>
          </string-name>
          , Bayesian Networks, University of California,
          <source>Tech. Rep. R-277 November</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <year>2000</year>
          ,
          <year>2014</year>
          . [4]
          <string-name>
            <given-names>D. N.</given-names>
            <surname>Pogorelov</surname>
          </string-name>
          ,
          <article-title>Protection of information resources of the enterprise on the basis of multiagent</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>technology</surname>
          </string-name>
          ,
          <source>Ph.D. thesis, Ufa</source>
          ,
          <year>2006</year>
          . [5]
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Alguliev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. N.</given-names>
            <surname>Imamverdiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Derakshande</surname>
          </string-name>
          , Information security risk assessment
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>using Bayesian networks, Telecommunications</source>
          <volume>6</volume>
          (
          <year>2017</year>
          )
          <fpage>30</fpage>
          -
          <lpage>34</lpage>
          . [6]
          <string-name>
            <given-names>E.</given-names>
            <surname>Lavrentyev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Timonin</surname>
          </string-name>
          ,
          <article-title>Comparative analysis of approaches to information security risk</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <volume>3</volume>
          (
          <year>2014</year>
          )
          <fpage>97</fpage>
          -
          <lpage>101</lpage>
          . [7]
          <string-name>
            <given-names>C.</given-names>
            <surname>Bishop</surname>
          </string-name>
          ,
          <source>Pattern Recognition and Machine Learning</source>
          , Springer-Verlag. New York,
          <year>2016</year>
          . [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Dreyfus</surname>
          </string-name>
          , Neural Networks, Berlin/Heidelberg: Springer-Verlag,
          <year>2015</year>
          . [9]
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Roy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. P.</given-names>
            <surname>Mazur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Audit of information security is the basis of effective</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>protection of the enterprise</article-title>
          ,
          <source>Cybersecurity: Education, Science, Technique</source>
          <volume>1</volume>
          (
          <year>2018</year>
          )
          <fpage>86</fpage>
          -
          <lpage>93</lpage>
          , doi:
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          10.28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2018</year>
          .
          <volume>1</volume>
          .
          <fpage>8693</fpage>
          . [10]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shcheblanin</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Rabchun</surname>
          </string-name>
          ,
          <article-title>Mathematical model of information security's theat agent,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>Cybersecurity: Education, Science, Technique</source>
          <volume>1</volume>
          (
          <year>2018</year>
          )
          <fpage>63</fpage>
          -
          <lpage>72</lpage>
          , doi: 10.28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2018</year>
          .
          <volume>1</volume>
          .6372.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>