=Paper=
{{Paper
|id=Vol-3156/paper23
|storemode=property
|title=Information technologies of active control of complex hierarchical systems under threats and information attacks
|pdfUrl=https://ceur-ws.org/Vol-3156/paper23.pdf
|volume=Vol-3156
|authors=Volodymyr Sabat,Lyubomyr Sikora,Bohdan Durnyak,Olga Fedevych,Nataliia Lysa
|dblpUrl=https://dblp.org/rec/conf/intelitsis/SabatSDFL22
}}
==Information technologies of active control of complex hierarchical systems under threats and information attacks==
Information Technologies of Active Control of Complex
Hierarchical Systems under Threats and Information Attacks
Volodymyr Sabata, Lyubomyr Sikorab Bohdan Durnyakc, Olga Fedevychb, Natalia Lysab
a
Ukrainian Academy of Printing, 19, Pid Holoskom St., Lviv, 79020, Ukraine
b
National University «Lviv Polytechnic», 12, Stepan Bandera St., Lviv,, 79000, Ukraine
c
Ukrainian Academy of Printing, 19, Pid Holoskom St., Lviv, 79020, Ukraine
Abstract
The effect of active information, system and resource threats on the printing technology
structure with a hierarchical organization of production is complex, and therefore the
identification of influence channels and methods of countering attacks is an important
challenge. In order to solve problems of this type, it is necessary, in accordance with the
hierarchical structure, to separate the processes of technological, informational, managerial
and actual preparation of the printing production product. Accordingly, the primary threats
can be made at the stage of document design (content distortion). Information threats and
system attacks on the management of the production process have a complex structure and
their detection is an important task, as it is necessary to identify sources of threats, channels
of attacks and assess the level of risk if attacks occur.
According to the protection tasks analysis, the structural scheme of decision-making in
technical and publishing systems is substantiated and developed. On the basis of the decision-
making process studies, the model of man-made structure under threats on ACSPP resources
is constructed.
Keywords 1
Threats, attacks, control of hierarchical systems
1. Introduction
The emergence of various situations dangerous to municipal structures, man-made system and the
environment is objectively characterized by many interdependent factors, independent disturbances
and threats that cause crises, emergencies and catastrophic situations, which accordingly complicates
decision-making for control with limited information and material and energy financial resources.
Practice shows that problematic situations arise and proceed with different dynamics provoked by
threats and disturbances, incorrect management at the upper and middle levels of the hierarchy of
automated human-machine systems and complexes (AHMS and C), as well as in the social
environment of cities.
In printing production, two basic structures can be distinguished - the information system of
document preparation (electronic version) on the basis of a text document and the production system,
which provides the appropriate product quality according to the target order. These structures can be
attacked in series and in parallel, depending on the strength of the information attack and strategic
goals, which may be long-term. For this purpose, the basic structural schemes of production processes
are developed, the technique of an estimation of invasion risk and level of protection is proved.
IntelITSIS’2022: 3rd International Workshop on Intelligent Information Technologies and Systems of Information Security, March 23–25,
2022, Khmelnytskyi, Ukraine
EMAIL:v_sabat@ukr.net (Sabat V.); lssikora@gmail.com (Sikora L.); durnyak@uad.lviv.ua (Durnyak B.), olha.y.fedevych@lpnu.ua
(Fedevych O), lysa.nataly@gmail.com (Lysa N)
ORCID: 0000-0001-8130-7837 (Sabat V.); [0000-0002-6650-2703] (Durnyak B); [0000-0002-7446-1980](Sikora L); [0000-0002-8170-
3001] (Fedevych O); [0000-0001-5513-9614] (Lysa N)
©️ 2022 Copyright for this paper by its authors.
Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR Workshop Proceedings (CEUR-WS.org)
Accordingly, a table has been developed to assess possible intrusion channels and failure criteria and
the risk of destruction of system protection.
2. Control of complex hierarchical structures under threats and information
attacks
Solving the problems of control of complex hierarchical structures under threats and information
attacks requires forming a set of methods for each type of object and system and decompose the
problem into subject-oriented components (Fig. 1) [1]:
• the localization of the main factors of influence and threats and attacks;
• the assessment of heterogeneities and uncertainties in the structural hierarchy of the system
and levels of risk under threats;
• the physical and statistical analysis of factors of influence, disturbances, threats;
• the identification of cause-effect relationships in the system and the influence of factors on
various components of the structure;
• the organizational and technological models of decision-making processes and management
under uncertainty and risk;
• the identification of the structural organization of the system functioning (block diagrams,
digraphs, topology), the analysis of resources and human potential;
• the identification of models of dynamics of the control object for normal and emergency
modes, strategies of target management;
• the management and coordination strategies, calendar dynamic action plans for all levels of
the hierarchy of corporate, municipal and educational systems.
Figure 1: Structural and functional scheme of counteraction to attacks and active threats
Sustainable operation of permanent systems, taking into account the impact of a set of factors, is
maintained by constant management influences based on decision-making and implementation, both
automatic system and DM (DM – a decision maker) at different levels of the hierarchy of structural
organization [2–5].
The decision, in a broad sense, means the choice of action mode to achieve the goals of the system
control. The decision process has two components of activity [6] (Fig. 2):
1. Intellectual one (problem, goal, control, purposeful decision-making strategy);
2. Procedural, organizational and technological one (methods of implementing management
actions).
Figure 2: Block diagram of decision making in technological and publishing aggregate and integrated
structures under risk
2.1. Analysis of the decision-making process
Characteristic features of the decision-making process are respectively [7-13] (Fig. 3):
• the ability to choose how to act on a variety of alternatives (action plans) according to a goal-
oriented strategy;
• the goal (clear or blurred by the situation) that needs to be realized under threat factors;
• the need for a willful act of DM in choosing the method of solving the problem and the
corresponding mental determination to target actions;
• the timeliness, according to the stages of development and analysis of the situation, solving
the problem of overcoming the crisis of the control system;
• the authority of DM to act within its rights and powers;
• the specificity of the procedure for choosing the method of the control implementation;
• the constructiveness – taking into account the cost of changing the situation and the quality of
management actions in relation to the target based on the analysis of the situation;
• targeting of executive mechanisms of both ACS and DM;
• the implementation of strategies and management plans in accordance with the goal;
• the terminality of time for decision-making and implementation of actions in normal and
emergency situations caused by active threats.
Figure 3: Model of man-made structure under the influence of threats to resources
Thus, the situational control in hierarchical human-machine local and distributed systems is a
method of forming control actions based on strategies for predicting hazards and analyzing their
destructive factors, symptoms and strategies to reduce negative consequences, maintaining the
functional structure and technological modes with limited resources and acceptable product quality
(Fig. 4) [8].
Accordingly, all actions are formed on a set of control cycles, which corresponds to the allowable
{ }
terminal time of their implementation Т ці ® t j = 1, m on the axis Т ці . Each cycle corresponds to:
• time markers (ti , i = 1, k ) on the axis of the decision-making interval;
• time intervals of operations and actions on Т ці ® t i j = 1, m { } for every control act {A },
i
performed by the agent-operator.
{
Terminal time is divided into intervals ti , t i i= 1, m } (Fig. 4).
• the assessment of the situation in the system and threats based on data processing;
• the formation of a model for the situation solving according to the object condition;
• the generation of action plans and acts in accordance with the goal and situation;
• the distribution of tasks for intelligent and automatic implementation;
• decision-making and its implementation by an active intelligent agent-operator for block
management.
In this case, the balance condition of real and terminal time on the control cycle, which is formed
by the ACS operator [9], must be met, respectively:
" Tці МTF {е m
i= 1
t i Ј е i= 1 t iT ,
m
}
wherе t iT — is a terminal time interval (t iT ОTF ) for the operation implementation.
Figure 4:Block diagram of the situational management scenario model under threats to the system
in the terminal cycle Tці
The main symbols in Fig. 4: Аі — are acts of actions that are formed on the time interval of
decision-making process; (tos , toa , tr ), t p , (t pr , tl , tla ) — are time markers needed to complete cycles of
decision-making procedures according to the situation and the target task; ВМ – is an executive
mechanism; ПS – is a state space of the object; Тm — is the terminal time of the decision cycle
(formation and action); Fa, FB, Fc — are factors of influence, probability of occurrence of disturbances
and information attacks and threats to infrastructure; DAi — is the flow of aggregate data on the
control objects condition; (t os , t o , t sr , t pr , t os , t ad , t lk ) — are time intervals of operations
implementation when making decisions on the management cycle under threats and attacks on the
object; CUS — is a goal-oriented system that implements the management strategy.
3. Threats and crisis situations in hierarchical structures
Factors of internal and external influence can be the causes of crisis problem situations. Such
factors include:
• natural phenomena (storms, typhoons, floods) threats;
• production and technical processes that went out of normal operation due to loss of reliability of
units;
• political and economic situation;
• insufficient level of the operational staff skills;
• instability of the functional and structural system, random deviations, engineering errors in the
design, system);
• intentional provocative actions of external threats of the target type;
• loss of design documentation as a basis for the formation of action chains in decision-making
and project errors;
• conflict situations in the management team (leadership);
• equipment failures and breakdowns due to active intervention.
The above factors can negatively affect the decision-making process itself, as well as the
functioning of the hierarchical structure as a whole. Therefore, they need to be analyzed in detail and
their level of risk should be studied in the formation of protection systems, as well as in the process of
functioning of complex hierarchical structures, in particular those located in high-risk areas. It is
necessary to take into account both the losses that may result from the occurrence of negative factors
of external and internal influences, and methods of restoring the information system due to the
occurrence of such factors.
3.1. Classification and assessment of threats, research methodology
The threat, as a potential opportunity for attacks, has the ability to damage the IS and its assets. If
the threat is realized, it can interact with the IS and cause unwanted incidents that adversely affect the
system. Threats can be based on both natural and human factors, they can be realized accidentally or
intentionally. Sources of both accidental and intentional threats should be identified and the
probability of their implementation assessed [5-9]. The general classification of threats by type,
action, source and object of action is presented in Fig. 5 [10]. A specialized IS threat catalog
developed by Digital Security2, one of the leading Russian consulting companies in the field of
information security, as well as in the field of assessing the compliance of IS with the requirements of
ISO 27001/ISO 177993, was used to assess threats. In the course of the work, a survey was conducted
among system administrators of printing companies of Ukraine in order to increase the reliability of
assessment of criticality, probability of implementation and frequency of threats. Respondents were
sent a chart of the relationships between ACSPP assets, a table listing ACSPP assets and threats, and
asked to assess the criticality, probability, and frequency of threats to each ACSPP asset, taking into
account the relationships between assets. A scale from 0 to 3 was used for the assessment, where “0”
2
Official website — http://www.dsec.ru.
3
https://www.iso.org/isoiec-27001-information-security.html
is the absence of criticality, probability or frequency of threat to the asset, and “1”, “2” and “3”,
respectively, “low”, “medium” and "high" level of these indicators. The survey involved 10
respondents working in 10 printing companies. In order to cover the widest possible risks of ACSPP,
the analysis of the results was carried out on the principle of "maximum assessment", i.e. the highest
value was selected from a number of assessments of one indicator.
To conduct research, a scheme of possible types of threats that operate in the control system of the
technological process in printing on the basis of the system concept of classification of threats by
type, action, source and object of action was developed.
Figure 5: System concept of threats classification by type, action, source and object of action
3.1.1. Critical threat assessment methodology, which act on the management
information and aggregate structure of the technological system
Examining the assets of automated control systems for printing production (ACSPP), it can be
concluded that the objects of threats may be one or more assets of ACSPP. Tables 1 – 5 present a list
of possible threats to ACSPP, according to the classification (Fig. 5), as well as the criticality of the
threats implementation to ACSPP assets.
Table 1
Human physical threats aimed at IS resources
Criticality of the threat to the asset of ACSPP
Software modules of
Auxiliary software
Central database
Workstations
Internal data
Mobile PC
Networks
Servers
ACSPP
Threat
1 2 3 4 5 6 7 8 9
Human physical threats aimed at IS resources
Reading valuable information from paper and video 0 0 0 0 0 0 0 0
terminal PC devices
Modification of valuable information on paper 0 0 0 0 0 0 0 0
Destruction or damage of media with valuable 0 0 0 0 0 0 0 0
information
Replacement of media with valuable information 0 0 0 0 0 0 0 0
Media theft 0 0 0 0 0 0 0 0
Theft of mobile and handheld PCs 0 0 3 0 0 0 0 0
Theft of used materials (garbage, destroyed 0 0 0 0 0 0 0 0
documents)
Unauthorized use of equipment 0 3 3 3 3 3 3 3
Damage or intentional change of equipment 3 3 3 3 3 3 3 3
operation modes
Installation of devices for removal of 0 0 0 0 0 0 0 0
electromagnetic oscillations
Installation of means for listening to conversations 0 0 0 0 0 0 0 0
Installation of means for video surveillance by the 0 0 0 0 0 0 0 0
violator
Installation of noise generators and other devices 0 0 0 0 0 0 0 0
by the violator to create interference
Disclosure, transfer or loss of access restriction 0 3 3 3 3 3 3 3
attributes
Obtaining confidential information without the use 0 0 0 0 0 0 0 0
of special tools
Human physical threats at IS communication channel
1 2 3 4 5 6 7 8 9
Cable damage 3 0 0 0 2 2 2 2
Unauthorized wireless connection to the cable line 0 0 0 0 0 0 0 0
Unauthorized wired connection to the cable line 0 0 0 0 0 0 0 0
Installation of noise generators and other devices 0 0 0 0 0 0 0 0
by the violator to create interference
Unauthorized connection to wireless networks 0 0 0 0 0 0 0 0
The criticality4 of the threat is assessed on the scale described above. Dependencies between assets are
also taken into account in the assessment. [13] Determination of criticality coefficients was carried out at
various enterprises of the printing and publishing industry from 2019 to 2021. The research was conducted
with the aim of product quality, and became the basis for the development of methods to combat
information attacks in the workplace.
Table 2
Global and local physical threats aimed at IS
Criticality of the threat to the asset of ACSPP
Software modules of
Auxiliary software
Central database
Workstations
Internal data
Mobile PC
Networks
Servers
ACSPP
Threat
Disaster 3 3 3 3 3 3 3 3
Technogenic disaster 3 3 3 3 3 3 3 3
Military action 3 3 3 3 3 3 3 3
Revolution 3 3 3 3 3 3 3 3
Terrorist act 3 3 3 3 3 3 3 3
Local physical threats aimed at IS
Fire 3 3 3 3 0 0 0 0
Lightning strikes 3 3 3 3 0 0 0 0
Cross-reference 3 3 3 3 0 0 0 0
Failure of external energy sources 3 3 3 3 0 0 0 0
Failure of internal (reserve) energy sources 3 3 3 3 0 0 0 0
Sharp voltage fluctuations in the power grid 3 3 3 3 0 0 0 0
Ventilation system failure 2 2 2 2 0 0 0 0
Air conditioning system failure 3 3 3 3 0 0 0 0
Heating system failure 0 0 0 0 0 0 0 0
Violation of the circuit of closed systems near 2 2 2 2 0 0 0 0
IS objects
Physical threats related to the equipment failure
Loss of information as a result of data carrier 0 3 3 3 3 3 3 3
failure
Defective data carriers 0 3 3 3 3 3 3 3
Reduction of equipment reliability after the 2 2 2 2 0 0 0 0
end of its service life
Data loss or system malfunction due to 0 3 3 3 2 3 3 2
overflow of storage devices
4
The criticality of the treat is a measure of damage caused by this threat in its implementation.
Table 3
Local and logical threats
Criticality of the threat to the asset of ACSPP
Software modules of
Auxiliary software
Central database
Workstations
Internal data
Mobile PC
Networks
Servers
ACSPP
Threat
Change of the user privileges when running exploits 0 0 0 0 2 3 3 3
that use local OS vulnerabilities
Local OS vulnerabilities that do not require an 0 0 0 0 2 3 3 3
exploit to run the threat
Running files with viruses that affect the OS 0 0 0 0 2 3 3 3
Running the OS from external media 0 0 0 0 2 3 3 3
Modification of OS components 0 0 0 0 2 3 3 3
1 2 3 4 5 6 7 8 9
Failure to service the OS 0 0 0 0 2 3 3 3
Local logical threats aimed at software
Change of the user privileges when running exploits 0 0 0 0 2 3 3 3
that use local software vulnerabilities
Local application software vulnerabilities that do 0 0 0 0 2 3 3 3
not require an exploit to run the threat
Opening files with macro viruses 0 0 0 0 2 3 3 3
Modification of application software 0 0 0 0 2 3 3 3
Failure to service the application software 0 0 0 0 2 3 3 3
Local logical threats aimed at information,
stored and processed on the resource
Unauthorized modification of information in the 0 0 0 0 0 0 3 3
database stored on the resource
Unauthorized modification of information in the e- 0 0 0 0 0 0 0 0
mail system stored on the resource
Unauthorized modification of electronic documents 0 0 0 0 0 0 0 3
containing valuable information
Unauthorized reading of confidential information in 0 0 0 0 0 0 0 0
the database stored on the resource
Unauthorized reading of messages in the e-mail 0 0 0 0 0 0 0 0
system stored on the resource
Unauthorized reading of confidential information in 0 0 0 0 0 0 0 0
electronic documents stored on the resource
Loss or violation of the integrity of information 0 0 0 0 0 0 3 3
stored on the resource due to improper operation
of the software
Unauthorized malicious use of e-mail by an 0 0 0 0 0 0 0 0
infringer on behalf of a legal user
Deletion of valuable information stored in the 0 0 0 0 0 0 3 3
database by the violator
Deletion of e-mails by the violator 0 0 0 0 0 0 0 0
Deletion of electronic documents containing 0 0 0 0 0 0 2 3
valuable information by the violator
Table 4
Remote logical threats
Criticality of the threat to the asset of ACSPP
Software modules of
Auxiliary software
Central database
Workstations
Internal data
Mobile PC
Networks
Servers
ACSPP
Threat
Collection of information about the OS 0 0 0 0 0 0 0 0
Collection of information about the OS 0 0 0 0 0 0 0 0
Launch of exploits that use remote OS 0 0 0 0 3 3 3 3
vulnerabilities
Remote logical threats aimed at network services
Network service failure due to internal 0 0 0 0 0 0 0 0
software failure
Launch of exploits that use remote network 0 0 0 0 0 0 0 0
service vulnerabilities and result in denial of
service
Running exploits that use remote network 0 0 0 0 0 2 2 2
service vulnerabilities and cause arbitrary code
to run on a remote PC
User mailbox overflow 0 0 0 0 0 0 0 0
Selection of user authentication data 0 0 0 0 0 0 0 0
Remote collection of information about 0 0 0 0 0 0 0 0
network services
Remote logical threats aimed at information,
processed by network services
Interception of information provided by 0 0 0 0 0 0 0 0
network services using vulnerabilities in data
transmission protocols
Logical threats aimed at network equipment
Unauthorized access to the network device at 3 0 0 0 3 3 3 3
the software level
Denial of service at the software level 3 0 0 0 0 0 0 0
Unauthorized connection to wireless networks 0 0 0 0 0 0 0 0
Remote logical threats to communication protocols
Interception of network traffic at the logical 0 0 0 0 0 0 0 0
level due to incorrect configuration of network
devices or inability to differentiate traffic
between network nodes
Table 5
Threats related to physical exposure to humans
Criticality of the threat to the asset of ACSPP
Software modules of
Auxiliary software
Central database
Workstations
Internal data
Mobile PC
Networks
Servers
ACSPP
Threat
Unavailability of information due to incapacity 0 0 0 0 0 0 0 0
of IS users who have this information
Improper functioning of IS due to the inability 2 2 2 2 2 2 2 2
of the administrator
Reduced response to information security 2 2 2 2 2 2 2 2
incidents due to administrator incapacity
Violation of business continuity due to physical 0 0 0 0 0 0 0 0
action on the company employee
Threats related to psychological effects on humans
Disclosure of confidential information as a 0 0 0 0 0 3 3 3
result of psychological actions of third parties
on the company employee
Substitution of information as a result of 0 0 0 0 0 3 3 3
psychological actions of outsiders on the
company employees
Modification or destruction of information as a 0 0 0 0 3 3 3 3
result of psychological actions of third parties
on the company employees
1 2 3 4 5 6 7 8 9
Unavailability of information due to incapacity 0 0 0 0 0 0 0 0
of IS users who have this information
Improper functioning of IS due to the inability 2 2 2 2 2 2 2 2
of the administrator
Reduced response to information security 2 2 2 2 2 2 2 2
incidents due to administrator incapacity
Threats related to psychological effects on humans
Disclosure of confidential information by the 0 0 0 0 0 3 3 3
company employees
Modification or destruction of information by 0 0 0 0 0 3 3 3
the company employees
Substitution of information by the company 0 0 0 0 0 3 3 3
employees
Threats related to unintentional actions of the staff
Violation of information confidentiality due to 0 0 0 0 0 3 3 3
unintentional actions
Unintentional violation of information 0 0 0 0 3 3 3 3
integrity
Unintentional deletion of critical information 0 0 0 0 3 3 3 3
As some threats are not critical to any of ACSPP assets, there is no need to provide further results
of their assessment.
Comparing the data from Table 1 - 5, it is possible to make the list of the most critical threats for
typical ACSPP:
1. Human physical threats aimed at IS resources:
• unauthorized use of equipment;
• damage or intentional change of equipment operation modes
• disclosure, transfer or loss of access restriction attributes;
2. Human physical threats aimed at IS communication channel:
• Cable damage;
3. Global physical threats aimed at IS (full list of threats);
4. Local physical threats aimed at IS:
• cross-reference;
• failure of external energy sources;
• failure of internal (reserve) energy sources;
• sharp voltage fluctuations in the power grid;
• air conditioning system failure;
5. Physical threats related to the equipment failure:
• loss of information as a result of data carrier failure;
• defective data carriers;
• reduction of equipment reliability after the end of its service life;
• data loss or system malfunction due to overflow of storage devices;
6. Local logical threats aimed at OS:
• running files with viruses that affect the OS;
• running the OS from external media;
• modification of OS components;
• failure to service the OS;
7. Local logical threats aimed at software:
• opening files with macro viruses;
• modification of application software;
• failure to service the application software;
Thus, a list of critical threats to ACSPP is received, which may occur with a medium or high
probability and cause significant damage to one or more assets, which will lead to serious violations
in the work of ACSPP. For a more accurate analysis of threats in ACSPP, it is also necessary to
analyze the probability of their detection and the frequency of recurrence over a period of time, which
is planned to be done in future studies.
4. Conclusions
The analysis of information support of the complex system control process with a hierarchical
structure under threats is done as well as the process of document circulation in the formation and
decision-making process, based on which a structural and functional scheme is developed and
substantiated to counter threats and attacks on the control process in the hierarchical structure.
The block diagram of decision-making in technical and publishing systems under risk is
substantiated and developed.
The characteristic features of the decision-making process and parameters affecting this process
are analyzed, as a result of which a model of technogenic structure under threats to resources is
constructed.
Management actions on a set of control cycles to which the admissible time of their performance
corresponds are studied and the block diagram of the scenario of situational management under
threats on a terminal cycle is constructed.
The system concept of classification of threats and crisis situations in hierarchical structures by
type, action, source and object of action, influencing the decision-making processes, is presented.
A survey of ACSPP system administrators is conducted in order to increase the reliability of
assessing the threat criticality. Based on the studied data, the most critical threats to a typical
automatic control system are presented.
The results of research can be implemented in the design of control and protection systems not
only for automatic control systems, but also for any complex systems with a hierarchical structure
under threats and crises.
5. References
[1] .B. Boyer, Countering Hybrid Threats in Cyberspace.Cyber Defense Review. Vol. 2 Ed. 3,
2015. 11.
[2] Groome, D., Brace, N., Edgar, G., Edgar, H., Eysenck, M., Gobet, F., Law, R., Manly, T., Ness,
H., Pike, G., Scott, S., Styles, E.: An Introduction to Cognitive Psychology: Processes and
Disorders. Routledge, 4th edn. (2021). https://doi.org/10.4324/9781351020862 Title Suppressed
Due to Excessive Length 11
[3] Andonov, S. Safety Accidents in Risky Industries: Black Swans, Gray Rhinos and Other
Adverse Events. CRC Press, 1st edn. (2021).https://doi.org/10.1201/9781003230298
[4] Boy, G.A.: The Handbook of Human-Machine Interaction: A Human-Centered Design
Approach. CRC Press, 1st edn. (2011). https://doi.org/10.1201/9781315557380
[5] L. Sikora, R. Tkachuk, N. Lysa, I. Dronyuk, O. Fedevych, R. Talanchyk. Information-resource
and cognitive concept of threat's influence identification on technogenic system based on the
cause and category diagrams integration. IntellTSIS 2021. Proceedings of the 2nd International
Workshop on Intelligent Information Technologies & Systems of Information Security with
CEUR-WS Khmelnytskyi, Ukraine, March 24–26, 2021. Vol. 2853, pp. 398-416.
[6] L. Sikora, R. Tkachuk, N. Lysa, I. Dronyuk, O. Fedevych Information and Logic Cognitive
Technologies of Decision-making in Risk Conditions. IntellTSIS 2020. Proceedings of the 1st
International Workshop on Intelligent Information Technologies & Systems of Information
Security. Khmelnytskyi, Ukraine, June 10-12, 2020. pp. 340-356. http://ceur-ws.org/Vol-
2623/paper29.pdf
[7] Bhise, V.D.: Decision-Making in Energy Systems. CRC Press, 1st edn. (2021).
https://doi.org/10.1201/9781003107514
[8] Kozlova, L.P., Kozlova, O.A.: Using of fuzzy set theory when designing technical systems. In:
2015 XVIII International Conference on Soft Computing and Measure-ments (SCM). pp.
193{194 (2015). https://doi.org/10.1109/SCM.2015.7190453
[9] Tattam, D.: A Short Guide to Operational Risk. Routledge, 1st edn.
(2011).https://doi.org/10.4324/9781315263649
[10] Hovorushchenko T., Pavlova O. Method of Activity of Ontology-Based Intelligent Agent for
Evaluating the Initial Stages of the Software Lifecycle. Advances in Intelligent Systems and
Computing. 2019. Vol. 836. Pp. 169-178. doi:10.1007/978-3-319-97885-7_17
[11] Wiggins, M.W.: Introduction to Human Factors for Organisational Psychologists. CRC Press,
1st edn. (2022). https://doi.org/10.1201/9781003229858
[12] S. Demri, V. Goranko, M. Lange. Temporal Logics in Computer Science, Cambridge:
Cambridge University Press. 2016. 752 р.
[13] Balyk, V.M., Thuong, N.Q. Statistical synthesis of the principle of ra-tional organization of a
complex technical system. In: 2019 InternationalConference on Engineering and
Telecommunication (EnT). pp. 1{4 (2019). https://doi.org/10.1109/EnT47717.2019.9030569.
[14] F.G. Hoffman. Hybrid Warfareand Challenges, Joint Forces Quarterly 52, 2009.