<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>N.N.
Brailovskyi. Building Cyber-Security
Systems of Information Networks Based on
Intellectual Technologies // Scientific &amp;
practical cyber security journal (SPCSJ)
№1. [Electronic journal]. URL:
http://journal.scsa.ge/issues/ 2017/09/432.
[6] N. Lukova</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1109/ATIT50783.2020.9349332</article-id>
      <title-group>
        <article-title>Problems of Analysis and Forecasting of Information and Psychological Influences in Social Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mykola Brailovskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Toliupa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Bohdana Havrylyshyna Street, 24, Kyiv, 04116</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>foreign and domestic authors</institution>
          ,
          <addr-line>such as V. Horoshko, V. Buryachok, A. Korchenko, V. Domarev, V. Bogdanovich, J. Koziol, M. Kuznetsov, Kr. Kaspersky, K. Mytnyk, I. Simdyanov</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>27</volume>
      <issue>2</issue>
      <fpage>6</fpage>
      <lpage>13</lpage>
      <abstract>
        <p>To protect against information and psychological influence, it is necessary to use not only defensive methods, but also preventive ones. Such tools include analysis and forecasting of events, information about which is beginning to appear and discuss on social networks with increasing frequency. The issues of influencing people and society through "soft power" and the use of network structures that can effectively calculate, predict and counteract the manifestation of manipulation in the digital space are considered.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Social networks</kwd>
        <kwd>analysis</kwd>
        <kwd>forecasting</kwd>
        <kwd>management</kwd>
        <kwd>information impact</kwd>
        <kwd>soft power</kwd>
        <kwd>2</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Today, online social networks are extremely
popular and are one of the main tools of
information and psychological impact on a large
part of the population, and for the most part on
young people. The need to counter information
security threats that can be implemented through
online social networks is confirmed by the
National Security Strategy and the Information
Security Doctrine of Ukraine, which indicates the
significant relevance of the study of information
processes in online social networks, which are
weighted heterogeneous networks.</p>
      <p>
        Profound changes in the attitude of most
countries of the world, including Ukraine, to their
own information and, consequently, cyber
security prompt to pay more and more attention to
the development of recommendations on
shortand long-term priorities for security sector
transformation in search and collection of
information from open and relatively open
sources. , as well as its extraction from closed
electronic sources, while caring about the
protection of its own information resource from
outside cyber influence [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Many publications of
      </p>
      <p>
        With the development of information systems
and the global Internet, in addition to gaining
significant opportunities for information
exchange, the world community has become too
vulnerable to outside cyberspace, namely from
blatant attempts to influence each other's
information and cyberspace through the use of
modern computing and / or special equipment and
related software (so-called cyber interventions)
and other manifestations of their destabilizing
negative impact on a particular object, which are
realized through the use of technological
capabilities of information and cyberspace,
creating a danger both for themselves and for
human consciousness as a whole (so-called cyber
threats) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        In the era of global intensification of
information processes and their penetration into
all areas (social, political, economic) of human
activity, when almost everyone has to perform
various tasks interacting with many elements of
IT infrastructure, the dependence of each
individual on information systems and networks
and its vulnerability in relation to extraneous
cybernetic influence are constantly
growing. Eventually, the human psyche is
traumatized, and this, in turn, can motivate it to
disclose information with limited access
(R&amp;D). That is why social engineers in search of
the objects of their attacks take into account
primarily the psychological state of those
involved [
        <xref ref-type="bibr" rid="ref3 ref4">3,4</xref>
        ].
      </p>
      <p>The most important tasks of information and
analytical support for working with online social
networks are their monitoring, analysis, as well as
forecasting and management.</p>
      <p>The first two tasks are used to understand the
processes taking place in social
networks. Monitoring includes obtaining and
structuring primary data. This collects the texts of
messages, links between users and links to
external resources. The capabilities of these
systems are largely determined by the richness of
the data used and the mode of their processing. If
possible, data analysis of the monitoring system
and analysis of social networks can be divided
into three types:
• systems that do not perform data analysis;
• systems that perform retrospective data
analysis;
• systems that perform real-time data analysis
[5-7].</p>
      <p>Real-time monitoring systems are more
complex to design and operate than complexes
that use retrospective data collection. Therefore,
the role of data obtained earlier and on the basis
of which some conclusions and forecasts have
already been made, as well as the creation of
appropriate knowledge bases, becomes
obvious. The analysis involves several stages of
primary data processing. First of all, basic
indicators are calculated that answer simple
quantitative questions, such as "how many users
are online?", "How many messages did the user
write?", "How many of them are active?", "How
many of them have a high level of authority. »,
Etc. Then the identification of statistical and
structural patterns in the obtained data, which
allows to understand the nature of the studied
network. For example, the types of distributions
that include discussions of certain topics. From
the point of view of practical application, the
greatest interest is the identification of specific
patterns in narrow subject discussions. Identifying
the most popular topics for discussion and, most
importantly, user reactions to them.</p>
      <p>The forecasting stage is used to predict with a
certain degree of probability the state of a social
network over a period of time under certain
conditions.</p>
      <p>They can focus on the analysis of various
objects of the social network [8], such as:
• the network as a whole (using aggregate
global indicators);
• subnets and communities;
• individual users;
• information messages;
• opinions (with the help of indicators of the
tone of the message on some information objects);
• external nodes − information resources of the
Internet. It should be noted that the information
object may be a person, event, organization, etc.</p>
      <p>According to the authors, to date, little
attention is paid to such a process as event
forecasting. This may be due to the fact that the
tasks of analysis, forecasting and management
may be different. First, depending on who sets the
task, who is the end user of the system, who is
interested in the topic. There are different types of
users who need to analyze, predict and manage
online social networks [9]:
• bodies of state power and local
selfgovernment;
• enterprises of the public and private sector of
the economy (commercial, research
organizations, mass media);
• society (political parties, individuals).</p>
      <p>Secondly, how much the expected forecast is
beneficial to the user. Will this forecast lead to a
general deterioration of the political or economic
situation of the user, and even national security in
general. There are cases, and there are many,
when after the analysis there is no reaction to the
situation or information about the event. Or
assumptions, forecasts of expected development
of a situation are not resulted. There is no alarm
signal for negative information. The question
arises: "Do we not see the threat or do not want to
see it?". This is especially true of cultural events
such as literature, cinema, pop, painting, etc.</p>
      <p>As you know, man lives in three dimensions −
in the real world, the information world and the
symbolic world. However, it is in today's world
that new technologies and means of
communication have such a powerful effect on
consciousness that real actions and events only
become significant when they are presented in the
media, ie become a function of virtuality. As if the
event does not exist in real life, if it is not written
about on the site or it is not reflected in the social
network. This is one side of the issue. It is also
important that modern technology allows you to
easily and quickly manipulate the minds of large
masses of people, to form the necessary
manipulator images and symbols [10-12].</p>
      <p>The best example of such a situation, taking
into account the mass public social networks, is
just − cinema, called not for nothing one of the
classics of the world proletariat − the most
important of the arts. It allows you to embody all
possible methods of psychological influence −
video, sound, rhythm, ideas, guidelines, etc. In
movies, it is quite easy to inspire the viewer with
the words and actions of the protagonist algorithm
of actions and "correct" perception of the
problem. Examples are popular films made in
Russia at one time − "Brother" and "Brother-2",
"72 meters", "Kandahar", which represent
Ukrainians as a second-rate nation of traitors,
unobtrusively forming the necessary stereotype in
the viewer.</p>
      <p>Such approaches begin to control the
user. Therefore, it is necessary to recognize
external influences and predict what it may lead
to in the future.</p>
      <p>The management phase is to provide targeted
influences on the social network to translate
information processes into the desired state. At
this stage, high-quality recommendations to the
user are possible, the so-called "soft power".</p>
      <p>The concept of "soft power" (MS) was
introduced into scientific circulation ("Soft
power") by Joseph Nay − an American political
scientist, professor at Harvard University in the
early 90's of last century.</p>
      <p>The basic meaning of soft power is the
formation of attractive power or living conditions,
that is, the ability to influence people's behavior,
indirectly forcing them to do what they would
otherwise never have done. Such power becomes
not only based on persuasion, persuasion, or the
ability to motivate people to do something with
arguments, but also on the "assets" that produce
its attractiveness. To achieve this, according to
Nay, is possible using the "power of information
and images", the power of meaning. In other
words, the core of "soft power" is intangibility,
and informativeness and mobility.</p>
      <p>Mild force on large masses of people can be
carried out in a relatively short period − it usually
does not exceed a few months. In this case, the
most effective soft power tools are the media,
traditional and new social media.</p>
      <p>In the long run, soft power is less dependent on
rhetoric, but more related to practice. In this case,
effective tools of "soft power" are: the provision
of services for language learning, culture, history,
higher education, as well as the development of
science, including social, whose main task is to
produce meanings − theories and concepts,
legitimizing the position and views of the state,
which pursues a policy of promoting their
worldview, traditions of life. The combination of
these strategies allows you to influence the system
of socio-cultural filters or "matrix of beliefs" of a
particular individual, society, to which this type of
influence is applied, forcing him to eventually
change his behavior to the desired manipulator.</p>
      <p>One of the ways to solve the above
problematic issues is to automate the management
of the protection of society from negative
information and psychological impact (IPI). This
automation should be understood as a set of
measures for the development, implementation
and use of hardware and software by the
appropriate officials in the interests of making
informed decisions to eliminate the destructive
influences on people of information flows
generated by the enemy or other unfriendly forces.</p>
      <p>Automation of control over the defense of
society from the enemy's IPI, first of all,
presupposes the presence at control points of
complexes of automation equipment (CAE) of
protection with the corresponding special
software (SSS).</p>
      <p>The creation of the latter can be based on a
logical-mathematical model, which is a
formalized description of the processes of
receiving, transforming and processing input
information, formulating the necessary
conclusions and proposals.</p>
      <p>As the input information necessary for
modeling the protection of society from negative
information and psychological impact, one should
first of all consider the initial information and data
characterizing the direction and scale of
the latter. In addition, data on the moral and
psychological state (MPS) of people and on the
factors that, in the current situation, have (will)
have the most significant impact on this state will
be of great importance.</p>
      <p>Determination (forecasting) of the direction
(topic) of negative IPI today, as a rule, is carried
out in free formulations after a specialist in the
information warfare body has studied the
information about the information activity of the
attacker. At the same time, this process can be
partially automated, provided that a systematic list
of possible topics of hostile propaganda is created
and included in the database (DB) of STRs.</p>
      <p>The scale of the IPI malefactor should be
understood as a generalized characteristic of the
capabilities of its forces and means of
psychological operations (PsO) in terms of the
destructive impact on the MPS of society. The
scale of the IPI is usually predicted on the basis of
a study of operational intelligence information
and reference data on the composition, tactical
and technical characteristics, the probable nature
of use, and the location of the enemy's PsO forces
and assets. Formalization of conclusions about the
scale of negative IPI in relation to society can be
ensured by transforming the initial characteristics
indicated
above
into
integral
quantitative
indicators of the capabilities of the enemy's PsO
forces and means:</p>
      <p>a) coverage of the target audience (the number
of people exposed to IPI);
b) by the strength (intensity) of the impact.</p>
      <p>The degree (or coefficient) of coverage of
people subjected to IPI by a group of forces and
means of the enemy's PSO at a certain point in
time (t) is calculated by the formula:
 ІПВ( ) =
 ІПВ( ) ,
 Σ
(1)
where:
funds,
 Σ
 ІПВ( )- the probable number of people falling
into the coverage area of the grouping of PsO
- the total number of personnel of the
inhabitants of the region.</p>
      <p>The specified coefficient will depend on the
number of means of influence of a particular type
in the operation area, the size of their coverage
areas, the characteristics of settlements (size,
infrastructure,
people
and
preferences, living standards, etc.).
their
views,</p>
      <p>Depending on the type of PsO tools, the
calculation of the size (area) of their coverage
areas has its own specifics. Thus, the coverage
areas</p>
      <p>of
propaganda
sound
of
and
the
television</p>
      <p>and
enemy,
as
well
radio
as
psychological weapons based on new physical
principles (infrasonic, ultrasonic, microwave and
psychotronic generators, flash noise ammunition,
sources of coherent and incoherent light), are
determined mainly by the range of their action
and, accordingly, power. And the impacts of
social networks are limited only by the Internet
coverage area.</p>
      <p>The total coverage area of the grouping of PsO
means will be determined by the outer boundaries
of the coverage areas of individual means when
they are overlaid. Calculation  ІПВ( ) requires a
special technique.</p>
      <p>It is advisable to determine the
probable
intensity of negative IPI on society on an n-point
scale (table), which is based on a prognostic
assessment of the strength of the influence of
various types of enemy psychoactive means on
the MPS society. In turn, this force is determined
by the form of information presentation (type of
psychotechnology), implemented in a specific
medium.</p>
      <p>When several types of enemy psycho means
are functioning, their integral force of impact on
the population should be calculated using the
formula:

 ІПВ = ∑ =1  ІПВ ,

(2)
where:  ІПВ is the force of influence of the i-th
type of psychoactive means, n is the number of
types of the enemy's psychoactive means in the
area of forthcoming actions.</p>
      <p>The scale of the intensity of the impact of the
main means of the enemy's PsO on the population
will be measured from 1 to 10, where 1 is the
lowest level of influence, and 10 is the highest.</p>
      <p>Ultimately, the probable scale of the enemy's
IPI, reflecting the potential of his forces and
means of PsO in the area of influence at the
moment t, can be calculated as the product of the
values of the capabilities of these forces and
means, measured in the range from 0 to 1, both in
terms of the coverage of society and by the
intensity of the impact:
 ІПВ( ) = KІПВ(t) ∙ FІПВ ,
(3)
with  ІПВ( ) &lt;0.3, the scale (level) of negative IPI
should be
&lt;  ІПВ(
)considered insignificant,
with
0.3
0.7
−</p>
      <p>significant (average), and
with  ІПВ( )&gt; 0.7 − critical (extreme).</p>
      <p>The quantitative value of the indicator of the
scale
of
the
enemy's
information
and
psychological impact, first of all, allows us to
draw a conclusion about the place of the task of
protecting against this impact in a number of other
tasks
of
moral
and
psychological
support
(MPS). Mathematically,
this
conclusion
determines the specific amount of time, effort and
funds
allocated
for
the
implementation
of
measures to eliminate destructive influences on
the personality. So, already at  ІПВ( ) - 0.3, the
model for managing protection against negative
IPI should initiate the inclusion in the content of
MPS of preparation for measures to identify,
physical
(suppression)
and
of
informational
sources
of</p>
      <p>blocking
destructive
information, neutralizing carriers of demoralizing
views and moods, informing the population about
the expected nature of the impact enemy. At
higher values of the  ІПВ( ) considered model, a
request for the allocation of additional resources
to protect against negative IPI is activated.</p>
      <p>A prerequisite for the logical and mathematical
modeling of the optimal content of protection
against
negative</p>
      <p>IPI is the
availability
of
information about the
most effective
methods
(measures) of such protection in the database
(DB) of IPO measures. This mainly presupposes
their preliminary accumulation and structuring, as
well as the formulation of rules (like "if ...
then…") for a reasonable selection of measures to
neutralize demoralizing influences on the
population in relation to the current situation. The
main source of this information should be
considered expert knowledge obtained through
studying the opinions of experts, analysis of
guidance documents, practical experience and
conclusions of scientific research in the field of
information warfare. On the basis of the collected
information, a matrix (spreadsheet) is
constructed containing the most complete list of
measures to protect against negative IPI and the
parameters of each of them, including: its
information basis (subject matter); time, effort
and resources required to prepare and carry out
measures to protect one object; the number of
objects to be protected; the total amount of work
(time) for the preparation and conduct of the event
(hours) in order to solve the problem on a regional
or national scale. The matrix of measures to
protect against negative IPI and the database of
IGO activities as a whole should be maximally
coupled with the database of IGO information
resources (national security).</p>
      <p>The choice of the specific content of protection
against negative information and psychological
impact is primarily due to the direction of the
latter, as well as the conclusions expressed in
numerical values from the assessments of the
moral and psychological state of the population,
the socio-political situation and other factors that
have a significant impact on the Ministry of
Railways of society, taking into account the
available temporary resource of forces and means
of MPO. At the formalized level, the choice is
made by means of logical links to the database
cells containing the codes of the information basis
and the names of the activities that satisfy the
previously formulated rules of the specified
choice. As a result, "at the output" of the model,
proposals are formed on the most appropriate
measures to protect against negative IPI,
indicating their subject matter, duration (time) of
carrying out, the necessary forces and means.</p>
      <p>
        Daily life practice convincingly proves that
information and cyber security is a continuous,
extremely complex and multifaceted process, and
success in its implementation is determined by
society and depends on each of its representatives,
but above all on the steady implementation of
public policy in this area, purposeful efforts of all
branches. authorities, the scientific community,
leaders at all levels [6]. At the same time,
systematized measures to prevent numerous
threats should not hinder the increasingly rapid
formation of the national information and
cyberspace, as well as the integration of Ukraine
into the global information society [7]. That is
why the strategic task of state policy should be the
formation of a comprehensive system of
information and cyber security, which is based on
scientifically sound political, social and economic
criteria and world experience in legal and
organizational aspects of functioning [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">13-15</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>3. Conclusion</title>
      <p>Thus, it becomes obvious the need to pay more
attention to the processes taking place in social
networks and the information circulating in
them. As they say in the famous saying: "There is
no smoke without fire", that is, if some
information appears on the network and begins to
be heatedly discussed by users, then someone
needs it. And it can be an artificial excitement.</p>
      <p>Therefore, it is necessary to pay special
attention not only to its individual components,
but also to their totality. It is necessary to create
criteria, algorithms and software for forecasting,
preventing the situation and making the right
decisions in a timely manner. It is clear that the
government, which seeks to preserve sovereignty,
must have a set of tools that limit (minimize) the
effectiveness of manipulative influence of "soft
power". States need to develop and implement
those network structures that can effectively
detect, predict and counter the manifestation of
manipulation in the digital space, to work in the
same operational field as their potential and real
opponents.</p>
    </sec>
    <sec id="sec-3">
      <title>4. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Brailovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Khoroshko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Artemov</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
          <article-title>Lytvynenko Information war in modern conditions</article-title>
          .
          <source>Part</source>
          <volume>1</volume>
          // Scientific &amp; practical cyber security
          <source>journal (SPCSJ)</source>
          VOL
          <volume>5</volume>
          . №2. [Electronic journal]. https://journal.scsa.ge/ru/papers/inf
          <article-title>ormation-war-in-modern-conditions-part-1- 3/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.L</given-names>
            <surname>Buryachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.V</given-names>
            <surname>Toliupa.</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.B Tolubko</surname>
            ,
            <given-names>V.O</given-names>
          </string-name>
          <string-name>
            <surname>Khoroshko</surname>
          </string-name>
          .
          <article-title>"Information and cybersecurity: socio-technical aspect"</article-title>
          // Textbook. − K.: Nash format,
          <year>2015</year>
          . -
          <fpage>288p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.L</given-names>
            <surname>Buryachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.V</given-names>
            <surname>Toliupa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Semko</surname>
          </string-name>
          <article-title>Information and cyberspace. Security issues, methods and means of control</article-title>
          .
          <source>Tutorial. K .: LLC "Our format"</source>
          ,
          <year>2016</year>
          . −
          <fpage>176p</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>NN</given-names>
            <surname>Brailovsky</surname>
          </string-name>
          ,
          <article-title>VA Khoroshko Methods of recognizing cyberattacks taking into account the monitoring of the information Assessment of Honeypot Efficiency</article-title>
          .
          <source>EasternEuropean Journal of Enterprise Technologiesthis link is disabled</source>
          ,
          <year>2021</year>
          ,
          <volume>1</volume>
          (
          <issue>2</issue>
          (
          <issue>109</issue>
          )), pp.
          <fpage>14</fpage>
          -
          <lpage>23</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Androshchuk</surname>
            ,
            <given-names>А.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseiev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melenchuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lemeshko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lemeshko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>Improvement of project risk assessment methods of implementation of automated information components of non-commercial organizational and technical systems</article-title>
          . EUREKA, Physics and Engineeringthis link is disabled,
          <year>2020</year>
          ,
          <year>2020</year>
          (1), pp.
          <fpage>48</fpage>
          -
          <lpage>55</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Serhii</surname>
            <given-names>Yevseiev</given-names>
          </string-name>
          , Oleksandr Laptiev, Sergii Lazarenko, Anna Korchenko,
          <string-name>
            <given-names>Іryna</given-names>
            <surname>Manzhul</surname>
          </string-name>
          .
          <article-title>Modeling the protection of personal data from trust and the amount of information on social networks</article-title>
          .
          <source>Number</source>
          <volume>1</volume>
          (
          <year>2021</year>
          ), «EUREKA: Physics and Engineering» pp.
          <fpage>24</fpage>
          -
          <lpage>31</lpage>
          . DOI:
          <volume>10</volume>
          .21303/
          <fpage>2461</fpage>
          -
          <lpage>4262</lpage>
          .
          <year>2021</year>
          .001615
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>N.</given-names>
            <surname>Brailovskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Khoroshko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Artemov</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Opirskyi</surname>
          </string-name>
          , I. Ivanchenko Information war in Ukraine // Scientific &amp; practical cyber security
          <source>journal (SPCSJ)</source>
          VOL
          <volume>4</volume>
          . №4. [Electronic journal]. https://journal.scsa.ge/ru/papers/information -war
          <string-name>
            <surname>-</surname>
          </string-name>
          in
          <source>-ukraine-2/</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>