<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Identifying the Transition of Interactions in Virtual Communities of Social Networking Services to Chaotic Dynamics</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kateryna Molodetska</string-name>
          <email>kateryna.molodetska@polissiauniver.edu.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhiy Veretiuk</string-name>
          <email>sergey.veretiuk@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Pilinsky</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”</institution>
          ,
          <addr-line>37, Prosp. Peremohy, Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The diversification of communication channels influenced by the development of information and communication technologies has made social networking services particularly popular among users. They provide actors with many tools not only for effective communication and networking in virtual communities but also for self-organization and coordination of interactions in real life. As a result of the diffusion of boundaries in the information space, social networking services have become an object of threats to the information security of the state. The experience of information operations against information security of the state has shown that because of targeted information impact on virtual communities of actors can occur chaotization of processes of their interaction. The result of such impact is a transition of such processes from online to real life in the form of mass civil protests. With the constant growth in the number of threats and the emergence of new methods of destructive information impact, the problem of their early detection and effective counteraction becomes particularly important. It is known that the transition of virtual community to deterministic chaos is characterized by increasing levels of entropy in the system. In this article, we use the kernel density estimation of the entropy distribution of the actors' interaction parameters in the social networking services to determine its dynamics to identify growth periods, preceding the system's transition to chaotic dynamics. Determination of the nature of entropy function's variation from time will make it possible to determine the moments of application of controlling influence on information space of the social networking services and actors, which will ensure reduction of the system's degrees of freedom with its subsequent transition to a given state of information security. In this state the structure of virtual communities' changes because of the selforganization of actors, providing information exchange in communities, which is resistant to destructive impact. Application of the proposed approach will improve the effectiveness of countering threats to state information security in the social networking services.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Social networking services</kwd>
        <kwd>chaotic dynamics</kwd>
        <kwd>kernel density estimation</kwd>
        <kwd>entropy</kwd>
        <kwd>Rössler attractor</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The growing influence of social networking
services on social communication processes has
turned them into a leading channel of
communication [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1-5</xref>
        ]. Under these conditions,
social networking services have become not only
a leading source of information due to a high
degree of trust in the content of the services but
also an instrument of covert influence on social
and political processes in the state [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6-8</xref>
        ]. Threats
to information security of the state in social
networking services of a communicative nature
are connected to the realization of the needs of
individuals, society and the state for the creation,
consumption, dissemination, and development of
national strategic content. Threats in social
networking services may be aimed at influencing
the mental and emotional state of actors,
influencing their freedom of choice, calling for
separatism, the overthrow of constitutional order,
violation of territorial integrity, discrediting state
authorities, supporting, accompanying, or
activating criminal or terrorist activity, etc. [
        <xref ref-type="bibr" rid="ref10 ref9">9,
10</xref>
        ]. In the conditions of globalization of the
national information space, absence of state
borders in virtual information environment,
constantly growing number of threats to
information security of the state, the problem of
modelling actors' interaction in virtual social
networking services communities becomes
especially topical. Research into processes of
interaction between actors in the information
space of the social networking services,
considering the influence of threats, will make it
possible to systematically counteract destructive
information influence, which remains
uncontrollable [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ].
      </p>
      <p>
        Analysis of recent research and publications
[
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13-15</xref>
        ] has shown that one of the promising
approaches to modelling social networking
services as a class of complex dynamic systems is
dynamic chaos theory. It allows considering key
properties of social networking services – high
sensitivity to initial conditions, as well as
openness, nonlinearity, non-equilibrium and
dissipativity of interaction in virtual communities.
When interaction in social networking services
turns to chaotic dynamics under the influence of
information operations, not only the prediction of
such interaction of actors becomes impossible, but
also the system's behavior itself changes
uncontrollably.
      </p>
      <p>
        Such behavioral features can occur not only in
the virtual space of the social networking services
but can also be reflected in the actions of citizens
in real life. Therefore, within the framework of
solving the problem of modelling actors'
interaction in virtual communities of services, not
only the synthesis of control actions but also the
point in time at which such a measure is
implemented, is of particular importance. This
approach will make it possible to suppress chaotic
dynamics of interaction and form prerequisites for
effective counteraction to threats to state
information security in the social networking
services [
        <xref ref-type="bibr" rid="ref11 ref15 ref16">11, 15, 16</xref>
        ].
      </p>
      <p>The purpose of the article is to determine a
point in time for effective implementation of the
control action, followed by the transition of virtual
communities of actors in the social networking
services from chaotic interaction with a given
state, in which the levelling of destructive
information influence the actors is ensured.</p>
      <p>To achieve the goal, the following tasks are
required:</p>
      <p>1) Formalize the interaction of actors in virtual
communities of social networking services under
the influence of threats using irregular attractors.</p>
      <p>2) Estimate system entropy using kernel
density estimation of actor interaction parameters
in social networking services.</p>
      <p>3) Identify existing precursors of chaotic
dynamics of actors' interaction in the social
networking services and give practical
recommendations for their early identification.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Modelling actors’ interaction in social networking services based on irregular attractors</title>
      <p>In the case of transition of social networking
services actors' interaction to deterministic chaos,
it is characterized by the high sensitivity of virtual
communities to changes in system parameters and
the action of disturbances, in particular
destructive information influences. Even if the
interaction of actors in the social networking
services is formalized by deterministic models, in
a state of deterministic chaos, their
communication turns into random and
unpredictable processes (Figure 1).</p>
      <p>To describe the interaction of actors in the
social networking services when the system
transitions to chaotic dynamics, it is advisable to
use irregular attractors. Even though social
networking services is a dissipative system, which
can be either open or non-equilibrium, using the
irregular attractors is appropriate.</p>
      <p>
        The features of irregular attractors are the
complex geometric structure of the set of states of
the system they describe. Such attractors are
characterized by a simultaneous combination of
both stability and instability. Therefore, irregular
attractors provide a high degree of adequacy in
describing the interaction of actors in the social
networking services, which are taking place under
the conditions of information confrontation. Such
attractors include Lorenz attractors, Rössler
attractors, and others [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ].
2.1.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Rössler chaotic system</title>
      <p>
        In general terms, the actors’ interaction in the
social networking services using the Rössler
irregular attractor is formalized as a system of
differential equations [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]
 ( )
where  ( ) is the destructive information
influence, which is carried out by the opposing
group in the social networking services
information space;  ( ) is the function which
characterizes the actors' ability to critically
perceive the content and determines the level of
information resistance to destructive information
influence;  ( ) is the function that determines the
actor's level of readiness for active actions in real
life, which is induced by destructive information
influence  ( ),  ( ) &gt; 0;  is a parameter that
determines the level of destructive information
influence on actors aimed at overcoming their
information resilience and is related in inverse
relation to  ,  &lt; 0;  is a parameter of actor's
readiness level to move to active actions in real
life;  is an information influence that is
performed using strategic communication
channels and is aimed at building information
resilience in actors,  &gt; 0;  is a parameter that
determines the actors' prior experience in
identifying threats in the social networking
services;  is an integrative parameter that
determines the actors' ability to switch to active
actions as a result of destructive information
influence and is formed as a result of individual
characteristics;  is a parameter that determines
the actors' ability to switch to chaotic dynamics
under the influence of destructive information
influence.
      </p>
      <p>
        To simulate the interaction of actors in the SIS
based on the synthesized model (1) were used the
tools of Google Collaboratory environment and
programming language Python. The bifurcation
diagram of the system of differential equations (1)
at values of parameters  = 1,  = 1,  = 1,  =
0.2,  = 0.2,  = {1; 10} is constructed, which is
presented in Figure 2.
Rössler bifurcation diagram is similar in nature
and behavior to the logistic transformation
bifurcation diagram (Figure 2 a, b) [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ]
  +1 =    (1 −   ).
(2)
      </p>
    </sec>
    <sec id="sec-4">
      <title>2.2. Determination of the chaotization metric of the system based on entropy</title>
      <p>To simplify the calculations, we further
analyze the behaviour of Rössler system in the 
plane based on the analysis of the bifurcation
diagram of the logistic transformation.</p>
      <p>
        It is known from analysis of sources [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ]
that a marker of chaotic dynamics appearance in a
system is a senior Lyapunov exponent. Despite
the developed mathematical apparatus associated
with the study of dynamical systems and their
behaviour based on Lyapunov exponents, this
approach has an analytical character. In practice,
it leads to post-analysis based on a statistical
retrospective analysis of the system parameters.
(a) the control parameter  ∈ (2.5; 4);
      </p>
      <p>
        It is well known that the bifurcation diagram in
its physical sense describes possible states of the
system depending on the control parameter 
[2426]. Each "slice" of the bifurcation diagram
{  ( )} describes a set of system states   ∈
  ( ),  ∈ (1;  ) is the number of system states
in the  -th "slice" of the bifurcation diagram. We
will determine the entropy of the system based on
a preliminary analysis of the probability density
of states   , for this purpose we use the
mathematical apparatus KDE (Kernel Density
Estimation) [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. Therefore, we transform the
sequence of "slices" into the sequence of
estimates of kernels of normalized probability
density distribution –   ( ).
      </p>
      <p>To determine the entropy of the system at
known values of the probability density
distribution, we use the expression for Shannon's
entropy [28]
  = − ∫   ( )
2(  ( )) .</p>
      <p>(3)</p>
      <p>Thus, for each set of states   ( ) the entropy
  is obtained. The variation of the entropy value
is shown in Figure 4.
(b) the control parameter  ∈ (3.8; 4);</p>
    </sec>
    <sec id="sec-5">
      <title>3. Modelling results</title>
      <p>The analysis of the bifurcation diagram and
entropy suggests the following:</p>
      <p>1. Local maximums of entropy are observed at
bifurcation points, which is interpreted by a
temporal increase in uncertainty. It can be related
to an abrupt change in the behaviour of social
networking services’ actors because of destructive
information influence on virtual communities
[29, 30]. Actors need some transition period to
form
their viewpoint on the
events in the
information space to further interact with other
actors and virtual communities.</p>
      <p>2. The life cycle of the virtual community of
actors in social networking services is followed by
changes in indicators of their interaction from
stationary (characterized by a decrease in entropy
value) to chaotic dynamics (entropy growth). The
result of passing the bifurcation point by the
system
is
structural
changes
in
virtual
communities
– the
number
of participants,
creation of new associations, interaction through
likes, reposts and distribution of given content.</p>
      <p>3. The transition of actor interactions in the
social networking services to chaotic dynamics is
accompanied by a rapid increase in the value of
entropy</p>
      <p>4. In the field of chaotic dynamics of actors’
interaction in the social networking services, the
entropy of the system tends to the maximum, as
the probability density distribution approaches
uniformity. If the number of states of the virtual
community of actors is  , then
under the
conditions of transition to chaotic dynamics</p>
      <p>→ ∞. In this case, the probability of being the
virtual community in one of these states is defined
as uniform distribution
 =

1
 →∞

1

 =1
From where
Then the entropy is defined as
 = − ∑   log2   = − ∑
log2 .
 ( → ∞) = lim ( − ∑
log2
) =
= lim (−
 →∞
log2  ) = lim log2  .</p>
      <p>→∞


 =1
 =1

1

1

1

1</p>
    </sec>
    <sec id="sec-6">
      <title>4. Practical guidelines</title>
      <p>Considering the results of the modelling of
actor interactions in virtual communities, the
following practical recommendations for
identifying precursors of chaotic dynamics are
given:</p>
      <p>1. Applying Rössler chaotic system for
modelling actors' interaction in social networking
services under the destructive information
influence and conduct of information
confrontation allows describing the transition of
citizens' potential to active actions in real life.
Therefore, it is reasonable to apply the proposed
approach to modelling interactions in virtual
communities when developing and improving the
subsystem of information space monitoring
within the framework of the state information
security system in the social networking services.</p>
      <p>2. The simulation of virtual communities in the
social networking services based on the chaotic
Rössler system is appropriate for monitoring the
interaction of groups of actors created and/or
managed by an opposing force. Actors of such
virtual communities are potentially used to
participate in mass protests and unrest in real life.
Therefore, timely identification of signs of their
transition to chaotic dynamics based on entropy
indicator (3) will allow responding in advance to
changes in the situation in the social networking
services information space.</p>
    </sec>
    <sec id="sec-7">
      <title>5. Conclusions</title>
      <p>Simulation of actors' interaction in the social
networking services based on irregular attractors
investigates the processes of transition of
communication in the information space of
services into chaotic dynamics, in which
associations of actors become unmanageable. The
application of irregular attractors helps
considering the effect of destructive information
influence on actors in the social networking
services in the conditions of information
confrontation. To achieve this, interaction in the
information space of services is modelled using
the Rössler irregular attractor, which enables the
formalization of interaction not only online but
also the transition of actors to acts of defiance in
real life. For early detection of signs of transition
to chaotic dynamics, we propose to use the kernel
density estimation of the entropy distribution of
interaction parameters of actors in the social
networking services to determine its dynamics to
identify periods of growth. Thus, the analysis of
entropy value dynamics changes indicates a
transition of virtual community to chaotic
dynamics and promptly applies methods of its
suppression.</p>
    </sec>
    <sec id="sec-8">
      <title>6. References</title>
      <p>[28] P. Cincotta, C. Giordano, R. Alves Silva, and
C. Beaugé. “The Shannon entropy: An
efficient indicator of dynamical
stability.” Physica D: Nonlinear Phenomena
417 (2021): 132816. doi:
10.1016/j.physd.2020.132816
[29] K. Molodetska, and Y. Tymonin.
“Systemdynamic models of destructive informational
influence in social networking services.”
International Journal of 3D Printing
Technologies and Digital Industry 3(2)
(2019): 137–146.
[30] S. M. Veretyuk, and V. V. Pilinsky. “A
model of the impact of innovation on a
technical system. A New Approach to the
Analysis of the Physical Meaning of the
Gartner Curve.” Electrotechnical and
Computer Systems 26 (102) (2017): 121-130
(in Ukrainian).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Liu</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ni</surname>
            <given-names>X.</given-names>
          </string-name>
          , and Niu G. “
          <article-title>The influence of active social networking services use and social capital on flourishing in Chinese adolescents</article-title>
          .
          <source>” Children And Youth Services Review</source>
          <volume>119</volume>
          (
          <year>2020</year>
          ):
          <fpage>105689</fpage>
          . doi:
          <volume>10</volume>
          .1016/j.childyouth.
          <year>2020</year>
          .105689
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Laghari</surname>
            <given-names>A.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Laghari</surname>
            <given-names>M. “</given-names>
          </string-name>
          <article-title>Quality of experience assessment of calling services in social network</article-title>
          .
          <source>” ICT Express</source>
          <volume>7</volume>
          (
          <issue>2</issue>
          ) (
          <year>2021</year>
          ):
          <fpage>158</fpage>
          -
          <lpage>161</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.icte.
          <year>2021</year>
          .
          <volume>04</volume>
          .011
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Yevseiev</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptiev</surname>
          </string-name>
          . O,
          <string-name>
            <surname>Lazarenko</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korchenko</surname>
            <given-names>A.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Manzhul</surname>
            <given-names>I.</given-names>
          </string-name>
          “
          <article-title>Modeling the Protection of Personal Data from Trust and the Amount of Information on Social Networks”</article-title>
          <source>EUREKA: Physics and Engineering</source>
          <volume>1</volume>
          (
          <year>2021</year>
          ):
          <fpage>24</fpage>
          -
          <lpage>31</lpage>
          , doi.10.21303/
          <fpage>2461</fpage>
          -
          <lpage>4262</lpage>
          .
          <year>2021</year>
          .001615
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Veretiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pilinsky</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Tkachuk</surname>
          </string-name>
          ,
          <article-title>"Cognitive radio systems clustering," 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications</article-title>
          and Computer Engineering (TCSET) (
          <year>2018</year>
          ):
          <fpage>1091</fpage>
          -
          <lpage>1095</lpage>
          , doi: 10.1109/TCSET.
          <year>2018</year>
          .
          <volume>8336384</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Desmarchelier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Djellal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Gallouj</surname>
          </string-name>
          ,
          <article-title>"Mapping social innovation networks: Knowledge intensive social services as systems builders."</article-title>
          <source>Technological Forecasting And Social Change</source>
          <volume>157</volume>
          (
          <year>2020</year>
          ):
          <fpage>120068</fpage>
          . doi:
          <volume>10</volume>
          .1016/j.techfore.
          <year>2020</year>
          .
          <volume>120068</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Korobiichuk</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Snitsarenko</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Katsalap</surname>
            <given-names>V.</given-names>
          </string-name>
          , and Hryshchuk R. “
          <article-title>Determination and Evaluation of Negative Informational and Psychological Influence on the Military Personnel Based on the Quantitative Measure</article-title>
          .
          <source>” Proceedings of the 1st International Workshop on Control, Optimisation and Analytical Processing of Social Networks</source>
          <volume>2392</volume>
          (
          <year>2019</year>
          ):
          <fpage>66</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Molodetska</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Tymonin</given-names>
            <surname>Yu</surname>
          </string-name>
          ., and Hryshchuk R. “
          <source>Modelling Of Conflict Interaction of Virtual Communities in Social Networking Services on an Example of AntiVaccination Movement.” Proc. of the International Workshop on Conflict Management in Global Information Networks</source>
          <volume>2588</volume>
          (
          <year>2020</year>
          ):
          <fpage>250</fpage>
          -
          <lpage>264</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Molodetska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tymonin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Markovets</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Melnychyn</surname>
          </string-name>
          . “
          <article-title>Phenomenological model of information operation in social networking services</article-title>
          .”
          <source>Indonesian Journal Of Electrical Engineering And Computer Science</source>
          <volume>19</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          ):
          <fpage>1078</fpage>
          . doi:
          <volume>10</volume>
          .11591/ijeecs.v19.
          <year>i2</year>
          .
          <fpage>pp1078</fpage>
          -
          <lpage>1087</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Blokh</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , et al. “
          <article-title>Psychological Warfare Analysis Using Network Science Approach</article-title>
          .”
          <source>Procedia Computer Science</source>
          <volume>80</volume>
          (
          <year>2016</year>
          ):
          <fpage>1856</fpage>
          -
          <lpage>1864</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.procs.
          <year>2016</year>
          .
          <volume>05</volume>
          .479
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Straub</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>"Mutual assured destruction in information, influence and cyber warfare: Comparing, contrasting and combining relevant scenarios</article-title>
          .
          <source>" Technology In Society</source>
          <volume>59</volume>
          (
          <year>2019</year>
          ):
          <fpage>101177</fpage>
          . doi:
          <volume>10</volume>
          .1016/j.techsoc.
          <year>2019</year>
          .
          <volume>101177</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Molodetska</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Solonnikov</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voitko</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Humeniuk</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matsko</surname>
            <given-names>O.</given-names>
          </string-name>
          , and Samchyshyn O. “
          <article-title>Counteraction to information influence in social networking services by means of fuzzy logic system</article-title>
          .”
          <source>International Journal Of Electrical And Computer Engineering</source>
          <volume>11</volume>
          (
          <issue>3</issue>
          ) (
          <year>2021</year>
          ):
          <fpage>2490</fpage>
          . doi:
          <volume>10</volume>
          .11591/ijece.v11i3.
          <fpage>pp2490</fpage>
          -
          <lpage>2499</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Molodetska</surname>
          </string-name>
          ,
          <article-title>"Counteraction to Strategic Manipulations on Actors' Decision Making in Social Networking Services,"</article-title>
          <source>2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)</source>
          (
          <year>2020</year>
          )
          <fpage>266</fpage>
          -
          <lpage>269</lpage>
          , doi: 10.1109/ATIT50783.
          <year>2020</year>
          .
          <volume>9349347</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Castells</surname>
          </string-name>
          , and G. Cardoso, eds.,
          <source>The Network Society: From Knowledge to Policy</source>
          . Washington, DC: Johns Hopkins Center for Transatlantic Relations,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Barrett</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Eubank</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Marathe</surname>
          </string-name>
          .
          <source>Modeling and Simulation of Large Biological, Information and Socio-Technical Systems: An Interaction Based Approach</source>
          . In: Goldin D.,
          <string-name>
            <surname>Smolka</surname>
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wegner</surname>
            <given-names>P</given-names>
          </string-name>
          . (eds) Interactive Computation. Springer, Berlin, Heidelberg (
          <year>2006</year>
          ) doi:10.1007/3-540- 34874-3_
          <fpage>14</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>X.</given-names>
            <surname>Yuan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Hwarng</surname>
          </string-name>
          . “
          <article-title>Managing a service system with social interactions: Stability and chaos</article-title>
          .”
          <source>Computers &amp; Industrial Engineering</source>
          <volume>63</volume>
          (
          <issue>4</issue>
          ) (
          <year>2012</year>
          ):
          <fpage>1178</fpage>
          -
          <lpage>1188</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.cie.
          <year>2012</year>
          .
          <volume>06</volume>
          .022
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Kolesnikov</surname>
          </string-name>
          .
          <article-title>Sinergeticheskoe metody upravlenija slozhnymi sistemami: teorija sistemnogo sinteza</article-title>
          .
          <source>Editorial URSS</source>
          ,
          <string-name>
            <surname>Moskow</surname>
          </string-name>
          (
          <year>2005</year>
          )
          <article-title>(in Russian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>D.</given-names>
            <surname>Maris</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Goussis</surname>
          </string-name>
          . “
          <article-title>The “hidden” dynamics of the Rössler attractor</article-title>
          .”
          <string-name>
            <surname>Physica</surname>
            <given-names>D</given-names>
          </string-name>
          : Nonlinear Phenomena 295-
          <fpage>296</fpage>
          (
          <year>2015</year>
          ):
          <fpage>66</fpage>
          -
          <lpage>90</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.physd.
          <year>2014</year>
          .
          <volume>12</volume>
          .010
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>J.</given-names>
            <surname>Contreras-Reyes</surname>
          </string-name>
          .
          <article-title>“Chaotic systems with asymmetric heavy-tailed noise: Application to 3D attractors</article-title>
          .” Chaos,
          <source>Solitons &amp; Fractals</source>
          <volume>145</volume>
          (
          <year>2021</year>
          ):
          <fpage>110820</fpage>
          . doi:
          <volume>10</volume>
          .1016/j.chaos.
          <year>2021</year>
          .110820
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Li</surname>
          </string-name>
          , and
          <string-name>
            <surname>Ge</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>"A novel study of parity and attractor in the time reversed Lorentz system</article-title>
          .
          <source>" Physics Letters A</source>
          <volume>373</volume>
          (
          <issue>44</issue>
          ):
          <fpage>4053</fpage>
          -
          <lpage>4059</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>R.</given-names>
            <surname>Barrio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Blesa</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Serrano</surname>
          </string-name>
          .
          <article-title>"Qualitative analysis of the Rössler equations: Bifurcations of limit cycles and chaotic attractors."</article-title>
          <source>Physica D: Nonlinear Phenomena</source>
          <volume>238</volume>
          (
          <issue>13</issue>
          ) (
          <year>2009</year>
          ):
          <fpage>1087</fpage>
          -
          <lpage>1100</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.physd.
          <year>2009</year>
          .
          <volume>03</volume>
          .010.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>R.</given-names>
            <surname>Alstrom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Moreau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Marzocca</surname>
          </string-name>
          , and
          <string-name>
            <surname>E. Bollt.</surname>
          </string-name>
          “
          <article-title>Nonlinear characterization of a Rossler system under periodic closed-loop control via time-frequency and bispectral analysis</article-title>
          .
          <source>” Mechanical Systems And Signal Processing</source>
          <volume>99</volume>
          (
          <year>2018</year>
          ):
          <fpage>567</fpage>
          -
          <lpage>585</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.ymssp.
          <year>2017</year>
          .
          <volume>06</volume>
          .001
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Lyapunov</surname>
          </string-name>
          . Collected Works. Moscow-L.,
          <article-title>Publishing house of the Academy of Sciences of the USSR, 1956 (in Russian)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>D. M. Vavriv</surname>
            , and
            <given-names>V. B.</given-names>
          </string-name>
          <string-name>
            <surname>Ryabov</surname>
          </string-name>
          . “
          <article-title>Current Lyapunov exponents and conditions of chaos</article-title>
          .”
          <source>J. Comput. Math. and Math. Phys</source>
          .
          <volume>32</volume>
          (
          <issue>9</issue>
          ) (
          <year>1992</year>
          ):
          <fpage>1409</fpage>
          -
          <lpage>1421</lpage>
          (in Russian).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>K.</given-names>
            <surname>Hung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Suen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          . “
          <article-title>Structures and evolution of bifurcation diagrams for a one-dimensional diffusive generalized logistic problem with constant yield harvesting</article-title>
          .
          <source>” Journal Of Differential Equations</source>
          <volume>269</volume>
          (
          <issue>4</issue>
          ) (
          <year>2020</year>
          ):
          <fpage>3456</fpage>
          -
          <lpage>3488</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jde.
          <year>2020</year>
          .
          <volume>03</volume>
          .001
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>W.</given-names>
            <surname>Abou-Jaoudé</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Monteiro</surname>
          </string-name>
          . “
          <article-title>On logical bifurcation diagrams</article-title>
          .
          <source>” Journal Of Theoretical Biology</source>
          <volume>466</volume>
          (
          <year>2019</year>
          ):
          <fpage>39</fpage>
          -
          <lpage>63</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jtbi.
          <year>2019</year>
          .
          <volume>01</volume>
          .008
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Chen</surname>
          </string-name>
          . “
          <article-title>Complete bifurcation diagram and global phase portraits of Liénard differential equations of degree four</article-title>
          .
          <source>” Journal Of Mathematical Analysis And Applications</source>
          <volume>485</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          ):
          <fpage>123802</fpage>
          . doi:
          <volume>10</volume>
          .1016/j.jmaa.
          <year>2019</year>
          .123802
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Ph</surname>
            .
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Janert</surname>
          </string-name>
          .
          <source>Section 13.2</source>
          .
          <article-title>2 Kernel density estimates</article-title>
          . In:
          <article-title>Gnuplot in action: understanding data with graphs</article-title>
          .
          <source>Connecticut</source>
          , USA: Manning Publications,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>