<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Informational and Procedural Description of an Energy-active Control Object Behavior Under Active Threats Conditions</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Liubomyr</forename><surname>Sikora</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>28a Bandery Str</addrLine>
									<postCode>79000</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nataliia</forename><surname>Lysa</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>28a Bandery Str</addrLine>
									<postCode>79000</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rostyslav</forename><surname>Tkachuk</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Lviv State University of Life Safety</orgName>
								<address>
									<addrLine>35 Kleparivska Str</addrLine>
									<postCode>79000</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olga</forename><surname>Fedevych</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>28a Bandery Str</addrLine>
									<postCode>79000</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Informational and Procedural Description of an Energy-active Control Object Behavior Under Active Threats Conditions</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">F4C80735D363F34BB9E393F163CEEB94</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-04-29T06:46+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Integration</term>
					<term>system</term>
					<term>process</term>
					<term>risks</term>
					<term>decision-making</term>
					<term>information technology</term>
					<term>energy-active object</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Infrastructure activities and energy-active objects management involves formation and processing of multifaceted information on production and sale of energy resources by its operative personnel system. The synergistic management effect will be achieved thanks to system's emergent property, with formation of an integrated information environment in spatio-temporal dimension, which will reflect "life's multifacetedness" in the context of combining main activity with society's value demands. Activity and decision-making of operational personnel creates characteristics of energy-active object and becomes a reflection of strategically verified cost-value content of its development in general. Such a motivational reference point manifests itself as acquisition of its informationprocedural image (characteristic "portrait") of integrative quality. The activity effect will be reflected in result and state of energy-active object, which are evaluated based on image's parametric information in space-time dimension. Integrative property of management system will be presented as an integration process that will continuously dynamically accompany executive processes that are activated by management influences and become integrated, just like management process. Integrative informational relevance of tactical and strategic assessments of energy-active facility activity and integrated decisions adoption that purposefully affect state and result of activity will be supported.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Problem of comprehensive improvement of infrastructure and energy-active object management is defined as need to achieve systematic optimization of problem solving under condition of ensuring sustainable activity and interconnected management of technological and organizational processes, design and research.</p><p>This problem is solved during development of management system and with involvement of operative personnel with their practical experience. It is related to the problems of increasing efficiency of infrastructure and energy-active object, scientific and technical levels and quality of management system, which is developing as integrated system. Introduction of new tasks should increase integration synergistic effect.</p><p>That is, management system must achieve a higher integration degree at all phases of its life cycle, starting with study of development problems, designing their automated solution as tasks, ending with IntelITSIS'2023: 4th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 22-24, 2023, Khmelnytskyi, Ukraine EMAIL: lssikora@gmail.com (L. Sikora); lysa.nataly@gmail.com (N. Lysa); lvtk@ukr.net (R. Tkachuk); olha.y.fedevych@lpnu.ua (O. Fedevych) ORCID: 0000-0002-7446-1980 (L. Sikora); 0000-0001-5513-9614 (N. Lysa); 0000-0001-9137-1891 (R. Tkachuk); 0000-0002-8170-3001 (O. Fedevych) practical implementation as coordinated work of all compatible components (subsystems, sets of tasks) of system.</p><p>Therefore, it is necessary to manage the operation of system itself, with an assessment of integration degree by management phases.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">References analysis</head><p>In <ref type="bibr" target="#b0">[1]</ref>, basics of hierarchical systems intellectual management by operative personnel are substantiated.</p><p>Basic principles of systemology and complex systems management are outlined in the works <ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>.</p><p>In monographs <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7]</ref>, basics of management theory and decision-making by operational personnel in complex systems under risk conditions and active factors effect on management systems are substantiated.</p><p>Work <ref type="bibr" target="#b7">[8]</ref> provides an analysis of risks types that may arise during management in hierarchical man-made systems.</p><p>Work <ref type="bibr" target="#b8">[9]</ref> substantiates systemic and logical-cognitive aspects of managing complex systems in emergency situations. Procedures for decision-making by operational personnel and their problems in making management decisions are considered in <ref type="bibr" target="#b9">[10]</ref>.</p><p>The justification of methods and project control means, which require an integrated approach using data protection and processing theory, interpretation of new data and situations, and management decision-making are considered in <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12]</ref>.</p><p>Works <ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref> consider management decisions problems in risk conditions and changes in situation under active factors influence directly on management process.</p><p>Work <ref type="bibr" target="#b12">[13]</ref> provides basics of managing an energy-active facility under risk conditions. In <ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref>, main methods of protecting hierarchical systems from external and internal attacks are revealed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Main research results</head><p>In technological structures, it is impossible to manage processes without data selection, their processing, and in case of incompleteness -replenishment due to scientific, engineering, professional knowledge and experience of an expert in structure of decision support system (DSS).</p><p>In fact, expert system in decision support system structure has two intellectual components to be applied:</p><p>1. Formalized knowledge acquired while processing situations, data, scientific and technical theories and technologies, abstracting cognitive knowledge, logically ordered and recorded in engineering-normative knowledge base, as a basis for supporting and correcting management decisions in the structure of ACS-TP (technological process of automated control system) at the operational level;</p><p>2. Scientific-engineering knowledge and personal professional experience of a high-level expert, whose cognitive system, based on creative logical-analytical system thinking, forms abstract structures, which are basis of categorical models of strategic coordination goal-oriented management for the upper level of man-made system infrastructure hierarchy that is affected by active threat factors and targeted information attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Methodology for object management determination, taking into account operator's nervous system</head><p>Subject-oriented information-procedural description of an energy-active facility behavior of infrastructure management under active threats conditions will be described below.</p><p>Structural diagram of formation of management object subject-oriented description based on production hierarchical structure and activity cognitive structure and operator's nervous system way of thinking has the form (Fig. <ref type="figure" target="#fig_0">1</ref>) and includes following components of information and intellectual technology.</p><p>According to the hierarchical system structure, a data exchange interface is built between technological, operational and strategic management layers, which is necessary for intelligent data processing formation and management operations.</p><p>The acquisition of expert knowledge by operational personnel in process of working in energyactive units' limit modes is characterized by the fact that expert system performs cognitive intellectual functions, which consist in assessing image of situation and making decisions based on the processed data (CIA →ACS) (Fig. <ref type="figure" target="#fig_0">1</ref>) obtained during process of professional activity at all infrastructure hierarchy levels.</p><p>Designation in Fig. <ref type="figure" target="#fig_0">1</ref>. ITS -information-technological system, IMS -information-measuring system, ACS -automated control system, MO -management object, CIA -cognitive intelligent agent, {F n }factors of active actions on system, α risk -risks.Therefore, role of a cognitive intellectual agent person is reduced to the fact that an expert-consultant performs in an active cognitive mode an intellectual operation (IA) of the type: IA1 -processes data and knowledge of subject area;</p><p>IA2 -in accordance with target task chooses a scheme, procedure, algorithm and strategy for its solution based on risk factors identification due to action of threats and attacks; IA3 -in case of insufficient data and incomplete knowledge, searches for methods of supplementing their knowledge within basic theory management framework, system analysis, logiccognitive methods of generating ideas and creative solutions; IA4 -based on heuristics, generates hypotheses about problem solving schemes; IA5 -chooses procedures or algorithms, according to reference models of production system functioning and goal-oriented strategies;</p><p>IA6 -finding the appropriate scheme for problem solving, expert describes problem area in the form of a set of facts and rules (proof, solution) and ties them to target tasks; IA7 -fills ES with new knowledge (as basis of ES self-learning process), organizes and formalizes on basis of logical rules and system analysis; IA8 -transmits data to operational personnel for decisions formation. On the basis of system approach and cognitive diagrams, appropriate stages of searching for a method of solving management problems in dialog mode are developed with appropriate sequence, for target task and problem situation; IA9 -generation of infrastructure functioning strategic and local goals.</p><p>In accordance with the target expert tasks, lets highlight management consulting modes (Fig. <ref type="figure" target="#fig_1">2</ref>) R1 -ES mode of client-IA consultation: during operator-intelligent agent (IA) with ES dialogue, problem solution is ensured from subject-oriented area, using formed knowledge base and DB, ES, and situational data of certain reliability level; R2 -ES awareness mode of one's own essence of cognitive component through self-testing includes decision-making procedures based on logical explanation schemes, scheme mechanisms, proof procedures when solving test problems (self-diagnosis) in production system structure -a system involved in strategic management.</p><p>R3 -Filling database and knowledge by expert mode, formation of interface, strategies and dialogue modes (operator -ES -DSS) in the initial and current operation mode.</p><p>R4 -Testing mode, when an expert and a knowledge engineer (ІАе, ІАd) using dialogue and explanatory tools check ES competence to a given level of plausibility and correctness according to the model and a specific interpretation of production situation; R5 -Working mode with clients at all levels of operational and strategic management hierarchy.</p><p>To increase cyber security level, following data processing and selection procedures are used on the basis of intelligent operations using information technology methods (Fig. <ref type="figure" target="#fig_1">2</ref>), which, accordingly, is the reason for minimizing risk level in the event of threats complex to infrastructure. PR2management hierarchy organization for effective operation of production structure based on corporate agreement strategy; PR3submission of requests and knowledge in a form understandable by ES in dialogue mode in access mode according to access level;</p><p>The essence of knowledge discovery process by experts consists in procedures for conducting heuristic and logical analyzes of problem area in accordance with target tasks, taking into account the cognitive characteristics of each agent, and formation of system knowledge models that provide situations awareness of their information structure, which is basic for problem solving.</p><p>Informational and intellectual knowledge assessment about CIA operation, about effective management processes includes: PI1 -objects and concepts of subject area for identifying goals, assessing situations, building procedures, decision-making schemes;</p><p>PI2 -characteristics of object and situations state (probability of events occurrence, goals significance coefficients, alternatives ranking, identification of advantages signs);</p><p>PI3 -comparison indicators of situations in (threat management) mode to establish cause-andeffect relationships between objects and influence degree in objects hierarchy and management structures. Accordingly, information ensures preparation of scheme and management process procedure. VSS 1 -hierarchical management structure, which includes strategic, administrative, operational management and ACS-TP; VSS 2 -information module that includes strategy synthesis, problem generators, situations identification, data processing unit, logic-mathematical processor, knowledge jams structures, diagnostic system and test generators;</p><p>VSS 3 -management object model with aggregated series-parallel connected, active blocks of processing of material and energy resources.</p><p>VSS 4 -logical-cognitive model of knowledge organization structure of operator (CIAi) -agent, which ensures decision-making process in hierarchical management system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Information and management interaction in infrastructure</head><p>The interrelationship of informational and managerial interaction components, respectively, is based on informational-systemic and logical-cognitive procedures that reflect the agent's thinking process in formation and implementation of targeted countermeasures against threats and active attacks on infrastructure.</p><p>Let's define basic components of informational-systemic and logical-cognitive activity:</p><p>1 LK R P -generation of target task using operator's cognitive system based on acquired experience and knowledge; -building a model of structure and a model of states space as well as taking into account space of goals, which is parameterized using operator's knowledge organization cognitive structure; 5 LК R P -creation of diagnostic system for choice adequacy of decision-making strategies for target management task implementation. In combating attacks and resource threats system, let's highlight following IACS levels (Fig. <ref type="figure" target="#fig_4">3</ref>.):</p><p>1. Strategic management level with problem situation assessment and indication system in (IACS) -an integrated automated control system.</p><p>2. Basic components of informational and intellectual activity of management cognitive states and ( )</p><formula xml:id="formula_0">S CIA 4 -( ) 0 4</formula><p>CIA strategic and operational.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Cognitive expert's knowledge base (CEKB)</head><p>, which is personally formed by an intellectual agent with a creative way of thinking and intelligence.</p><p>4. Blocks (1,2,3), which characterize methods, processes, procedures necessary for assessing situations and expert support.</p><p>5. Data flows information processing blocks about dynamic situation in IASU and control object (OC) based on crisis states selection of indicators and limit control modes from mode data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Management risks control block</head><formula xml:id="formula_1">( ) ( ) U C K risk , α</formula><p>in case of object mode deviation from target area.</p><p>7. Expert active consultations formation block for new strategies (ACE -experts) formation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.">Risk level classification block ( )</head><formula xml:id="formula_2">d i risk C α α ≥</formula><p>according to the permissible level.</p><p>Accordingly, cognitive and intellectually logical operations are performed by intelligent agents both inside structure of management team and individually: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>{ }</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>AS ij A IF</head><p>-team for forming an active attacks complex on infrastructure. In accordance with target task, let's consider system, information and intellectual operations and their integration while formation of management procedures and countering attacks (Fig. <ref type="figure" target="#fig_4">3</ref>).</p><p>According to the scheme in Fig. <ref type="figure" target="#fig_1">2</ref>. of information-cognitive interaction of IACS and ( ) <ref type="bibr">(</ref> )</p><formula xml:id="formula_3">A IF ij</formula><p>integrated attack system on management process -, two components of risk integration can be distinguished, which, if level is exceeded, lead to accidents:</p><p>• logical-cognitive errors in decision-making procedures due to incomplete knowledge and incorrect decisions;</p><p>• systemic, logical and cognitive errors in selection of mathematical models of management objects dynamics and structure as well as procedures and algorithms for processing heterogeneous data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Results &amp; Discussion</head><p>If take into account that management structure includes an automatic system for implementation of object management process (ACS -TP-ACS) and management operators team (cognitive agents) than behavior of such structure has a high risk of failure under threats influence.</p><p>Accordingly, lets provide list of active threat attacks on man-made systems, both internal and external (Table <ref type="table" target="#tab_0">1</ref>).  Strategic management main goal is development of sustainable self-renewing production process methods based on goal orientation, integration, and coordination strategies under active goal-oriented threats conditions.</p><p>Let's analyze the negative factors that influence on the functioning and management of an energy active object and infrastructure:</p><p>1. Subject-oriented description formation structure of management object based on its production hierarchical structure;</p><p>2. The structure of cognitive way of thinking of operator's neural system; 3. To analyze all components of man-made system functioning; 4. Give a source of risks and its impact on the structure of man-made system; 5. Give a source of active factors for functioning and management of the system; 6. To analyze the sources of possible negative attacks on structure management. So, after characterizing possible negative factors on the management and functioning of manmade system, the risks that affect management and functioning of the infrastructure can be assessed.</p><p>Infrastructure integration risk assessment is presented in Table <ref type="table">.</ref>2. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>According to informational and procedural description of target task of infrastructure and energy-active object management, the following was carried out:</p><p>• Analysis of literature sources about intellectual management of man-made systems and infrastructure problems, and their resistance to external and internal attacks;</p><p>• Problem of infrastructure and energy-active object complex management under complex threats conditions to management is substantiated;</p><p>• Role of cognitive intellectual agent on management process in difficult conditions is substantiated;</p><p>• Structural diagram of subject-oriented description formation of management object based on production hierarchical structure and cognitive activity structure as well as way of thinking of operator's nervous system is presented;</p><p>• Relationship between informational and managerial interaction components, which is based on informational-systemic and logical-cognitive procedures, is substantiated;</p><p>• System, information and intellectual operations and their integration in management procedures formation and countering attacks were considered;</p><p>• A list of active threat attacks on man-made systems, both internal and external, and an infrastructure integration risk assessment table were given.</p><p>Solving the above problems at system, procedural and information levels can help modernize existing infrastructure management and improve their design and management process.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Structural-functional scheme of a set of informational and intellectual operations for management process implementation in countering threats, attacks, and risk conditions</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Structural-functional scheme: a set of informational and intellectual operations for management process implementation in countering threats, attacks, and risk conditions</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>and procedures of its solving according to tasks purpose; 3 LK R P -logical-cognitive procedures synthesis for getting out of conflict on the basis of a conceptual model which is based on existing knowledge structure and intellectual agent experience; 4 LК R P -logical-mathematical procedure development for choosing management strategies, based on a typical procedure and algorithms for solving object management non-standard problems under conflict risk conditions; 3 IC R P</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>expert with appropriate level of decision-making authority;</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Informational -system structural diagram of combating attacks technology</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Active threats and attacks on man-made systems</figDesc><table><row><cell>№</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Infrastructure</figDesc><table><row><cell></cell><cell cols="2">integration risk assessment</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>№</cell><cell>Component</cell><cell>Integration</cell><cell>Integration</cell><cell>Informational</cell><cell>Structural</cell><cell>Resource risks</cell></row><row><cell></cell><cell>integration</cell><cell>requirements</cell><cell>signs</cell><cell>risks</cell><cell>risks</cell><cell></cell></row><row><cell>1.</cell><cell>Goal</cell><cell>&lt;0.55</cell><cell>&gt;0.95</cell><cell>0.8</cell><cell>0.85</cell><cell>&gt;0.85</cell></row><row><cell></cell><cell>orientation</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>2.</cell><cell>Structure</cell><cell>0.9</cell><cell>0.95</cell><cell>&gt;0.95</cell><cell>&gt;0.95</cell><cell>&gt;0.95</cell></row><row><cell></cell><cell>goals</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>coordination</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>3.</cell><cell>Functional</cell><cell>0.9</cell><cell>0.8</cell><cell>&lt;0.15</cell><cell>&lt;0.25</cell><cell>0.1</cell></row><row><cell></cell><cell>goals</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>coordination</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>4.</cell><cell>Goal</cell><cell>&gt;0.85</cell><cell>&gt;0.75</cell><cell>&gt;0.25</cell><cell>&gt;0.2</cell><cell>&gt;0.25</cell></row><row><cell></cell><cell>orientation of</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>structure</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>functioning</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>5.</cell><cell>Consistency</cell><cell>0.9</cell><cell>&gt;0.95</cell><cell>&lt;0.15</cell><cell>&lt;0.1</cell><cell>&gt;0.15</cell></row><row><cell></cell><cell>of</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>management</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>organization</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>6.</cell><cell>Ensuring</cell><cell>0.8</cell><cell>&gt;0.9</cell><cell>&lt;0.1</cell><cell>&lt;0.15</cell><cell>&lt;0.2</cell></row><row><cell></cell><cell>management</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>actions</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>7.</cell><cell>Structure</cell><cell>0.75</cell><cell>0.75</cell><cell>&lt;0.25</cell><cell>0.35</cell><cell>&lt;0.3</cell></row><row><cell></cell><cell>management</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>organization</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">8. Resistance of</cell><cell>0.85</cell><cell>0.8</cell><cell>&lt;0.25</cell><cell>&lt;0.3</cell><cell>&gt;0.3</cell></row><row><cell></cell><cell>structure to</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>threats</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">9. Management</cell><cell>0.8</cell><cell>0.75</cell><cell>&lt;0.35</cell><cell>&lt;0.25</cell><cell>&lt;0.45</cell></row><row><cell></cell><cell>mode</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>analysis</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>10.</cell><cell>Integration</cell><cell>0.95</cell><cell>0.9</cell><cell>0.15</cell><cell>0.1</cell><cell>&lt;0.2</cell></row><row><cell></cell><cell>project team</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Adaptive control of dynamic systems with uncertainty and quantization</title>
		<author>
			<persName><forename type="first">J</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Xing</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Wen</surname></persName>
		</author>
		<idno type="DOI">10.1201/9781003176626</idno>
		<imprint>
			<date type="published" when="2021">2021</date>
			<publisher>CRC Press</publisher>
			<pubPlace>Boca Raton, FL</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">The handbook of human-machine interaction: A human-centered design approach</title>
		<author>
			<persName><forename type="first">G</forename><surname>Boy</surname></persName>
		</author>
		<idno type="DOI">10.1201/9781315557380</idno>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>CRC Press</publisher>
			<pubPlace>Boca Raton, FL</pubPlace>
		</imprint>
	</monogr>
	<note>1st ed</note>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Introduction to human factors for organisational psychologists 1st</title>
		<author>
			<persName><forename type="first">M</forename><surname>Wiggins</surname></persName>
		</author>
		<idno type="DOI">10.1201/9781003229858</idno>
		<imprint>
			<date type="published" when="2022">2022</date>
			<publisher>CRC Press</publisher>
			<pubPlace>Boca Raton, FL</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Othman Intelligent Techniques for Decision Support System in Human Resource Management</title>
		<author>
			<persName><forename type="first">H</forename><surname>Jantan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hamdan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename></persName>
		</author>
		<idno type="DOI">10.5772/39401</idno>
	</analytic>
	<monogr>
		<title level="m">International Journal of Innovative Computing, Information and Control</title>
				<meeting><address><addrLine>Hong Kong</addrLine></address></meeting>
		<imprint>
			<publisher>ICIC International</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="13" to="24" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Pavlova Method of activity of ontology-based intelligent agent for evaluating the initial stages of the software lifecycle</title>
		<author>
			<persName><forename type="first">T</forename><surname>Hovorushchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-97885-7_17</idno>
	</analytic>
	<monogr>
		<title level="m">Recent Developments in Data Science and Intelligent Analysis of Information</title>
				<editor>
			<persName><forename type="first">Tymofiy</forename><surname>Mylovanov</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Yuriy</forename><surname>Kondratenko</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Janusz</forename><surname>Kacprzyk</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Vladik</forename><surname>Kreinovich</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Vadim</forename><surname>Stefanuk</surname></persName>
		</editor>
		<meeting><address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">836</biblScope>
			<biblScope unit="page" from="169" to="178" />
		</imprint>
	</monogr>
	<note>Advances in Intelligent Systems and Computing</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Fedevych Information and logic cognitive technologies of decision-making in risk conditions</title>
		<author>
			<persName><forename type="first">L</forename><surname>Sikora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lysa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1st International Workshop on Intelligent Information Technologies &amp; Systems of Information Security IntellTSIS 2020</title>
				<meeting>the 1st International Workshop on Intelligent Information Technologies &amp; Systems of Information Security IntellTSIS 2020<address><addrLine>Khmelnytskyi, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="340" to="356" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Informationresource and cognitive concept of threat&apos;s influence identification on technogenic system based on the cause and category diagrams integration in</title>
		<author>
			<persName><forename type="first">L</forename><surname>Sikora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lysa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Fedevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Talanchyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd international workshop on intelligent information technologies &amp; systems of information security IntellTSIS 2021</title>
				<meeting>the 2nd international workshop on intelligent information technologies &amp; systems of information security IntellTSIS 2021<address><addrLine>Khmelnytskyi, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="398" to="416" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Modelling, simulation and control of non-linear dynamical systems: An intelligent approach using soft computing and fractal theory</title>
		<author>
			<persName><forename type="first">P</forename><surname>Melin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Castillo</surname></persName>
		</author>
		<idno type="DOI">10.1201/9781420024524</idno>
		<imprint>
			<date type="published" when="2019">2019</date>
			<publisher>CRC Press</publisher>
			<pubPlace>Boca Raton, FL</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Power system load frequency control: Classical and adaptive fuzzy approaches</title>
		<author>
			<persName><forename type="first">H</forename><surname>Yousef</surname></persName>
		</author>
		<idno type="DOI">10.1201/9781315166292</idno>
		<imprint>
			<date type="published" when="2017">2017</date>
			<publisher>CRC Press</publisher>
			<pubPlace>Boca Raton, FL</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Enterprise risk management: advances on its foundation and practice 1st</title>
		<author>
			<persName><forename type="first">T</forename><surname>Aven</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Thekdi</surname></persName>
		</author>
		<idno type="DOI">10.4324/9780429425028</idno>
		<imprint>
			<date type="published" when="2019">2019</date>
			<publisher>Routledge</publisher>
			<pubPlace>London, UK</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>O'connor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Mcdermat</surname></persName>
		</author>
		<title level="m">Systemic thinking and search for extraordinary creative solutions</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<publisher>Nash format</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
	<note>In Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Information and cognitive components of knowledge formation in procedures for assessing dynamic situations in cyberphysical in</title>
		<author>
			<persName><forename type="first">L</forename><surname>Sikora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lysa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Fedyna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Fedevych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd international workshop on intelligent information technologies &amp; systems of information security IntellTSIS 2022</title>
				<meeting>the 3rd international workshop on intelligent information technologies &amp; systems of information security IntellTSIS 2022<address><addrLine>Khmelnytskyi, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="129" to="139" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Demri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Goranko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lange</surname></persName>
		</author>
		<idno type="DOI">10.1017/CBO9781139236119</idno>
		<ptr target="https://doi.org/10.1017/CBO9781139236119" />
		<title level="m">Temporal Logics in Computer Science</title>
				<meeting><address><addrLine>Cambridge</addrLine></address></meeting>
		<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Generative adversarial nets: in Advances in neural information processing systems</title>
		<author>
			<persName><forename type="first">I</forename><surname>Goodfellow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pouget-Abadie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mirza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Warde-Farley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ozair</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Courville</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Bengio</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>NIPS Foundation</publisher>
			<biblScope unit="page" from="2672" to="2680" />
			<pubPlace>Montreal</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Stochastic processes and models</title>
		<author>
			<persName><forename type="first">D</forename><surname>Stirzaker</surname></persName>
		</author>
		<idno type="DOI">10.1017/CBO9781316576532</idno>
		<imprint>
			<date type="published" when="2016">2016</date>
			<publisher>Cambridge University Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Groover</surname></persName>
		</author>
		<title level="m">Automation, Production Systems, and Computer-Integrated Manufacturing</title>
				<meeting><address><addrLine>London, UK, Pearson</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>4th ed</note>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Fundamentals of System Analysis &amp; Design Publisher</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Nejad</surname></persName>
		</author>
		<idno type="DOI">10.13140/2.1.1469.7280</idno>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>LAP LAMBERT Academic Publishing</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Management information systems</title>
		<author>
			<persName><forename type="first">J</forename><surname>Girdhar</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>New Delhi Oxford University Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<ptr target="http://www.academia.edu/6808986/NATO_Strategic_Communication_More_to_be_done" />
		<title level="m">NATO Strategic Communication: More to be Done? / Steve Tatham</title>
				<meeting><address><addrLine>Rīga</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
		<respStmt>
			<orgName>National Defence Academy of Latvia Center for Security and Strategic Research</orgName>
		</respStmt>
	</monogr>
	<note>Rita Le Page</note>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">Decision-making in energy systems 1st</title>
		<author>
			<persName><forename type="first">V</forename><surname>Bhise</surname></persName>
		</author>
		<idno type="DOI">10.1201/9781003107514</idno>
		<imprint>
			<date type="published" when="2021">2021</date>
			<publisher>CRC Press</publisher>
			<pubPlace>Boca Raton, FL</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
