<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Workshop on Cybersecurity Providing in Information and Telecommunication Systems, February</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>System Analysis of Ranking and Assessment of Efficiency of the Construction-Investment Projects in Information Infrastructure</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>David Gurgenidze</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Givi Gavardashvili</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Georgian Technical University</institution>
          ,
          <addr-line>77 Kostava str, Georgia, 0171, Tbilisi</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>28</volume>
      <issue>2023</issue>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>To solve the problem of selecting effective investment-construction projects, a multi-criterion expert method for ranking investment projects in information infrastructure is proposed, which should ensure the evaluation and comparison of all possible projects at the pre-investment stage, their sorting according to priorities, and finally the efficient analysis of the projects should be carried out and selected according to the company's development strategies. A qualitative system of indices for project (including IT-projects) evaluation, a quantitative evaluation scale, and a mechanism for determining the weights of indicators have been developed. The discounted methods of evaluating the efficiency of ranked investment projects in information infrastructure are analyzed.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Project</kwd>
        <kwd>investment project</kwd>
        <kwd>ranking</kwd>
        <kwd>indicator</kwd>
        <kwd>expert system</kwd>
        <kwd>specific weight</kwd>
        <kwd>integral assessment</kwd>
        <kwd>discounting method</kwd>
        <kwd>information infrastructure</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Construction is one of the strongest branches
of material production, which includes
construction installation, design exploration,
engineering organizations, scientific-research
institutes with construction profiles, economic
management bodies in construction, as well as
small business companies. The role of
construction in the system of the national
economy branches is very big, as well as the
impact of its features on the investment process.</p>
      <p>
        Investment-construction activity is a complex
of organizational, economic, and industrial
measures, which is implemented by state or
construction business participants
(constructioninstallation, customer, design, scientific research
organizations), for the accumulation and
investment of financial resources in the main
funds, to obtain profit and positive social effect.
In this process, a special place should be occupied
by the processes of finding, justifying, processing,
and final realization of current and prospective
investment projects. The purpose of the article is
to evaluate construction investment projects with
qualitative indicators, rank them, and select the
most effective projects [
        <xref ref-type="bibr" rid="ref41">1–4</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Main Part of Research Study</title>
      <p>A construction-investment project is a set of
organizational-technical measures implemented
to create an investment object of different
purposes (reconstruction, restoration) and its
further exploitation, using own capital or capital
raising from various sources. In the theory of
investment management, as a rule, three blocks of
investment decisions are considered for use with
real investments:
• Project ranking and selection.
• Optimization of project exploitation.
• Formation of the investment program.</p>
      <p>It is important to solve relevant tasks in the
process of analysis and research of
constructioninvestment projects (Fig. 1).</p>
      <p>Based on the goals of the article, we will stop
only on the first block, which is important in the
process of implementation, to put and solve the
task of evaluating actualizing projects for the
construction company and selecting more
effective ranking projects.</p>
      <p>It is advisable to carry out the project
evaluation process in two stages: in the first stage,
the preliminary evaluation of the projects with
qualitative indicators (“express analysis”) is
taking place, and in the second stage, the analysis
of the efficiency of the ranked projects is carried
out, using discounted methods.</p>
      <p>It should be noted that the primary assessment
of construction projects is no less important and
responsible than the stage of efficient analysis.
The expediency of construction-investment
projects in the early, pre-project stage, is
determined by: the large scale of the construction
processes and the high rates of expenses; the
possible lack of funds needed for the realization
of individual stages of the project; the need to
reduce project research and technical-economic
risks; with the necessary compliance of the
projects with the construction company’s activity
strategies; with the possible existence of
competing projects, etc. [5–7].</p>
      <p>At the preliminary evaluation stage, a
multicriteria expert method is proposed, which
represents a certain kind of process and involves
many evaluation indicators and many experts
(more than two). One of the purposes of the
mentioned model is to evaluate, rank projects, and
select the best projects for their investment. [5, 7].
We think it is appropriate to implement it through
the following algorithm:
Step 1. Formation of an expert group.</p>
      <p>Step 2. Gathering and analyzing the proposals
of the members of the expert group to determine
the project evaluation indicators, according to
their characteristics and the appropriate evaluation
scale.</p>
      <p>Step 3. Revealing the individual opinion of
group members on the relative importance of
indicators and forming a compromise opinion. As
a result, the rank of indicators and their weighting
system can be determined.</p>
      <p>Step 4. Formation of an evaluation
questionnaire by experts and assessment of each
project with qualitative indicators, by the chosen
evaluation scale.</p>
      <p>Step 5. Forming a total assessment for each
indicator in the evaluation questionnaire.</p>
      <p>Step 6. Using the total assessment of the
indicators and the established weights, calculate
the overall, integral evaluation for each project.</p>
      <p>Step 7. Ranking of projects according to the
obtained results.</p>
      <p>Let’s discuss some of the items in more detail.</p>
      <p>There is a wide list of qualitative indicators
used to evaluate investment projects [5, 7]. The
article uses a system of qualitative indicators,
which is relatively important for the assessment of
investment-construction projects at the
preproject stage. These are compliance of the project
with the current strategy and long-term plans of
the construction company; scientific-technical
characteristics; production indicators;
environmental and technological indicators;
financial indicators (criteria); level of marketing
activity; level of uncertainty and risk, etc.</p>
      <p>The evaluation is done on a logical scale, but
for simplicity, we will fit a quantitative meaning
to each logical term. In our case, the assessment is
done with a maximum of five points.</p>
      <p>Calculating weights for the evaluation of
indicators is a very important and meaningful
stage [5, 7, 8]. At this time, the expert must decide
which indicator is more important (prioritized)
compared to other indicators, which also
determines the final form of the result. There are
different methods of determining weights for
estimated figures [5–7], among the standard
methods there is the analytic hierarchy process
proposed by Saat [8]. The article uses a relatively
simple method of calculating weights for
estimated figures, which is as follows: a group of
experts manages to rank the indicators according
to certain rules, according to their priority and
importance, after which the weights are calculated
using the following formula (Fishbern’s rule):</p>
      <p>Wi =
2(N − i +1)</p>
      <p>N (N +1)
(1)
where, Wi is the specific weight of the indicator:
m
Wi = 1 , and M is the number of indicators.
i=1</p>
      <p>The presented algorithm pertains to evaluating
the state of projects and calculating the integral
expert indicator of evaluation. The following
formula is used to calculate the integral
assessment:</p>
      <p>m
I = WiCi (2)</p>
      <p>i=1
where i is integral assessment, Wi is indicator
weight, 0&lt;Wi &lt;1 Ci is project assessment with i
criteria, and m is the number of indicators.</p>
      <p>The use of this model allows experts to
accurately express their opinion about each
project, about the i-indicator and its
characteristics, to discuss and evaluate the
viability (state) of the project in a quantitative
form.</p>
      <p>The initial assessment of projects with
qualitative indicators is a certain filter for the
construction company, the main purpose of which
is to prevent unpromising projects and give a way
for further processing of relatively interesting and
effective projects. Projects with the highest
integral value.</p>
      <p>In world practice, methods of evaluating the
efficiency of investment projects are mainly used,
which are based on discounted estimates (Fig. 2).</p>
      <p>These methods are more accurate because they
take into account the types of inflation, changes in
rates of interest, profitability rates, etc. These
methods include the current net value method,
profitability index method, internal rate of
earnings yield method, and redemption period
method [9].</p>
      <p>
        The Net Present Value (NPV) is the difference
between the
finances and
expenses
of the
reporting period, reduced to the initial year, that
is, usually taking into account the discounting of
the results and expenses. The point is that over
time,
under the
influence
of inflation
and
competition, the real purchasing ability of money
changes for both: the investor and the innovator,
“today’s” and “tomorrow’s”
money are not
equivalent. At this time, the corresponding rate is
considered as the discount factor—αt in different
periods by the means of which the financial
indicators of different periods are calculated,
reduced to the corresponding meaning of the
initial period. For example, if t is the period
discounted income [
        <xref ref-type="bibr" rid="ref11 ref14 ref17 ref26 ref33 ref38 ref39 ref40 ref7">10–13</xref>
        ]:
      </p>
      <p>
        =    1 ×  1 +    2 ×  2 +    2 ×  2 + ⋯     ×  
and discounted capital expenses [
        <xref ref-type="bibr" rid="ref37">14–16</xref>
        ]:
perform in mentioned form, then the net discounted
cost is

=    − 
 
(3)
where (3) is the monetary flows for each financial
year, t is the ordinal number of the financial year.
Moreover, the discounted income and discounted
expenses are calculated based on all incomes and
expenses related to the realization of the project.
      </p>
      <p>As
we
have
already
mentioned,
the
discounting
coefficient
takes
into
account:
different forms of inflation, changes in the interest
rate, rate of income, etc. It is calculated for each
financial year as follows [17]:
  = 1</p>
      <p>⁄(1 +  )
where E is the discount rate, equal to the banking
norms (by reckoning a more reliable bank for
choosing, for example, the state loan norm), the
inflation level, and the sum of project risk [18–</p>
      <p>The project is efficient at any positive value of
NPV, and the larger its value, the more efficient
the project (Fig. 3) [23].
(4)
the project [25].</p>
      <p>The</p>
      <p>method of Profitability Index (PI)
represents the ratio of discounted income PVk to
the reduced innovative costs PVPVk, that is, two
streams of payments are compared to each other:
income and investment. In its essence, the
profitability index shows the amount of income
received for each unit of investment. From this, it
can be seen that the project will be efficient when
PI &gt; 1. Obviously (PI) allows us to rank different
projects according to decreasing profitability [24].</p>
      <p>Internal Rate of Return method (IRR) This
indicator is mainly used when there is a need to
make a choice</p>
      <p>between different alternative
projects, the higher the IRR, the more profitable</p>
      <p>Payback Period (PP) is one of the most
widespread indicators of the assessed value of
investment efficiency. It is the time interval
beyond which the net present value NPV becomes
a positive value, i.e. redemption occurs during the
period when the accumulated present value equals
the negative present value of all investments.</p>
      <p>In other words, the payback period is the
number of years required to pay back the
investment. None of the listed methods alone are
sufficient for project acceptance. Each method of
analysis of innovative projects allows us to
consider only one of the characteristics of the
reporting period, to identify important moments
and details. Therefore, for the complex evaluation
discussed by our project, these methods should be
used jointly.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusions</title>
      <p>The task of ranking and selecting projects, on
the one hand, is relatively simple, and on the other
hand, it is the basis for other tasks related to the
management of investment projects in
information infrastructure. It should be noted that
there is no universal model for project ranking and
selection, which would apply to every specific
situation. There is no good or bad model. No
model can fully reflect the existing reality of
projects but should be as close as possible to it.
Projects should be evaluated in compliance with
the company’s goals. The model should be
wellthought-out, flexible, easy to use, cheap, and
easy to use about computer technology (IT
projects).</p>
    </sec>
    <sec id="sec-4">
      <title>4. References</title>
      <p>P. Anakhov, et al., Increasing the
Functional Network Stability in the
Depression Zone of the Hydroelectric
Power Station Reservoir, in: Workshop on
Emerging Technology Trends on the Smart
Industry and the Internet of Things, vol.
3149 (2022) 169–176.</p>
      <p>TajDini, M., Sokolov V., Buriachok V.
(2019). Men-in-the-middle attack
simulation on low energy wireless devices
using software define radio. Workshop of
the 8th International Conference on
"Mathematics. Information Technologies.
Education": Modern Machine Learning
Technologies and Data Science (MoMLeT
and DS), vol. 2386, 287–296.</p>
      <p>V. Grechaninov, et al., Decentralized
Access Demarcation System Construction
in Situational Center Network, in:
Workshop on Cybersecurity Providing in
Information and Telecommunication</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
            <given-names>II</given-names>
          </string-name>
          , vol.
          <volume>3188</volume>
          , no.
          <issue>2</issue>
          (
          <year>2022</year>
          )
          <fpage>197</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          206. [4]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <source>Formation of</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>and the Internet of Things</source>
          , vol.
          <volume>3149</volume>
          (
          <year>2022</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          107-
          <fpage>117</fpage>
          . [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Chen</surname>
          </string-name>
          , Smart City Ranking
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>Reliability</given-names>
            <surname>Analysis</surname>
          </string-name>
          ,
          <year>2018</year>
          International
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>Computational</given-names>
            <surname>Intelligence</surname>
          </string-name>
          (CSCI),
          <year>2018</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>doi:10.1109/CSCI46756</source>
          .
          <year>2018</year>
          .
          <volume>00109</volume>
          [6]
          <string-name>
            <given-names>M</given-names>
            <surname>Wanli</surname>
          </string-name>
          , et al., People Logistics in Smart
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Cities</surname>
          </string-name>
          , Communs. of the ACM,
          <volume>61</volume>
          (
          <issue>11</issue>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          (
          <year>2018</year>
          )
          <fpage>54</fpage>
          -
          <lpage>59</lpage>
          . [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          , Ö. Hazır,
          <string-name>
            <surname>A</surname>
          </string-name>
          Data Envelopment
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          Manag.
          <volume>67</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          )
          <fpage>414</fpage>
          -
          <lpage>429</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          10.1109/TEM.
          <year>2018</year>
          .
          <volume>2888817</volume>
          [8]
          <string-name>
            <given-names>K.</given-names>
            <surname>Hasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Preece</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Milanović</surname>
          </string-name>
          , Priority
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>Transactions on Power Systems</source>
          ,
          <volume>32</volume>
          (
          <issue>4</issue>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          (
          <year>2017</year>
          )
          <fpage>2629</fpage>
          -
          <lpage>2639</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          10.1109/TPWRS.
          <year>2016</year>
          .
          <volume>2618347</volume>
          [9]
          <string-name>
            <given-names>E.</given-names>
            <surname>Sakrutina</surname>
          </string-name>
          , Some Functions of the “Safety
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>Area</given-names>
            <surname>Safety Assurance</surname>
          </string-name>
          , 2017 International
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Kazakhstan</surname>
          </string-name>
          ,
          <year>2017</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          10.1109/SIBCON.
          <year>2017</year>
          .
          <volume>7998576</volume>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Berdibayev</surname>
          </string-name>
          , et al.
          <article-title>Studies on cloud-based</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>Proceedings</source>
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>68</fpage>
          -
          <lpage>80</lpage>
          . [11]
          <string-name>
            <surname>ENISA</surname>
          </string-name>
          ,
          <year>2020</year>
          . URL:
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>analysis-report [12] ENISA</source>
          ,
          <year>2020</year>
          . URL: https://www.enisa.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          europa.eu/publications/ccc-study
          <source>[13] ENISA</source>
          ,
          <year>2020</year>
          . URL:https://www.enisa.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          dependency [14]
          <string-name>
            <given-names>I.</given-names>
            <surname>Zhukov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Balakin</surname>
          </string-name>
          , Detection of
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>Sci. J. Young</given-names>
            <surname>Sci</surname>
          </string-name>
          .
          <volume>9</volume>
          (
          <issue>36</issue>
          ) (
          <year>2016</year>
          )
          <fpage>91</fpage>
          -
          <lpage>93</lpage>
          . [15] Building and Community, Federal Ministry
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <source>of the Interrior</source>
          ,
          <year>2020</year>
          . [16]
          <string-name>
            <surname>Kritis</surname>
            ,
            <given-names>URL</given-names>
          </string-name>
          :
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <surname>EN</surname>
          </string-name>
          /Home/ home_node.html [17]
          <string-name>
            <given-names>K.</given-names>
            <surname>Scarfone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mell</surname>
          </string-name>
          , Guide to Intrusion
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <surname>NIST</surname>
            <given-names>SP</given-names>
          </string-name>
          ,
          <year>2007</year>
          ,
          <fpage>800</fpage>
          -
          <lpage>94</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <source>doi:10</source>
          .6028/NIST.SP.
          <volume>800</volume>
          -
          <fpage>94</fpage>
          [18]
          <article-title>Federal Office for Information Security</article-title>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>2020. URL:</mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <article-title>i_node</article-title>
          .html [19]
          <string-name>
            <given-names>L.</given-names>
            <surname>Sakovych</surname>
          </string-name>
          , et al.,
          <source>Study on Complex</source>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <surname>CEUR Workshop</surname>
            <given-names>Proceedings</given-names>
          </string-name>
          , (
          <year>2020</year>
          )
          <fpage>680</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          691. [20]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Avkurova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Abduraimova</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <surname>Infrastructure</surname>
            ,
            <given-names>ICTERI</given-names>
          </string-name>
          <year>2021</year>
          Workshops,
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <string-name>
            <surname>Commun</surname>
          </string-name>
          .
          <source>Comput. Inf. Sc</source>
          .
          <volume>1635</volume>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <source>doi:10</source>
          .1007/978-3-
          <fpage>031</fpage>
          -14841-5_
          <fpage>30</fpage>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <source>Method for Calculating</source>
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <source>Workshop Proceedings</source>
          ,
          <volume>3347</volume>
          (
          <year>2022</year>
          )
          <fpage>234</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          245. [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , Critical Aviation Information
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          Press Ebooks,
          <volume>47</volume>
          (
          <issue>3</issue>
          ) (
          <year>2016</year>
          )
          <fpage>308</fpage>
          -
          <lpage>316</lpage>
          . [23]
          <string-name>
            <surname>I. Zhukov</surname>
          </string-name>
          , Implementation of Integral
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <volume>14</volume>
          (
          <issue>4</issue>
          ) (
          <year>2010</year>
          )
          <fpage>117</fpage>
          -
          <lpage>122</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          10.3846/AVIATION.
          <year>2010</year>
          .
          <volume>18</volume>
          [24]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Hadidi</surname>
          </string-name>
          , et al.,
          <source>Methods of Risk</source>
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          <volume>11</volume>
          (
          <issue>2</issue>
          ) (
          <year>2016</year>
          )
          <fpage>81</fpage>
          -
          <lpage>91</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          10.15866/IRECOS.V11I2.
          <volume>8233</volume>
          [25]
          <string-name>
            <given-names>I.</given-names>
            <surname>Zhukov</surname>
          </string-name>
          , et al.,
          <source>Increasing the Accuracy of</source>
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>1st International Conference on Cyber</mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <string-name>
            <given-names>Information</given-names>
            <surname>Networks 2019 (CMiGIN-</surname>
          </string-name>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>