<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Infrastructure Cybersecurity under Complex Man-Made Threats Conditions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Liubomyr Sikora</string-name>
          <email>lssikora@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Lysa</string-name>
          <email>lysa.nataly@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olga Fedevych</string-name>
          <email>olha.y.fedevych@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdana Fedyna</string-name>
          <email>fedynabogdana@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Bandera Str., Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Ukrainian academy of printing</institution>
          ,
          <addr-line>19 Pid Goloskom Str., Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Making and implementing decisions in complex hierarchical systems, as a procedural part of management activity, has an applied nature, which is manifested in the performance of actions to respond to and influence threat factors on object, within the boundaries of relationship between management subject and object. In this context, the control system is provided by auxiliary computerized human-machine decision support systems (subsystems) that help intelligent agents perform decision-making actions and react to results of decision implementation. For effective adaptation and development of these systems, it is necessary to have a complete decision-making and implementation system. In the latter, there will be applied informational and algorithmic support for decision-making procedures implementation based on decision-making and implementation mechanism, taking into account management system integration, as a prerequisite for effective management of hierarchical systems. Such a complex need determines the necessity to develop the conceptual structure of the mechanism in connection with the decision-making and implementation system on the integration basis of building a management system.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Cyber security</kwd>
        <kwd>attacks</kwd>
        <kwd>system</kwd>
        <kwd>management</kwd>
        <kwd>cognitive models</kwd>
        <kwd>information technologies</kwd>
        <kwd>strategies</kwd>
        <kwd>risks</kwd>
        <kwd>goal orientation</kwd>
        <kwd>hierarchy</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>mechanism will involve combination of components on the structural-base model of integrated
control system design.</p>
    </sec>
    <sec id="sec-2">
      <title>2. State of the art</title>
      <p>Management solution for managing a hierarchical system is an intelligent product created and
used by the management system. Intellectual activity of this kind involves information operation
about object characteristics with use by management subject of information-knowledge about the
rules of operation, which explain how to influence or refuse to influence the object. That is,
management is carried out through the information presentation of both the object and the
subject's actions, taking into account the structure of a complex system with a hierarchical
organization and various causes of emergency situations. Such situations can arise in the event of
external threats and attacks on the object, and also in the preparation of project documentation,
mistakes may be made during their development. Accordingly, active attacks, failures,
malfunctions (reduction in system reliability and resources) can lead to a failure of the object's
functioning. Also, one of the main reasons that can lead to a disaster and emergency situations in
the facility's operation system is the intellectual and cognitive errors of the operational staff,
which leads to its informational and target disorientation.</p>
      <p>In accordance with goals that functioning system sets for itself, it is necessary to form
requirements for its reliability and functionality of ACS (Automated Control System) units,
management structure. Cybersecurity of a hierarchical structure is an urgent problem today,
which includes information and intellectual support in the formation of adoption and
implementation of purpose-oriented decisions in the conditions of threats, resource and structural
and other types of attacks on infrastructure.</p>
      <p>2.1.</p>
    </sec>
    <sec id="sec-3">
      <title>Related works</title>
      <p>
        Works [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ] are devoted to the problems of building procedures for making effective
management decisions in technical and economic systems. Work [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] is devoted to large systems
organization theory, in which the basic models of structure construction, functioning models,
open management strategies, resource and strategic games, effective design problems are
considered. Data processing methods, classification and forecasting methods as the basis for the
formation of decision-making process are considered in [
        <xref ref-type="bibr" rid="ref4 ref6">4,6</xref>
        ]. Expert systems theory methods for
use in complex systems in management decisions formation are considered in [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7,8,9</xref>
        ]. The theory
of coordination in management processes is considered in [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15">12-15</xref>
        ]. Cognitive technologies for
situation assessing are described in [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], risk models in [
        <xref ref-type="bibr" rid="ref10 ref11">10,11</xref>
        ] and the use of artificial
intelligence and big data analysis in [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20">16-20</xref>
        ] accordingly.
      </p>
      <p>2.2.</p>
    </sec>
    <sec id="sec-4">
      <title>Research purpose</title>
      <p>On the basis of system analysis and their information and logic-cognitive technologies,
determine and justify indicators for identifying the causes of crisis and emergency situations in
complex man-made integrated systems with hierarchical infrastructure when threats and attacks
affect process and management goals, which is necessary to ensure effective methods of
countermeasures and high cyber security level.</p>
      <p>2.3.</p>
    </sec>
    <sec id="sec-5">
      <title>Research object</title>
      <p>Hierarchical system, goals and dynamics of complex man-made systems in a complex of
spatially distributed integrated production facilities.</p>
    </sec>
    <sec id="sec-6">
      <title>3. Main results</title>
      <p>3.1.</p>
      <p>between infrastructure hierarchy levels as a method for</p>
    </sec>
    <sec id="sec-7">
      <title>Complex man-made system coordination processes increasing resistance to attack actions</title>
      <p>Analysis of complex ACS-TP systems developed during the (3-4) development stage of
information and management technologies, which were used in complex production
energyactive complexes with a continuous process, showed that at the current stage they do not meet
the requirements for ensuring resistance to attacks of the system approach at their design.</p>
      <p>Number of tasks that were solved in the management process was large, but the inconsistency
of methods of solving technical, functional, algorithmic and organizational tasks and the
procedures for their solution complicated the process of goal-oriented management due to the
complexity of harmonizing technological requirements, management methods, data processing
tools and decision-making strategies in the conditions of threats and information attacks.</p>
      <p>Main reason for the low level of management efficiency in the event of resource and
information threats at different levels of the hierarchy was that the behavior of operative
personnel at different management levels was not coordinated with the production infrastructure
possibilities and resources provision.</p>
      <p>3.2.</p>
      <p>strategic-level infrastructure for effective countermeasures</p>
    </sec>
    <sec id="sec-8">
      <title>Man-made systems integration processes into complex against threats</title>
      <p>At the fourth stage of the development of energy-active objects complex management systems in
production management continuous process, to the fullest extent arose the need to combine
individual automated systems and subsystems of the infrastructure into a complex goal-oriented
system based on information and intellectual technologies.</p>
      <p>A complex integrated infrastructure with a management system, which is oriented towards
strategic goals, includes and will combine into a single the next goals:
{MOі / і=1</p>
      <p>n }
{ІІАSCR }
•
•
•</p>
      <p>- management objects of passive and active type;
{(ACS - ТP)і=1,n - automatic facility management systems;</p>
      <p>}
{ACYIn } - automated systems with a hierarchical management structure;
• - information intelligent
management strategies;
management systems
with coordinating
{DSSR }
• - decision support systems with coordination and expert technologies to
counter attacks and active threats;
{ОСІCУ } - operational systems of intellectual, cognitive and creative management;
{RSU pi - technological flows resource management systems;</p>
      <p>}
{SEZ } - environmental protection systems.</p>
      <p>
        The theoretical foundations of such systems construction are considered in fundamental
works [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14 ref15 ref19 ref20 ref21 ref3">3, 11-15, 19-21</xref>
        ].
      </p>
      <p>On the basis of the conducted research, a structural-functional scheme of production
structures coordination-integration game into infrastructure was developed based on agreement
of global goal (Fig. 1.)</p>
      <p>Markings on Fig. 1.:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
• {FRi, FRЕ , FRS } - factors influencing resource flows, energy, structures of the object.
• Integration processes during the structural game take place at the levels of the system
hierarchy (SR5, SR6, SR7), coordination of goals and strategies occurs at levels (SR3, SR4,
SR5).</p>
      <p>FRm - factors affecting the ecosystem - material;
FRЕ - factors of energy impact on the environment;
CFZ - strategy of environmental protection systems;
GGi - global infrastructure goals;
GCiU - management goals at the operational level;
CUS - goal oriented management of production system;
F ( АtakCi) -attacks factor on the entire system – operational level;
I (Strat) - systems integration strategy at the upper level;
Strat(SKCi) - management coordination strategy according to the goal;
{ОУі} - management objects (active passive conversion, mixed type);
{Di, Dn} - information and management – executive data flows;
ОСІКn</p>
      <p>GCiU
CUS</p>
      <p>Coordination Star (SKCi)
FRn
FRE</p>
      <p>CEz
Conflict</p>
      <p>IIACSK
АSC- IS
АCS-ТP1</p>
      <p>RSU1</p>
      <p>RSUn
OY1</p>
      <p>Dn</p>
      <p>Di</p>
      <p>OYn</p>
      <p>D1</p>
      <p>D2
Resource
complex
The global game is formed by the participants of ((SR1, SR2, SR3) ⊗ SR4) levels on the basis
of infrastructure of corporate management goals and strategies agreement, which with full risk
probability may be formed.</p>
      <p>3.3. Procedures for integrating systems into the infrastructure
with goal-oriented management strategies
In order to increase the stability of their infrastructure functioning, it is necessary to perform a
constructive component analysis of technological aggregated system capabilities for production
infrastructure in interaction with automated control system (human-machine interaction), taking
into account intellectual capabilities of managers at all levels of hierarchy and
serviceoperational maintenance. Assess possible risks of failure and shutdown of emergency situations
under resource threats conditions and information attacks on goal-oriented management process
(Fig. 2.).</p>
      <p>Markings on Fig.2.:
•
•
•
•
•</p>
      <p>Target requirements: V1.1 - goals definition, V1.1a – goals coordination, V2.1 –
internal and external factors affecting goals, V2.1a – structured goals, V1.2 –
coordination of goals with management, V1.2a – functioning duplication;
Functional requirements: V2.2 – functional structuration, V2.2a – management
functions;
Organizational management requirements: V1.3 – structure consistency, V 1.4 –
actions coordination, V 1.5 – throughput, V 1.6 – system stability, V2.3 – elements
organization, V2.4 – elements fixing, V2.5 – load distribution, V2.6 – control, V
1.7active actions;
Cognitive requirements: V 1.8 – professional qualities, V2.7 – regulation, V2.8 –
professional compliance, V1.9, V1.15 – consistency, V1.10 – sharing usage, V1.11 –
information duplication, V1.13 – information compatibility, V1.14 – information
aggregation, V2.9 – information provision, V2.10 - single database, V2.11 –
information duplication, V2.13 – information transformation, V2.14 – accounting of
method, – consistency, V1.16 – risk assessment, V1.17 – feasibility;
Management integration: V2.15, V2.16 – indicators, V2.17 – methods, V1.18 –
management process, V1.19 – process safety, V1.20 – conflicts occurrence, V2.18 –
goals achievement, V2.19 – control means, V2.20 – information technology tools.</p>
      <p>To increase robustness of information and management systems, networks and channels of
transmission and dial exchange in the management process, under the conditions of information,
psychological and cognitive attacks, it is necessary to analyze (both in existing and newly
designed) all infrastructure components for stability. At the same time, it is necessary to take into
account that components have, according to the type of systems and dynamics functions
∀x ∈ X ; ∃y ∈ Y ; X Aij →Y | C  A 
 ij i ik K i y i  and displaying actions  ij  in the target area defined at
strategic level.</p>
      <p>Interaction between systems during the integration process can take place between
energyactive, informational, resource and management infrastructure components.</p>
      <p>Decision-making levels:
•
 ←Si 
 OYi A → BM </p>
      <p>V1 - (object - control) – (control  i i  );
•
•
•
•</p>
      <p>OY ←Ai ПR | ПR ⊂ D Re s 
V2 - (object - control) – (resource source  i i  );
V3 - (object - control)– (information system OYR K → ІВС  );
V4
(information
system)
–
(system
(ACS-TP)
management
OY S → ІВС Di→ SUi 

 R  );
V5 - (ASC-TP) – (operational management system (KRIAi) with operational
cognitive agents team).
ОСІКn</p>
      <p>GCiU
CUS</p>
      <p>Coordination Star (SKCi)
АSC- IS
АCS-ТP1</p>
      <p>RSU1</p>
      <p>RSUn
OY1</p>
      <p>Dn</p>
      <p>Di</p>
      <p>OYn</p>
      <p>D1</p>
      <p>D2
Resource
complex
The interaction and integration game concept of infrastructure, between production, information,
management type subsystem is the basis for describing process of active countermeasures
against threats.</p>
      <p>If take into account that management structure includes an automatic system for
implementation of object management process (ASU-TP-ASU) and a team of management
operators (cognitive agents) so behavior of such a structure has a high risk of failure under
threats influence.</p>
      <p>Accordingly, let’s provide a list of active threat attacks on the man-made system, both
internal and external (Table 1).</p>
      <p>Attacks on complex destruction of
man-made system.
with situation in external and internal infrastructures, let’s form
integration process (Fig. 3).</p>
      <p>Markings on Fig. 3.:
- active influence factors on information, knowledge, goal-oriented factors
operational
administrative
management
system
Strategic goal-oriented management system with all levels of infrastructure hierarchy
∋ Koord (Strat (U | Ci )) : SStratCu − Leve ∪ IS
coordination management.
on the
basis
of
goal-oriented
Σαrisk</p>
      <p>Wij
Σ
Wij
Σαrisk</p>
      <p>Agents behavioral space (КІА)
Information / knowledge</p>
      <p>Economic interests (Сі)</p>
      <p>Integration process
Establishing basic (planned, project) integration
features in agents images based on awareness of</p>
      <p>economic interests and setting goals
Acquiring actual integration features
(codimensional verification of basic ones and
introduction of new ones) during convergence
(integration) of agents images on the basis of
situational iterations of convergence - convergence
according to economic criteria of interests with the
use of existing and supplemented (new)</p>
      <p>knowledge. 2
Fixation of integration signs in agents images with
reproduction ("acceptance", "implementation" - in
business processes and states
1
3
Information / knowledge</p>
      <p>Economic interests
Agent behavior space (КІАj)</p>
      <p>Fi(Ai)
Fz(Ak)
Fc(Am)
conditions of strategic level cognitive intellectual agent’s teams
Main strategic management goal is the development of sustainable self-renewing methods
process of production based on strategies of overall orientation, integration, and coordination
under the conditions of active overall oriented threats.
10
.</p>
      <p>V11 ,V12 )
goals and
strategies
coordination</p>
      <p>(V12 ,V22 )
structure goal
orientation
(V12a ,V22a )
management'</p>
      <p>s goal
orientation
(V13 ,V23 )
management</p>
      <p>tactics
(V14 ,V24 )
management</p>
      <p>tactics
dynamics
(V15 ,V25 )
resistance to
attack factors
(V16 ,V26 )</p>
      <p>mode
indicators
analysis
(V17 ,V27 )
integration
project team
µ n (CF )
µ n (Bd )</p>
      <p>Pr ob</p>
      <p>Pr ob</p>
      <p>Pr ob
(0.7 ÷ 0.9) (0.7 ÷ 0.9) αr1 (0.1 ÷ 0.9) αr2 (0.1 ÷ 0.9) αr3 (0.1 ÷ 0.4)
3.4.</p>
    </sec>
    <sec id="sec-9">
      <title>Risks analysis in man-made systems</title>
      <p>To analyze risks in man-made systems and build schemes and methods for their minimization
and management, it is necessary to apply the risk analysis methodology, which is based on four
components:
1. Risk factors source, structure models.
2. Scenarios of active actions and effects of factors on system functioning process.
3. Analysis of action results of active factors on system.</p>
      <p>4. Attacks generators and activators.</p>
      <p>Risk source is related to consequences of active actions through the scenario - a chain of events
related to risk implementation in system, under certain conditions, which leads to negative
consequences and accidents.</p>
      <p>Chains, paths are actually development scenarios of a dangerous situation from the point of
view of different positions and describe what can happen to system under action of active factors
generated by risk source.</p>
    </sec>
    <sec id="sec-10">
      <title>4. Conclusion</title>
      <p>According to target task of developing methods for solving infrastructure cyber security
problems, it has been completed:
•
•
•
•
•</p>
      <p>Analysis of the literature sources on man-made infrastructure cyber security, issues
resistance to attacks and recovery in threats conditions;
Tasks that need to be solved to ensure counteraction of attack management system
and threats to infrastructure and system, target management strategies are
substantiated;
Cognitive principles of information provision necessary for creation of active
resistance strategies to attacks on management structure based on strategies of
coordination and overall orientation are substantiated;
Information provision data flow processing methods for determining indicators of
signs by an expert system as of countering threats strategy basis is substantiated;
Interaction process between operational and target, cognitive and automated
decision-making levels of management hierarchy was analyzed;
Solving above problems on system and information levels can help modernize the existing
infrastructure and improve their design process to increase comprehensive cyber security level.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponomarenko</surname>
          </string-name>
          ,
          <article-title>Information systems</article-title>
          and technologies in economics, Кyiv, Academy,
          <year>2002</year>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Konstantinov</surname>
          </string-name>
          , Yu.Ponomarenko,
          <article-title>Modern information enterprise management technologies, Lviv</article-title>
          ,
          <string-name>
            <surname>UAP</surname>
          </string-name>
          ,
          <year>2010</year>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kondratiev</surname>
          </string-name>
          ,
          <article-title>Large systems: Modeling of organizational mechanisms</article-title>
          , Мoscow, Science, 1989
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Hettmanserger</surname>
          </string-name>
          ,
          <article-title>Statistical inference based on ranks</article-title>
          , New York,
          <year>2ws</year>
          ,
          <fpage>1985</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>E.</given-names>
            <surname>Muschik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Muller</surname>
          </string-name>
          , Entschidun - gspraxis, Berlin VEB Verlog Technik,
          <year>1990</year>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Davison</surname>
          </string-name>
          , Multidimensional scaling, New York, IWss,
          <year>1988</year>
          . DOI:
          <volume>10</volume>
          .1016/S0169-
          <volume>7161</volume>
          (
          <issue>03</issue>
          )
          <fpage>22018</fpage>
          -
          <lpage>6</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Barankevych</surname>
          </string-name>
          ,
          <article-title>Expert methods in decision making, Lviv, PC LNU named after I. Franko, 2008</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>O.</given-names>
            <surname>Belz</surname>
          </string-name>
          ,
          <article-title>Basics of economic expert systems</article-title>
          , Lviv,
          <string-name>
            <surname>LNU</surname>
          </string-name>
          ,
          <year>2009</year>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Erina</surname>
          </string-name>
          ,
          <article-title>Statistical modeling and forecasting</article-title>
          , Kyiv,
          <year>2004</year>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>L.</given-names>
            <surname>Sikora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lysa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tkachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Fedevych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Krejčí</surname>
          </string-name>
          ,
          <article-title>Cognitive and information decisionmaking technologies and risk assessment in technogenic systems in:</article-title>
          <source>Proceedings of the 2nd International workshop on computational &amp; information technologies for risk-informed systems CITRisk</source>
          <year>2021</year>
          , Kherson, Ukraine,
          <year>2021</year>
          , рр.
          <fpage>419</fpage>
          -
          <lpage>433</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Fesl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tupychak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Sikora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lysa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tkachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Fedevych</surname>
          </string-name>
          ,
          <article-title>Information technologies for operational staff training for man-made systems under threats and risks in:</article-title>
          <source>Proceedings of the 2nd International workshop on computational &amp; information technologies for riskinformed systems CITRisk</source>
          <year>2021</year>
          , Kherson, Ukraine,
          <volume>3101</volume>
          ,
          <year>2021</year>
          , рр.
          <fpage>374</fpage>
          -
          <lpage>387</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Yu</surname>
          </string-name>
          .Kunchenko,
          <article-title>Polygons of approximation in space with a generating element</article-title>
          , Кyiv, Science thought,
          <year>2005</year>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Demri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Goranko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lange</surname>
          </string-name>
          , Temporal Logics in Computer Science, Cambridge, Cambridge University Press,
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .1017/CBO9781139236119
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>F.</given-names>
            <surname>Lyugger</surname>
          </string-name>
          ,
          <article-title>Artificial intelligence: strategy and method of solving complicated problem</article-title>
          , Moscow, Wiyams,
          <year>2003</year>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Mi.P.</given-names>
            <surname>Groover</surname>
          </string-name>
          ,
          <article-title>Automation, production systems, and computer-integrated manufacturing</article-title>
          , Prentice Hall Press,
          <year>2007</year>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>I.Hawryszkiewych</surname>
          </string-name>
          ,
          <article-title>Introduction to system analysis and design</article-title>
          , New York,
          <year>2000</year>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Miele</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Damoulakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cloutier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tietze</surname>
          </string-name>
          ,
          <article-title>Sequential gradient-restoration algorithm for optimal control problems with nondifferential constraints</article-title>
          ,
          <source>JOTA</source>
          ,
          <volume>2</volume>
          ,
          <year>1974</year>
          , р.13
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>W.</given-names>
            <surname>Lynn</surname>
          </string-name>
          <string-name>
            <surname>III</surname>
          </string-name>
          ,
          <article-title>Defending a new domain: the Pentagon's cyberstrategy</article-title>
          ,
          <source>Foreing Affairs</source>
          ,
          <year>2010</year>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>K.</given-names>
            <surname>Mitnik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Simon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wozniak</surname>
          </string-name>
          , The art of deception, New York, Wiley,
          <year>2002</year>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Neumann</surname>
          </string-name>
          ,
          <string-name>
            <surname>Computer-Related</surname>
            <given-names>Risk</given-names>
          </string-name>
          , ACM Press/Addison Wesley, New York,
          <year>1995</year>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>L.</given-names>
            <surname>Sikora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lysa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tkachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sabat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Fedevych</surname>
          </string-name>
          ,
          <article-title>Information technology of risk assessment for automated control systems of printing production in:</article-title>
          <source>Proceedings of the 2nd International workshop on computational &amp; information technologies for risk-informed systems CITRisk</source>
          <year>2021</year>
          , Kherson, Ukraine,
          <volume>3101</volume>
          ,
          <year>2021</year>
          , рр.
          <fpage>404</fpage>
          -
          <lpage>418</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>