<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Game and System Models of Conflict Resolution Methods and Infrastructure Cybersecurity Under Active Attacks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lubomyr Sikora</string-name>
          <email>liubomyr.s.sikora@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Natalya Lysa</string-name>
          <email>nataliia.k.lysa@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roman Martsyshyn</string-name>
          <email>roman.s.martsyshyn@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yulia Miyushkovych</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Bandery St., Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The article deals with the development of methods for solving conflict situations in technological structures. Modern model approach in the construction of algorithms and strategies allows you to solve the problems of analysis and synthesis of systems of different nature, focused on achieving certain goals. This occurs using a unified methodological framework. The theory and methods of creating systemic and group conflicts have a history of thousands of years. This problem has become especially important in our time, as conflicts have become global in nature. The main component of crises and conflicts of active type is infrastructure with hierarchical integrated systems, the struggle for resources (information, intellectual, energy and material), which in our time of military events has escalated to a high level. The solution of the problem of conflict and crisis in the internal structure of systems and in interaction with external objects as participants in the game is an urgent task. The solution of such a problem by means of game theory, operations research, linear programming is not possible in full, since in such a case there is an incompleteness of the conceptual apparatus and instrumental means.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Conflict</kwd>
        <kwd>system</kwd>
        <kwd>targets</kwd>
        <kwd>systemology</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>attacks</kwd>
        <kwd>infrastructure</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>algorithms and target strategies). The functional unifying concept will be the allocation of the
paradigm: "Target space – the shaper of the image of the dynamic situation in the target space –
the current state of the system – the target state – the strategy for achieving the goals – the price
of resources – the strategy for solving the crisis".</p>
      <p>Problem statement. In the systemology of goal-oriented structures, a conceptual apparatus for
solving conflict problems has been formed. Conflict is interpreted as an increase or shortage of
resources (material, energy, information, financial) to achieve the goal under perturbation. Another
interpretation of conflict is the collapse of the structure of the system with uncoordinated game
strategies.</p>
      <p>The methodology of conflict resolution is based on assessing the stage of the moment when the
trajectory of the object state enters a crisis situation (mapped in the target space of the system).
The indicator of entering the conflict will be the deviation of the state trajectory from the predicted
trajectory. Two stages can be singled out in a crisis exit strategy. Change in strategy of behavior,
structure of the system, parametric adaptation and optimization of the system is the first stage of
getting out of the crisis. Change or correction of the goal and, accordingly, strategies of behavior
and structure of the system – the second stage.</p>
      <p>Purpose of research. The purpose of research is to analyze the causes and factors of systemic
and cognitive conflicts in the action of internal and external threats to the structure and process of
management.</p>
      <p>Subject of research. The system-game concept of presenting the model of the emergence of a
conflict situation in the hierarchical infrastructure of the technogenic type.</p>
      <p>Research methods. The methods of research were: system analysis, antagonistic game theory,
cognitive psychology to identify the causes of conflict.</p>
      <p>Research methods. To solve the problem of the causes of conflict in the infrastructure
hierarchy, it is necessary to justify the methods of research and the choice of strategies to solve
the following problems:
1. Analyze existing methods for resolving internal and external influences on conflict
dynamics.
2. To substantiate the balance of means and resources for countering attacks.
3. To substantiate the concept of a complex antagonistic game as a scenario for countering
threats.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Review</title>
      <p>The theory and methods of creating and solving small and large systemic and group conflicts have
a history of thousands of years. In our time, this problem has become particularly relevant because
conflicts have become global in nature, and the main component of crises and conflicts of an active
type is infrastructure.</p>
      <p>Problems of the conflicts emergence and their system analysis have been considered many
times in the works of Ukrainian and foreign scientists.</p>
      <p>
        Crisis situations can often arise at energy-active facilities [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], where the process of their
functioning is largely influenced by the availability of material resources, the serviceability of
technical resources and the personnel knowledge level. In particular, this is described in [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. In
other literature the authors [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] raised the issue of visualization of information (about resources,
parameters, etc.) in the process of crisis resolution.
      </p>
      <p>
        Separately, a number of works devoted to the issues of modeling and simulation of complex
systems [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] can be singled out. Preliminary modeling of processes allows to foresee the conditions
of crisis occurrence and possible methods of its resolution.
      </p>
      <p>
        Also, in order to solve crises and make decisions, it is always necessary to take into account
the multi-criteria nature of the system [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Because the neglect of individual criteria can cause
crises and accidents at facilities.
      </p>
      <p>
        The problem of dynamical systems control has been repeatedly considered both by the authors
themselves [
        <xref ref-type="bibr" rid="ref7 ref8">7,8</xref>
        ] and by a number of other authors. For example, the problem of adaptive control
of dynamic systems was raised in [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] new methodologies for the design and analysis of adaptive control systems with
feedback are considered.
      </p>
      <p>
        One of the works of foreign scientists in the direction of adaptive resolution of crises and
problems is the method of model-free adaptive control, presented in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. This approach makes it
possible to control non-linear systems with uncertain (or variable) parameters and structure. In a
broader sense, management issues have been studied in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        The authors of [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] considered the issues of security and cybersecurity, which are an integral
part of the stable functioning of a complex system.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Materials and Methods</title>
      <p>Methods for solving the conflict at a given problem situation in the technological system are based
on the evaluation of the situation relative to the goal. The evaluation of the problem situation is
carried out at the moment when the trajectory of the state of the dynamic system in the vicinity of
the goal by the intelligent hierarchical observation system. This forms the criteria and indicators
of the degree of proximity to the goal (resource, information).</p>
      <p>3.1.</p>
    </sec>
    <sec id="sec-4">
      <title>Problem Solving Methods</title>
      <p>The choice of a model strategy for solving the problem situation in the target space of the system
is based on the assessment of internal and external resources and their sufficiency to achieve the
goal. There is also a refinement of local decision-making strategies class and prediction of the
future state trajectory. When internal material and informational resources are insufficient, the
principle of relations with external structures and criteria for assessing the cost of necessary
resources are formed. The solution to the crisis situation occurs through the mobilization of
resources and a change in the local strategy of behavior. In a more global variant, the synthesis of
the system new model and its structural adaptation can take place. The new structuring mode and
cyclic repetition of positions in the system with optimized structure and strategy, reaching the level
of dynamic equilibrium when internal and external influences change can also take place.</p>
      <p>If the conditions of the method for solving the problem situation at the level of adaptation and
optimization are not fulfilled, the transition to the next level takes place. At this level, the crisis
situation is a criterion of completeness and consistency of the used information and
logicalcognitive methodology, building a strategy for solving problematic problems. The main task for
solving the crisis (or conflict) is to synthesize a goal-oriented system to generate new knowledge
based on the data obtained in the previous game (and taking into account new concepts and
paradigms). This eliminates the problem of methodological contradiction.
Also on the basis of them there is a synthesis of targeted strategies to overcome the crisis and
tactics for the use of resources in moments of crisis. There is a change of orientations and strategic
goals, which again lead to a global analysis of the dynamics of resources in the renewed structures.
The methods described above are reflected in the scheme (Figure 1).</p>
      <p>The following notations are used in Figure 1:   ,   ,   – factors of the resource-structural
impact of the attack,   – factor of cognitive and informational influence,   ,   ,   –
resources (material, energy, cognitive resources of personnel),   – acceptable risk,   ( ) –
risks from attacks, IHACS – integrated hierarchical automated control system, 〈 ⨂  〉 – an
infrastructure game with an attacking system,   ( ) – reasons for a complex attack on
infrastructure, MO – management object, ACS-TP – automated control system for technological
process.
Under conditions of impact factors on both material and energy resources and information
systems, technological failures and disorientation of information and control complexes occur. At
the same time, it is difficult for the operator to verify the causes of failures and emergencies.</p>
      <p>Therefore, at the time of identifying faults, it is necessary to mobilize the intellectual potential
of the operator, heads of operational and management teams to identify the causes of failures and
pre-emergency situations, using the following knowledge and methods:
analysis of the system structure at the hierarchical level and modes of functioning in
order to identify the breakdown of structural links;
analysis of the processes dynamics to identify deviations of trajectories (based on the
scenarios of events in the object state space);
analysis of the actions logic according to management strategies (based on a clear
sequence of plans and commands);
identification of the conflict situation in the hierarchical structure.</p>
      <p>Knowledge of the problem environment reflects the understanding of the (intelligent)
purposeful system of the global properties of the solution search space and its logical structure
(based on semantics, which is the basis for the knowledge base formation procedure).</p>
      <p>Based on the fact that the logical structure of declarative representations is constructive, then
we consider that declarative representations share structural and semantic knowledge.</p>
      <p>Based on the nature and way of setting the control mechanism, we can say that:
•
•
declarative representations are effective in metricized decision search spaces;
semantic knowledge is expressed in numerical or logical form.</p>
      <p>The basis for the description of objects and relations between them is a set of logical statements
and general rules of inference, which form the structure of the knowledge base. Such a knowledge
base is focused on solving the problems of a particular subject area of the hierarchical ACS.</p>
      <p>Structural relationships in knowledge bases are based on classes of models of logical
relationships, quantized logical operations and procedures and rules for drawing conclusions.</p>
    </sec>
    <sec id="sec-5">
      <title>Heuristic Search for a Way to Solve Problem Goal-Oriented</title>
      <p>The declarative representation of the heuristic search for a way to solve problem goal-oriented
tasks is based on cognitive models of goal behavior. The tasks of the problem-solving model
heuristic search are as follows:
we use a state space model to describe situations in the subject area;
еhe initial situation relative to the state of the research object is given in the form   ∈
S;
the target situation relative to the state of the object is given (designated) and the
constructive possibility of its achievement is determined  ⊆ S;
the structural model of the hierarchical system is given;
сlasses of possible strategies for the implementation of target tasks are specified;
а system of resource and terminal restrictions is given when forming decisions;
the decomposition model of the system structure and information and transport routes
is given;
given a set of operators that transform one situation into the second and change of states
of the object {  } ⊂  :   ⊂     :   −   +1.</p>
      <p>It is necessary to find a sequence of transition operators from the initial state to the final state
and evaluate the possibility of their implementation (efficiency) based on a system of constraints.</p>
      <p>The process of solving the problem is based on the construction of a sequence of (finite)
logicalmathematical operators in the form of (1)-(3):
for which is true
∃( 1.  2 …   ) ∈ F,  1,  2 …   ) ∈ F
 ∈   ,  0 ∈  0  1,  2 …   ( 0) ∈ T
∈    −1
heuristic search for action scheme (plan):


…  2  1( 0)
…</p>
      <p>∈ T ≡  ∈   1, … ,  2( 0) ∈   2, (… , (  ) … ( 2) 1( 0) … )
Based on this provision, we can formulate two basic approaches to solving the problems of
of the system,   ×</p>
      <p>where Z(t) ∈ IZ ⊂  – implementation of the state trajectory during the management process,
 ] – permissible limits for the interval of variation of the state parameter,
 ( ) ,  ∈   ×</p>
      <p>– graph of the spatial structure of the trajectory,   –
(  ) – method of attack, Φ( ) – state, [  ×   ] – state space,  0
– the initial state
 ( ) /   =  0 +
  ( ,  )
Φ  ( ,   ) −
Φ
( ,   )  
(1)
(2)
(3)
(4)
productive systems that use state-space representation of situations;
reduction systems that reduce the problem-solving process to procedures for solving
systems of subtasks based on their structural decomposition.</p>
      <p>Resource balance. The overall balance of material resources in a terminal management
decision-making strategy is described by a trajectory of a random process. This trajectory is
formed on the basis of local components of incoming flows and used resources. It reflects the
dynamic state of the system through the image of the situation in the target space of the system.
The structure of the target space is determined by the models of the state space and phase space of
the control object and their energy characteristics (based on the trajectory level when the resource
balance conditions are met).</p>
      <p>+ 

– phase space.</p>
      <p>−1

 =1</p>
    </sec>
    <sec id="sec-6">
      <title>4. Experiment, Results and Discussion</title>
    </sec>
    <sec id="sec-7">
      <title>4.1. Conflict Game in Infrastructure</title>
      <p>(5)-(6):
For each participant of the game, as an intelligent system that makes decisions on the direction to
achieve the goal, the method of forming management strategies taking into account the possible
behavior of the competitor is characteristic. Based on the dynamics equations that describe the
behavior of the players in the  (</p>
      <p>⨂  ) target space, we will obtain the balance of the game
where  1 ∈    ( | 1) – system.
where  2 ∈   
( | 2) – player.
∃   ,   :
∃  ^ :
  1( )</p>
      <p>2( )</p>
      <p>=  1( 1,  1) +  12( 2,  2)
=  2( 2,  2) +  21( 1,  1)</p>
      <p>Management strategies are based on the classification of situations. That is, it is based on the
assessment of the tractor state belonging to the class of the target space and the choice of the
control team (which translates the system and the target class). We have the following structure of
the division of classes as n-dimensional sets:
(5)
(6)
• {  } =1:   ∩   +1 =⊘,  dim   =   , with   &gt;   

,   – goals;
•    =1
:   ∩   +1</p>
      <p>Δ ,  dim   ≤   with   &lt;    .</p>
      <p>Taking into account the terminal time and the division into classes and state spaces, we will
have an invariant or locally invariant structure of the game interaction space:
• {  } =1 ×   =    – invariant system classification of the partitioning of the goal

•    =1</p>
      <p>× {  }</p>
      <p>
        =1 =    – locally invariant classification of the situation in the
space of loading states into the goal space (which is invariantly projected into the game
Local situations on the time interval partitioning of attack countermeasures are included in the
The introduction of this class partitioning allows the principles of synthesis of dynamic
behavioural strategies based on dynamic programming methods [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] and situational control to be
      </p>
      <p>The developed methodology and taxonomy of resource balance trajectory analysis during the
game is based on methods of parametric and nonparametric statistics, decision-making theory
under uncertainty, and statistical hypothesis testing theory. (To test statistical hypotheses that
images of dynamic situations currently belong to alternative classes of reference models to which
local strategies for making target decisions correspond and which are elements of global policy).


space
space).
game scenario.
formed.</p>
    </sec>
    <sec id="sec-8">
      <title>4.2. Infrastructure cyber security</title>
      <p>The adaptation of goal achievement strategies under perturbations and disturbances is based on:
•</p>
      <p>on the problem and target situation models in a technological structure;
•
•
•
•
•
•
•
•
•
on the synthesis of goal achievement strategies in a feedback control system;
on the synthesis of the behavior of the system under a given structure under
perturbations and disturbances;
on the assessment of threshold disturbances that lead to a technological failure due to
the distortion of information about the state of the system in the mode of assessing the
situation and making decisions;
on the synthesis of modes and parameters correction (during the evolution of the
control object) and the system of observation, control and management within the
framework of the target task;
on the assessment of strong disturbances and correction of optimal signal processing
algorithms and ensuring their robustness, effective filtering of the signal from
disturbances (from the point of view of obtaining correct information as a basis for
decision-making in conditions of uncertainty);
on the correction of data processing algorithms for the formation of a dynamic situation
images;
on the correction of management object models and goal achievement strategies;
on the verification of goal achievement conditions and evaluation of means and
volumes of resources;
on the assessment of the degree of availability and mobility of resources for the
realization of goals in critical conditions;
on the correction of the strategy of entering the target area and the degree of available
resources at the time of the conflict (based on the cognitive resource of the ACS
personnel).</p>
    </sec>
    <sec id="sec-9">
      <title>4.3. Cognitive Characteristics of Risk</title>
      <p>On the basis of the analysis, considered methods of solving problem-oriented tasks and taking into
account the developed scheme of game model of conflict situation, the resulting table of cognitive
characteristics of risk was built Table 1. The table presents the influence of various factors on the
emergence of risks.
 
Table 1 uses the following designations:  (  ) – target factor of possible influence;  ( 2) – factor
of management actions;  (  ) – factor of possible management stability;  (   ) – agent's
cognitive factor;  (  ) – data blurring factor at the attack interval;   – a complex factor of the
probable attack on the system.</p>
    </sec>
    <sec id="sec-10">
      <title>5. Conclusions</title>
      <p>An analysis of current events (with active infrastructure disruption factors) has shown that, despite
existing indicators of possible threats (both low and high), projects of production structures have
been targeted at minimum costs with maximum profits.</p>
      <p>This concept has led to the instability of production systems in various industries. First of all,
this is related to the energy sector, since it requires large material resources and high intellectual
potential (which are necessary to ensure effective management and sustainable functioning). The
projects completed in the past did not provide anti-crisis stability because the management systems
were not modernized to eliminate the consequences of the possible occurrence of such threats.</p>
      <p>Optimization of the system mode is based on the formation of the quality function. The
components of this will be the indicator functions of saving resources, the terminal time of
achieving the goal, the accuracy of maintaining the functional state. Optimization of signal
processing algorithms and control strategies is based on the study of statistical characteristics of
signal trajectories and interference, ensuring their robustness and information adequacy. To solve
the problem of conflict situations in technological structures, it is necessary to create a complex
of conceptual models of systems. Management and optimization strategies are also necessary. And
on their basis - the synthesis of software and computer support, the selection of methods of
countering attacks (at the resource level, the structural level, and the cognitive-intellectual level of
personnel training).</p>
      <p>This paper analyses the contemporary causes and factors of conflict and crisis exit strategies.</p>
      <p>On the basis of the analysis, a game model of a conflict situation was constructed and methods
of solving the problem were proposed. The presented table shows the resulting indicators of
cognitive assessment of game risks.</p>
      <p>The results (shown in the table) allow us to better account for the potential for risks in complex
systems and to build methods for dealing with them.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Aruna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.S.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <article-title>Adaptive control for interactive thermal process</article-title>
          ,
          <source>2011 International Conference on Emerging Trends in Electrical and Computer Technology</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>291</fpage>
          -
          <lpage>296</lpage>
          . DOI:
          <volume>10</volume>
          .1109/ICETECT.
          <year>2011</year>
          .5760131
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>H.A.</given-names>
            <surname>Yousef</surname>
          </string-name>
          ,
          <article-title>Power system load frequency control: Classical and adaptive fuzzy approaches</article-title>
          . Boca Raton, FL: CRC Press,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1201/9781315166292
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>H.</given-names>
            <surname>Bevrani</surname>
          </string-name>
          , T.Hiyama,
          <source>Intelligent Automatic Generation Control. Boca Raton</source>
          , FL: CRC Press,
          <year>2011</year>
          . DOI:
          <volume>10</volume>
          .1201/b10869
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.</given-names>
            <surname>Wong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Real-time rendering: Computer Graphics with control engineering</article-title>
          . Boca Raton, FL: CRC Press,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1201/b15498
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Melin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Castillo</surname>
          </string-name>
          ,
          <article-title>Modelling, simulation and control of non-linear dynamical systems: An intelligent approach .using soft computing and fractal theory</article-title>
          . London, UK : CRC Press,
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .1201/9781420024524
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gul</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yucesan</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Erdogan, Multi-criteria decision analysis: Case studies in disaster management, 1St Edition</article-title>
          . Boca Raton, FL: CRC Press,
          <year>2022</year>
          . DOI:
          <volume>10</volume>
          .1201/9781003212904
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L.</given-names>
            <surname>Sikora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lysa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Fedyna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Durnyak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Martsyshyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Miyushkovych</surname>
          </string-name>
          ,
          <article-title>Technologies of Development Laser Based System for Measuring the Concentration of Contaminants for Ecological Monitoring</article-title>
          ,
          <source>2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>93</fpage>
          -
          <lpage>96</lpage>
          . DOI:
          <volume>10</volume>
          .1109/STC-CSIT.
          <year>2018</year>
          .8526602
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>L.</given-names>
            <surname>Sikora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Martsyshyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Miyushkovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lysa</surname>
          </string-name>
          ,
          <article-title>Methods of information and system technologies for diagnosis of vibrating processes</article-title>
          ,
          <source>2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>192</fpage>
          -
          <lpage>195</lpage>
          . DOI:
          <volume>10</volume>
          .1109/STC-CSIT.
          <year>2017</year>
          .8098766
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Xing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <article-title>Adaptive control of dynamic systems with uncertainty and quantization</article-title>
          . Boca Raton, FL: CRC Press,
          <year>2021</year>
          . DOI:
          <volume>10</volume>
          .1201/9781003176626
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>E.</given-names>
            <surname>Jarzebowska</surname>
          </string-name>
          ,
          <article-title>Model-based tracking control of Nonlinear Systems</article-title>
          . New York, NY: CRC Press,
          <year>2019</year>
          . DOI:
          <volume>10</volume>
          .1201/b12262
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>Adaptive backstepping control of uncertain systems with actuator failures, subsystem interactions, and nonsmooth nonlinearities</article-title>
          .
          <source>Boca Raton</source>
          , FL: CRC Press, Taylor &amp; Francis Group,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .1201/9781315154862
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jin</surname>
          </string-name>
          , Model Free Adaptive Control:
          <article-title>Theory and applications</article-title>
          . Boca Raton, FL: CRC Press,
          <year>2016</year>
          . DOI:
          <volume>10</volume>
          .1201/b15752
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>W.S.</given-names>
            <surname>Levine</surname>
          </string-name>
          ,
          <source>Control System Applications, 2Nd Edition</source>
          . Boca Raton, FL: CRC Press,
          <year>2018</year>
          . DOI:
          <volume>10</volume>
          .1201/b10382
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>J.R.</given-names>
            <surname>Raol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ramakalyan</surname>
          </string-name>
          , Control Systems: Classical, modern, and
          <article-title>ai-based approaches</article-title>
          . Boca Raton, FL: CRC Press, Taylor &amp; Francis Group,
          <year>2020</year>
          . DOI:
          <volume>10</volume>
          .1201/9781351170802
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Elngar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Thillaiarasu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Elhoseny</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.M.Sagayam</surname>
          </string-name>
          ,
          <article-title>Cyber Security and Operations Management for Industry 4.0</article-title>
          .
          <string-name>
            <surname>Boca</surname>
            <given-names>Raton</given-names>
          </string-name>
          , FL: CRC Press,
          <year>2023</year>
          . DOI:
          <volume>10</volume>
          .1201/9781003212201
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bellman</surname>
          </string-name>
          , Adaptive Control Processes. Princeton University Press,
          <year>2015</year>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>