<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Method of Determining the Importance Factor of IT Security Projects Investment Attractiveness in Critical Infrastructures</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stanislav Yarotskiy</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriia Sydorenko</string-name>
          <email>v.sydorenko@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anzhela Lelechenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olena Kolisnyk</string-name>
          <email>olena.kolisnyk@npp.nau.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artem Polozhentsev</string-name>
          <email>artem.polozhencev@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1, Liubomyra Huzara ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>181</fpage>
      <lpage>190</lpage>
      <abstract>
        <p>The consistent implementation of the policy of attracting direct foreign investments to the development of post-war Ukraine urgently requires the use of modern systems and IT for expert research of potential objects of these investments. The more indicators and characteristics are applied, the more objective the conclusion will be regarding the degree of investment attractiveness of a specific object of expertise. It is substantiated that the specified assessment of the investment attractiveness degree of the object of examination is obtained using the multiplicative function of aggregation, which takes into account the normalized Coefficients of Importance (CI) of both the relevant features of investment attractiveness and indicators of the degree of their expressiveness in a specific object. From the comparative analysis of these methods, it was determined that the mathematical method of setting priorities is more acceptable for research purposes. The paper presents a method for determining the CI of the investment attractiveness of ITsecurity projects in critical infrastructures, which, due to the synthesis of the method and procedures for calculating the total value of the value and comparing it with the established criterion of importance, makes it possible to determine the optimal iteration of the method and ensure both the nonlinearity of the obtained CI and acceptable accuracy of calculations. During its implementation, it was substantiated that the results of the second iteration are more acceptable, and the first ten (55.55%) in terms of the level of importance of features of the investment attractiveness of the examination objects provide a total contribution to the overall significance that exceeds the established criterion of 0.9.</p>
      </abstract>
      <kwd-group>
        <kwd>1 IT security</kwd>
        <kwd>project</kwd>
        <kwd>informatization</kwd>
        <kwd>critical infrastructure</kwd>
        <kwd>importance</kwd>
        <kwd>coefficients of importance</kwd>
        <kwd>investment attractiveness</kwd>
        <kwd>examination</kwd>
        <kwd>method of setting priorities</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The attraction of foreign direct investments for
the development of post-war Ukraine requires a
comprehensive and systematic information
analysis of the investment objects. Today the
development of IT projects and IT-security
projects aimed at the creation, development,
integration, and support of information and
communication systems, networks, resources,
and information and communication
technologies, which are implemented within the
framework of the National Informatization
Program and provide for additional funding, is
gaining in importance [1–3]. The greater the
number of indicators and characteristics
employed, the more objective the assessment of
the Investment Attractiveness (IA) of a
particular project or Object Of Expertise (OE)
becomes, particularly in the realm of
informatization. Therefore, the solution of a
multi-criteria Decision Making (DM) problem is
involved, for which appropriate methods of
system analysis and DM theory should be
applied [4–6], which, according to research [7],
can be represented as follows:
OEk , k = 1, K :</p>
      <p>
         q, L 
CI OEopt. = mkax  i=1n,,j=L1k ( PI i , CBijk )  , (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
 q 
 n−q i=q+1k ( PI i , CBijk ) 
 
where k ( PIi , CBijk ) is the aggregate function
of IA of the kth studied OE (OEk) according to
the ith characteristic feature of IA used in the
process of evaluation (Table 1); DSіjk is an
indicator of the Degree of Severity (DS) of the
ith Characteristic Peculiarities of Investment
Attractiveness (CPIP) in the kth studied OE,
determined by a special scale:
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
      </p>
      <p>R%CДBBPI R%CBB PI R%CCB PI R%CHB PI R%CДBHPI
T M (CB PI) = very high+ high +medium (normal)+ low + very low =
= R%CДBBPI + R%CBB PI + R%CCB PI + R%CHB PI + R%CДBHPI ,
(PIP— PI Pi ) linguistic assessments) into a
scale, the priority of which is clear:</p>
      <p>
        It should also be noted that the numerator
in (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) aggregates the PIP OE indicators, whose
value should be increased, and the
denominator, on the contrary, should be
decreased. And if we assign normalized
“weighting” factors to the CPIP and DS CPIP
indicators (Fig. 1):
The introduction of the CI and the transition
from (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) to (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) is important and relevant as, on
the one hand, the knowledge of the
normalizing factors is used in forecasting and
planning, project analysis, operational
management, risk assessment in ergonomic
systems, product quality, etc. [4, 8–10].
      </p>
      <p>
        n
PIi   i : 0   i  1,  i = 1,
 iL=1
CBij  ij : 0   ij  1,  ij = 1,
 i=1
then (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) turns into the following:
OEk , k = 1, K :
      </p>
      <p>
         q, L 
CI OEopt. = mkax  q i=1n,,j=L1  i  i jk  , (
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
      </p>
      <p> n−q i=q+1, j=1  i  i jk 
where ijk is the normalized Coefficient of the
Importance (CI) of the DS of the ith CPIP in OEk.
2. Analysis of Modern Approaches</p>
      <p>and Problem Statement
The problems of CI (weight, significance,
attractiveness) determination are the subject of
many modern scientific studies [4, 8–12], the
results of which are used:
• In the decision-making theory for dividing
criteria into groups and building
preference relations.
• To determine lexical and graphical</p>
      <p>ordering.
• In solving problems with homogeneous
equivalent criteria by the method of
generalized criterion and construction of
decisive rules.
• In pattern recognition, for building
classification algorithms, the so-called
“voting” algorithms/calculation of scores,
etc.</p>
      <p>The main purpose of CI is to compare different
values, qualities, criteria, properties, components,
etc. in a single comprehensive measure of these
values, properties, criteria, etc. A strict definition
of the weighting coefficients used in the CI theory
is also given within the expected or cardinal
theory of utility [11–13].</p>
      <p>
        In the context of this study, it is necessary to
establish the weighting factors for PIP OE
(Table 1) and DS CIP OE indicators (see (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )),
which usually occur according to the scheme
shown in Fig. 1.
Based on the analysis of papers [4, 13], it can
be noted that it is more convenient to find the
desired weighting coefficients based on the
systems of preferences of the specialists on the
set of the CPIP OE. At the same time, PS is
understood as a reasonable order of these
indicators and features: from more acceptable,
important, and significant to less important. It
should be noted that PS is trivial on the DS PIP
OE indicators and is defined in (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ).
      </p>
      <p>By implementing a multi-stage technology
for the detection and elimination of marginal
opinions and eliminating the “systematic
survivor error”, we obtained a statistically
significant PS of specialists on the CPIP OE set
at a high level of significance  = 1%. Further
optimization of this PS using the classical
Savage decision criterion and the Kemeny
median resulted in the following benchmark
ranking:</p>
      <p>PI P4
PI P15 mC PI P5</p>
      <p>mC mC
mC PI P7 mC PI P10 mC PI P13 mC PI P14 mC PI P6 mC PI P16 mC PI P1
mC PI P17 mC PI P3
mC PI P18 mC PI P8</p>
      <p>PI P2</p>
      <p>
        mC PI P11 mC
mC PI P12 mC PI P9 ,
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
where f is a mark of superiority of one PIP OE
over another in the “reference” PS.
      </p>
      <p>
        Thus, a “reference” Group PS (GPS) of
experts on the set of characteristic PIP OEs is
obtained, which is indicated in the ranking
scale and only gives an idea of the comparative
importance of the identified features. The
quantitative assessment of the difference in
importance is determined by the difference in
the rankings they occupy in the GPS (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ).
      </p>
      <p>However, given the peculiarities of
measurements in ranking scales [4, 13–15], it
is impossible to answer the question of how
many times one PIP OE is more significant than
another.</p>
      <p>Thus, from the spectrum of methods for
determining weighting factors, the ones that
are based on PS, and accordingly on PIP ranks
or their DS indicators, should be selected, for
which these factors should be set. Let us
consider such methods in detail.</p>
      <p>The ranking method [4, 13] proposes to
first determine the value of each PIP under
consideration:</p>
      <p>
        CPIi = 1− rPIi −1 , (
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
      </p>
      <p>
        n
where rPIi is the rank of the ith PIP OE in the
“reference” PS, which is shown in (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ); n is the
number of ordered PIPs. In this case, n = 18.
      </p>
      <p>Next, it is trivial to determine the total “value”
of the PIPs that were studied:</p>
      <p>
        CPI =  CPIi =  1− rPIi −1 , (
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
n n 
i=1 i=1  n 
and their normalized coefficients:

  PIi = nCPIi =
 i=1 CPIi
 (n +1) − rPIi
= n
 (n2 +1) −  rPIi
 i=1





1− rPIi −1
      </p>
      <p>n
 1− rPIi −1 
n 
i=1  n </p>
      <p>
        =
= 2 ((n +1) − rPIi ) , (
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
      </p>
      <p>n (n −1) + 2
n
 PIi = 1, 0   PIi  1.</p>
      <p>
        i=1
The normalized coefficients  PIi obtained in the
above way are reliable in the sense that not only
the agreed, but even the “reference” GPS is used,
which results in the more significant PIP OE
having a higher rank, and therefore a higher
“weight”, and consequently a higher value of the
normalized coefficient. On the other hand, the
estimates CPIi and  PIi are “rough” because
in (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) and hence (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) we assume their linear
dependence on the rank of the corresponding PIПі
in the GPS, which is reflected in (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ). It should also
be noted that since the measurements of the
importance of PIP OE are made on an ordered
scale, the mathematical operations on the ranks
provided in (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) and (
        <xref ref-type="bibr" rid="ref9">9</xref>
        ) are inadmissible.
      </p>
      <p>Therefore, methods of more subtle estimation of
CPIi and  PIi .should be used.</p>
      <p>
        The method of averaged ranks [9, 12]. If
rij is the rank assigned by the jth specialist to
the ith PIP OE in the Individual PS (IPS), which
was aggregated to obtain the “reference” GPS
and displayed in (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ), then the average rank of
the ith PIP is determined as follows:
      </p>
      <p>
        1 m
rPIi =  rij . (
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
      </p>
      <p>m j=1</p>
      <p>
        The sum of the ranks of the ordered set of
PIPs defined by the “reference” GPS shown in
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) is equal:
      </p>
      <p>n
rPI =  rij =
i=1
n ( n +1)</p>
      <p>.</p>
      <p>2</p>
      <p>
        Given that n=18, let’s determine that
rPI = 171. Comparing (
        <xref ref-type="bibr" rid="ref10">10</xref>
        ) and (
        <xref ref-type="bibr" rid="ref11">11</xref>
        ), we can
easily find the desired CI PIP:
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
m
 rij
 PIi = 1− rPIi = 1− j=1
      </p>
      <p>n
rPI m rij
i=1
= 1−
n
0  PIi  1,  PIi = 1.</p>
      <p>
        i=1
Analyzing (
        <xref ref-type="bibr" rid="ref12">12</xref>
        ), it is easy to see that the
considered method of averaged ranks, like the
previous approach, is simple and contributes
to obtaining reliable estimates when a more
significant PIP receives a smaller average rank
in absolute value, and therefore a larger CI.
      </p>
      <p>
        The disadvantages of the method are the
following: first, the estimates of the desired CI
of the PIP OE are rough, since the IPS of the
specialists aggregated in the “reference” GPS
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        ) are generally statistically significant, so one
cannot be sure of the non-linearity of the  PIi
CI obtained; second, the mathematical
operations on the ranks of the PIP OE, provided
for in (
        <xref ref-type="bibr" rid="ref10">10</xref>
        ), (
        <xref ref-type="bibr" rid="ref12">12</xref>
        ), are not allowed in the
ordering scale where they are measured.
      </p>
      <p>The method of prioritization [4, 13], also
known as the “leader problem,” is effective for
solving practical problems, which in the context
of this study are as follows:
• determining the more important PIP</p>
      <p>from the identified spectrum.
• organization of PIPs.
• determination of the quantitative</p>
      <p>indicator (CI PIP OE).</p>
      <p>The mathematical formulation of the problem
is as follows. Each PI i , i = 1, n is represented
by the vertex of the graph (Fig. 2) corresponding
to the results of their comparative pairwise
analysis by importance.</p>
      <p>If PI i has an advantage over PI  j
( PI i f PI  j ) by the level of importance, then
there is an arc i → j on the graph. On the other
hand, if PI  j f PI i , then there is an arc j → i
on the graph. The case when PI i and PI  j are
adequate in terms of importance: PI i  PI  j ,
corresponds to the presence of an arc i  j .</p>
      <p>
        CPI1 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) , CPI2 (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) ,K , 
C (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) =   .
      </p>
      <p>
        CPIi (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) ,K , CPIn (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) 
(15)
      </p>
      <p>In the second iteration, the “weight” of the
value of PIПi is its iterated “weight” of the first
order. The iterated “weight” of the value of PIP of
second order is calculated taking into account the
values of the other PIPs:</p>
      <p>
        n
Ci (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) =  cijC j (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) (16)
j=1
      </p>
      <p>The iterated “weight” of PIP values of the second
order is represented by the following vector:</p>
      <p>Subsequent iterations of the PIP OE
“weight” are carried out in the same way:
(17)
(18)
(19)
In this case:</p>
      <p>C ( k ) = C  C (k −1).</p>
      <p>P (0) = (1, 1, K , 1).</p>
      <p>Thus, according to the priority method
under consideration, the process of calculating
the quantitative indicators (“weights”) of PIP
OE consists of the sequential application of the
transformation specified by the matrix C to the
initial vector P (0) . Define PPвIіднi. ( k ) by the
normalized iterated “weight” of the kth order of
PIПi:</p>
      <p>CPIi (k )</p>
      <p>n
;  PвіIдн.i (k ) = 1.
 PвіIдн.i (k ) = n (20)
 CPIi (k ) i=1
i=1</p>
      <p>In general, the process of calculating the
normalized iterated “weight” of the PIP OE can
be represented as [13]:
 відн. ( k ) =  (1k ) C  відн. ( k − 1) (21)</p>
      <p>n n
where  ( k ) =   cPIi j PвіIдн.i (k − 1) is the</p>
      <p>j=1 i=1
sum of the vector components of C  P ( k – 1) ;
k = 1, 2,</p>
      <p>At each subsequent iteration, the values
 (i) ( k ) are refined. If the matrix C is not
decomposable, then according to the
PerronFrobenius theorem this leads to the limit to the
maximum eigenvalue  = lim (k ) of the matrix</p>
      <p>k→
C with the corresponding eigenvector [15]:
 = lim ( k )
k→
(22)</p>
      <p>Thus, the process of calculating the
normalized iterated “weight” PIP OE is
convergent. The calculation according to (20)
and (21) differs from the simple summation of
points in that it allows the indirect advantages
of one PIP OE over another to be taken into
account.</p>
      <p>Defining the research task. It should be noted
that in previous studies, the authors obtained a
“reference” GPS, where the importance of a
particular CPIP OE is determined by the
corresponding rank. On the other hand, the
analysis shows that a more effective method of
determining the CI of CPIP OEs that uses ranks is
the prioritization method.</p>
      <p>Thus, the purpose of this paper is to
develop and study a method for determining
the CI of investment attractiveness of IT
projects.
3. Method for Determining the CI
of Investment Attractiveness
of IT Projects
The proposed method is implemented in four
stages, which are shown in Fig. 3.</p>
      <p>Creating a graph that shows the prioritization
Stage 1 of PIP OE by level of importance.</p>
      <p>Determining the normalized iterated "value" of
Stage 2 CPIP.</p>
      <p>Сreating a square adjacency matrix for each
Stage 3 iteration.</p>
      <p>Calculation of the total value at each iteration</p>
      <p>Stage 4 and comparison with the importance criterion.</p>
      <p>Here is a closer look at each of the proposed
stages of the method.</p>
      <p>Stage 1. Building a Graph Showing the
Priority of PIP OE by Level of Importance</p>
      <p>First, let’s build a graph showing the priority
of PIP OE by level of importance (Fig. 4).
Stage 2: Determine the Normalized Iterated
CPIP “Value”</p>
      <p>
        Next, let’s consider the process of
calculating the normalized iterated “value” of
the CPIP OE. From the “reference” GPS shown
in (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ), we have the following results from the
pairwise determination of the importance of
these features.
      </p>
      <p>PI1 p PI8 PI1 f PI9 PI1 p PI10
PI1 p PI11
PI1 p PI14
PI1 p PI17
PI2 p PI3
PI2 f PI6
PI2 f PI9
PI1 p PI5
PI2 f PI11
PI2 f PI14
PI2 p PI17
PI3 p PI4
PI3 f PI7
PI3 f PI10
PI3 f PI13</p>
      <p>PI1 f PI12
PI1 p PI15
PI1 p PI18
PI2 p PI4
PI2 f PI7
PI2 f PI10
PI1 p PI6
PI2 f PI12
PI2 p PI15
PI2 p PI18
PI3 p PI5
PI3 f PI8
PI3 f PI11
PI3 f PI14</p>
      <p>PI1 p PI13
PI1 p PI16
PI2 p PI5
PI2 f PI8
PI1 p PI7</p>
      <p>PI2 f PI13</p>
      <p>PI2PI16
PI3 f PI6
PI3 f PI9</p>
      <p>PI3 f PI12
PI3 p PI15
PI3 f PI16 PI3 p PI17 PI3 f PI18
M M M M M M M M M M M M M M M M M M M
PI15 f PI16 PI15 f PI17 PI15 f PI18</p>
      <p>PI16 p PI17 PI16 p PI18 PI17 f PI18
Note that for the convenience of calculations,
the sequence of PIP OEs in Table 2 is presented
by their rank places determined by the
“reference” GPS [9]. The calculation for the first
iteration of the method is trivial and is
presented in columns 20 and 21 of Table 2.</p>
      <p>
        The calculation for the second iteration is as
follows:
CPI15 (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = 135 + 2  (33 + 31+ 29 + 27 + 25 + 23 +
M M M M M M M M M M M M M M M
      </p>
      <p>
        By analogy, the results of the third iteration of
the method are calculated and presented in
columns 24 and 25 of the same table. It is
inexpedient to make subsequent iterations, since
with the accepted accuracy of calculations to the
fourth decimal place, the coefficient of the less
important PIП9 reaches the value
 PI9 (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) = 0, 0000 starting from this iteration. This
is generally unacceptable.
      </p>
      <p>Fig. 5 gives a visual representation of the
dynamics of differentiation of the values of the
hazard ratios of the studied errors depending
on the number of iterations of this method.</p>
      <p>As can be seen in Fig. 5, in the first iteration of
the prioritization method, the change in CI PIP
OE from most significant to least significant is
linear and therefore unacceptable. The
inappropriateness of focusing on the results of
the third and subsequent iterations of the
method has already been demonstrated.</p>
      <p>Therefore, for further quantitative analysis of
the importance of the CPIP OEs under study,
we choose the results obtained in the second
iteration. On the one hand, the change of these
coefficients is non-linear, which generally
corresponds to the idea of the importance of
the influence of neighboring PIPs on their total
value. On the other hand, the quantitative
differentiation of the  PIi CIs is as acceptable
as possible for the accepted accuracy of their
calculations to the fourth decimal place. Fig. 6,
like Fig. 5, also illustrates the importance of the
PIP OEs studied.</p>
      <p>Stage 4. Calculation of the Total Value at
Each Iteration and Comparison with the
Importance Criterion</p>
      <p>Let’s find out the total contribution of the
partial importance of individual PIPs to their
total value. To do this, let’s introduce the following
important criterion based on [16–19]:
kn
 PIi  0, 9. (24)
i=1</p>
      <p>The implementation of criterion (24) led to
the following results:
k=17
 PIi =  PI15 + PI5 + PI4 + PI17 + PI3 +
i=1
make an absolute contribution to the total
importance of the entire spectrum studied.</p>
    </sec>
    <sec id="sec-2">
      <title>4. Conclusion</title>
      <p>The paper analyzes the known methods of
+ PI18 + PI2 + PI11 + PI8 + PI10 + PI7 + determining the CI and establishes that the
method of prioritization is more acceptable for
+ PI14 + PI13 + PI16 + PI6 + PI1 + PI12 = research purposes, which, depending on the
= 0,1574 + 0,1400 + 0,1235 + 0,1081+ 0, 0937 + iteration, allows to obtain the desired CI with
+0, 0804 + 0, 0681+ 0, 0568 + 0, 0465 + 0, 0372 + any non-linearity.
+0, 0290 + 0, 0218 + 0, 0157 + 0, 0105 + 0, 0064 + A method for determining the CI of
+0, 0033 + 0, 0013 = 0, 9997  0, 9 investment attractiveness of IT security
k=16 projects in critical infrastructures has been
 PIi =  PI15 + PI5 + PI4 + PI17 + PI3 + developed, which, by synthesizing the method
i=1 and procedures for calculating the total value
+ PI18 + PI2 + PI11 + PI8 + PI10 + PI7 + and comparing it with the established
+ PI14 + PI13 + PI16 + PI6 + PI1 = importance criterion, allows to determine the
= 0,1574 + 0,1400 + 0,1235 + 0,1081+ 0, 0937 + optimal iteration and to ensure both the
+0, 0804 + 0, 0681+ 0, 0568 + 0, 0465 + 0, 0372 + nonlinearity of the obtained CI PIP OE and
acceptable calculation accuracy [20–21].
+0, 0290 + 0, 0218 + 0, 0157 + 0, 0105 + 0, 0064 + The obtained top ten PIP OEs in terms of
+0, 0033 = 0, 9984  0, 9 importance (55.55%), namely PIП15, PIП5, PIП4,
k=15 PIП17, PIП3, PIП18, PIП2, PIП11, PIП8, PIП10, provide
i=1  PIi = PI15 + PI5 + PI4 + PI17 + PI3 + an absolute contribution to the total
importance of the entire studied spectrum that
+0,1235 + 0,1081+ 0, 0937 + 0, 0804 + 0, 0681+
+0, 0568 + 0, 0465 = 0,8745  0,9</p>
      <p>It turned out that the top ten PIP OEs in terms
of importance (55.55%), namely PIП15, PIП5,
PIП4, PIП17, PIП3, PIП18, PIП2, PIП11, PIП8, PIП10,</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Security Rating Metrics for Distributed Wireless Systems</article-title>
          ,
          <source>in: 8th Int. Conf. on “Mathematics Inf. Technolog. Educ.” Modern Machine Learning Technol. and Data Sci</source>
          .
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>F.</given-names>
            <surname>Kipchuk</surname>
          </string-name>
          , et al.,
          <source>Assessing Approaches</source>
          [14]
          <string-name>
            <given-names>V.</given-names>
            <surname>Tsiutsiura</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tsiutsiura</surname>
          </string-name>
          , Metrology of IT Infrastructure Audit,
          <source>in: IEEE 8th and Basics of Measurements: a Textbook</source>
          , International Conference on Problems of Znannya-Press (
          <year>2003</year>
          ). Infocommunications, Science and [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tikhomirov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Network</surname>
            <given-names>Society</given-names>
          </string-name>
          : Technology (
          <year>2021</year>
          ). doi: Aggregate Topological Models, Inf.
          <volume>10</volume>
          .1109/picst54195.
          <year>2021</year>
          .
          <volume>9772181</volume>
          . Technol. Math. Model. (
          <year>2014</year>
          )
          <fpage>415</fpage>
          -
          <lpage>421</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>I.</given-names>
            <surname>Kuzminykh</surname>
          </string-name>
          , et al., Investigation of the [16]
          <string-name>
            <given-names>P.</given-names>
            <surname>Stukhliak</surname>
          </string-name>
          , et al.,
          <article-title>Information Theory IoT Device Lifetime with Secure Data (Information and Measurement Systems</article-title>
          , Transmission, Internet of Things, Smart Errors, Identification): Textbook,
          <string-name>
            <given-names>Ailant</given-names>
            <surname>Spaces</surname>
          </string-name>
          , and Next Generation Networks (
          <year>2011</year>
          ).
          <source>and Systems</source>
          , vol.
          <volume>11660</volume>
          (
          <year>2019</year>
          )
          <fpage>16</fpage>
          -
          <lpage>27</lpage>
          . [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Iavich</surname>
          </string-name>
          , et al.,
          <source>The Novel System of doi: 10</source>
          .1007/978-3-
          <fpage>030</fpage>
          -30859-
          <issue>9</issue>
          _
          <fpage>2</fpage>
          . Attacks Detection in 5G, Adv. Inf.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>O.</given-names>
            <surname>Reva</surname>
          </string-name>
          , et al.,
          <source>Human Factor: Networking Appl</source>
          . (
          <year>2021</year>
          )
          <fpage>580</fpage>
          -
          <lpage>591</lpage>
          . Methodology of Proactive Qualimetry of [18]
          <string-name>
            <given-names>O.</given-names>
            <surname>Reva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kamyshyn</surname>
          </string-name>
          ,
          <article-title>Method for Air Traffic Controllers Error Threats: Determining the Integrative Indicator of Monograph, UkrINTEI (</article-title>
          <year>2020</year>
          ). doi: Expert Competence, Sci. Technol. Innov.
          <volume>10</volume>
          .35668/
          <fpage>978</fpage>
          -966-479-120-
          <issue>2</issue>
          . 3 (
          <year>2018</year>
          )
          <fpage>27</fpage>
          -
          <lpage>38</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>I. Tvoroshenko</surname>
          </string-name>
          , Decision-Making [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <source>Critical Aviation Information Technologies in Information Systems: a Systems Cybersecurity</source>
          , Meeting Security Textbook,
          <string-name>
            <surname>Kharkiv</surname>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Challenges Through Data Analytics and</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Us</surname>
          </string-name>
          , L. Koryashkina,
          <source>Models and Decision Support</source>
          <volume>47</volume>
          (
          <issue>3</issue>
          ) (
          <year>2016</year>
          )
          <fpage>308</fpage>
          -
          <lpage>316</lpage>
          .
          <article-title>Methods of Decision-Making:</article-title>
          a doi:
          <volume>10</volume>
          .3233/978-1-
          <fpage>61499</fpage>
          -716-0-
          <lpage>308</lpage>
          . Textbook, National Mining University, [20]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Decentralized Dnipropetrovsk</surname>
          </string-name>
          (
          <year>2014</year>
          ). Access Demarcation System
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Reva</surname>
          </string-name>
          , et al.,
          <article-title>Theoretical Foundations Construction in Situational Center of the Methodology of Integrative Network</article-title>
          , in: Workshop on
          <article-title>Cybersecurity Assessment of the Degree of Investment Providing in Information and Attractiveness of Intellectual Property, Telecommunication Systems II, vol</article-title>
          .
          <source>Sci. Technol</source>
          . Innov.
          <volume>1</volume>
          (
          <issue>17</issue>
          ) (
          <year>2021</year>
          )
          <fpage>3</fpage>
          -
          <lpage>16</lpage>
          . 3188, no.
          <issue>2</issue>
          (
          <year>2022</year>
          )
          <fpage>197</fpage>
          -
          <lpage>206</lpage>
          . doi:
          <volume>10</volume>
          .35668/
          <fpage>2520</fpage>
          -6524-2021-1-01. [21]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <source>Formation of</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gunko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Spirin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kholodnyuk</surname>
          </string-name>
          ,
          <article-title>Dependability and Cyber Protection Reliability of Systems and Justification of Model in Information Systems of Engineering Solutions, Vinnytsia: VDAU Situational Center</article-title>
          , in: Workshop on (
          <year>2006</year>
          ).
          <source>Emerging Technology Trends on the</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Budenko</surname>
          </string-name>
          ,
          <article-title>Determination of the Smart Industry and the Internet of Importance of the Criteria of the Things</article-title>
          , vol.
          <volume>3149</volume>
          (
          <year>2022</year>
          )
          <fpage>107</fpage>
          -
          <lpage>117</lpage>
          . Technical Level of Machines: Methodical [22]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Danik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hryschuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <article-title>Instructions for Students of Specialty Synergistic Effects of Information and 133 Branch Engineering</article-title>
          , TSAU (
          <year>2016</year>
          ). Cybernetic Interaction in Civil Aviation,
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>O.</given-names>
            <surname>Zorina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Neskuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mkrtichian</surname>
          </string-name>
          , Aviation
          <volume>20</volume>
          (
          <issue>3</issue>
          ) (
          <year>2016</year>
          )
          <fpage>137</fpage>
          -
          <lpage>144</lpage>
          . doi: Forecasting of Transport Services:
          <volume>10</volume>
          .3846/16487788.
          <year>2016</year>
          .
          <volume>1237787</volume>
          . Lecture Notes, UkrDUZT (
          <year>2021</year>
          ). [23]
          <string-name>
            <given-names>O.</given-names>
            <surname>Reva</surname>
          </string-name>
          , et al.,
          <article-title>Testing of the a-method of</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Snitiuk</surname>
          </string-name>
          ,
          <article-title>Expert comparing preference systems (on the Decision-Making Technologies, McLouth example of comparing air traffic LLC (</article-title>
          <year>2008</year>
          ).
          <article-title>controllers' preference systems on the</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>T.</given-names>
            <surname>Boyko</surname>
          </string-name>
          ,
          <article-title>Review of Methods for dangers of characteristic errors), Determining the Weighting Coefficients Intelligent Decision-Making Systems and of Indicators of Product Properties, Problems of Computational Intelligence Methods and Devices of Quality Control (</article-title>
          <year>2021</year>
          )
          <fpage>63</fpage>
          -
          <lpage>64</lpage>
          . 1(
          <issue>24</issue>
          ) (
          <year>2010</year>
          )
          <fpage>84</fpage>
          -
          <lpage>89</lpage>
          . [24]
          <string-name>
            <given-names>J.</given-names>
            <surname>Al-Azzeh</surname>
          </string-name>
          , et al.,
          <source>Analysis of Self-Similar</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kamyshyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Reva</surname>
          </string-name>
          ,
          <article-title>Methods of Traffic Models in Computer Networks, System Analysis in the Qualimetry of the Int</article-title>
          .
          <source>Rev. Modelling Simul</source>
          .
          <volume>10</volume>
          (
          <issue>5</issue>
          ) (
          <year>2017</year>
          ) Educational Process: Monograph,
          <fpage>328</fpage>
          -
          <lpage>336</lpage>
          . doi:
          <volume>10</volume>
          .15866/iremos.v10i5.
          <source>Information Systems</source>
          (
          <year>2012</year>
          ).
          <fpage>12009</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>