<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <article-id pub-id-type="doi">10.1109/WorldS451998.2021.9514019</article-id>
      <title-group>
        <article-title>Mathematical models and methods for decision coordination in critical infrastructure operations ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Hryhorii Hnatiienko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Hnatiienko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana Babenko</string-name>
          <email>babenkot@ua.fm</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Larysa Myrutenko</string-name>
          <email>myrutenko.lara@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CPITS-II 2024: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>International Information Technology University</institution>
          ,
          <addr-line>34/1 Manas str., A15M0E6 Almaty</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>64/13 Volodymyrska str., 01601 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <fpage>105</fpage>
      <lpage>114</lpage>
      <abstract>
        <p>This paper considers the problems associated with ensuring the functioning of the critical infrastructure network. It is proposed to consider a poorly formalized system of ensuring the functioning of critical infrastructure facilities using expert information processing methods. The urgency of solving the problem under consideration is confirmed by the massive attacks on critical infrastructure by the Russian troops during Russia's large-scale aggression against Ukraine. The paper presents a mathematical model of the problem of maintenance of a network of critical infrastructure facilities developed by the authors. A scheme of sequential analysis of options for solving the problem of ensuring the operation of the critical infrastructure system is proposed. Methods for finding a valid solution to the problem, searching for a reference solution to the problem, and algorithms for improving the reference solution in various variations are described. The problem statement and the mathematical model of decision coordination in a three-level hierarchical system for ensuring the operation of a network of critical infrastructure facilities are also described. An algorithm for coordinating decisions in a three-level hierarchical system is presented.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;organizational system</kwd>
        <kwd>functional stability</kwd>
        <kwd>critical elements</kwd>
        <kwd>weighting factors</kwd>
        <kwd>layering method 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The possibilities of applying mathematical models and
decision-making methods to study the problems of
vulnerability, protection, and management of critical
infrastructure systems are in the field of view of many
researchers [1, 2]. This issue has been studied by scientists
from different countries for many years [3–5] and its
relevance is not decreasing [6–8]. To date, a large number
of approaches and mathematical models have been
developed that demonstrate the authors’ attempts to ensure
the effective functioning and protection of critical
infrastructure [9–11]. At the same time, the problems of
protecting critical infrastructure from terrorist attacks
remain extremely relevant [
        <xref ref-type="bibr" rid="ref1 ref2">12, 13</xref>
        ]. This is explained, in
particular, by the fact that the problem of critical
infrastructure protection is poorly structured, and the
systems that describe the network of critical infrastructure
facilities are poorly formalized organizational systems [
        <xref ref-type="bibr" rid="ref3 ref4">14,
15</xref>
        ].
      </p>
      <p>
        In many practical decision-making situations in poorly
formalized organizational systems, the decision-maker is
forced to act in poorly structured subject areas [
        <xref ref-type="bibr" rid="ref5 ref6">16, 17</xref>
        ]. To
ensure the quality of decision support in poorly structured
subject areas, expert knowledge is traditionally and
effectively involved. In addition, building a preference
structure in a formalized form is a difficult task for humans:
in particular, it is difficult for subject matter experts to build
metric relations on a set of objects [
        <xref ref-type="bibr" rid="ref7 ref8">18, 19</xref>
        ].
      </p>
      <p>
        In particular, a person cannot set reliable weighting
coefficients for the relative importance of parameters or
criteria [
        <xref ref-type="bibr" rid="ref10 ref9">20, 21</xref>
        ], expert competence coefficients [
        <xref ref-type="bibr" rid="ref11 ref12">22, 23</xref>
        ],
elements of metricated pairwise comparison matrices [
        <xref ref-type="bibr" rid="ref13 ref14">24,
25</xref>
        ], or build a reasonable reliable membership function
using direct methods [
        <xref ref-type="bibr" rid="ref15">26</xref>
        ]. Meanwhile, such problems
regularly arise in everyday life and require their solution.
2. Critical infrastructure facilities
Critical infrastructure facilities are those that are


      </p>
      <p>Particularly important for the state.</p>
      <p>Capable of significantly affecting other critical
infrastructure facilities.</p>
      <p>Whose disruption causes a crisis of national
importance.</p>
      <p>Vital at the regional level.</p>
      <p>Whose disruption or malfunction causes a
crisis of regional, local, or local significance.</p>
      <p>Critical infrastructure facilities include enterprises and
institutions operating in the following industries:
</p>
      <p>
        Energy
0000-0002-0465-5018 (H. Hnatiienko);
0000-0001-8546-5074 (O. Hnatiienko);
0000-0003-1184-9483 (T. Babenko);
0000-0003-1686-261X (L. Myrutenko)
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).


[
        <xref ref-type="bibr" rid="ref17">28</xref>
        ]. Attacks were carried out in more than a hundred cities
3. The task of maintaining a network
of critical infrastructure facilities
The maintenance task was considered and studied in [
        <xref ref-type="bibr" rid="ref19">30</xref>
        ] as
the task of maintaining a network of communication
elements. Subsequently, the problem statement, approaches
to its solution, and the algorithm for sequential analysis of
options were adapted to the extremely relevant problem of
timely and efficient operation of the C&amp;I system.
3.1. Setting the task of ensuring the
operation of the OCI network
Let 
= 
,  = 1, … ,  ,  = 1, … ,  , 
≤  , 
1, … ,  , is the set of requests for activation of the work of
the CMI NMS teams, the duration of which is equal to  =
      </p>
      <p>, 1 ≤  ≤  ;  is number of requests;  is the
maximum length of the request; 
=  
,  = 1, … ,  ,
 = 1, … ,  , is the efficiency of execution of the  is request
if it starts to be executed on the  th day of the month. Target
function of the task:
where  is the number of working days in the calendar
month on which the  is request starts to be executed. Let

=</p>
      <p>is the resource of the  is the type required to
satisfy the  is request if it starts executing on the  th day,
 here  is the number of days when the execution of the
is request starts;</p>
      <p>is the number of types of resources;
 ,  = 1, … ,  are restrictions on the readiness of the OCI’s
command center for the EWM brigades, which means that
no more than  is requests can be serviced on a given day,</p>
      <p>It should be noted that requests for activation of the next
I&amp;CS teams are received directly from CI facilities, I&amp;CS
subsystems (SS), or the governing bodies of the I&amp;CS
(3)
(4)
system.
applications</p>
      <p>Array
of
inconsistencies
(incompatibilities)
of
 =</p>
      <p>,  = 1, … ,  , ℎ = 1,2, …,
where</p>
      <p>is the number of requests that cannot be
executed simultaneously;  is the number of array lines; ℎ
is the indices of incompatible requests of the  th line of the
unstacked array.
describe
definitions.
3.2. Scheme for solving the problem of
ensuring the operation of the QMS
The solution to the problem is sought in two stages: building
a reference solution and building an optimal solution. To
the algorithms, we present the necessary
Definition 1. A variant of the problem (1)–(4) is a vector
 = ( , … ,  ),
whose
elements
are
triples
=
 ,  , 
, where  is the number of the request; 
∈{ ,…, }
,
(1)
3.3. Method for finding a valid solution to
the problem of ensuring the operation
of the QMS
The method of finding a feasible solution consists of the
sequential construction of a reference solution as a union of
locally feasible subvariants. Therefore, it is reduced to the
sequential application of the following procedure.</p>
      <p>Procedure for finding a locally admissible subvariant PS.
The basis of the method is the formation of a set of
admissible subvariants  = ( ),  = 1, … , 
+ 2,  =



(
(
(

)
)
)
1, … ,  , from which a compromise subvariant is selected,  —
the number of admissible subvariants. The condition for
generating a sub-variant is, firstly, 
≥  ,  = 1, … ,  ,
 = 1, … ,  ,  = 1, … ,  , i.e., the application 
should not
exceed the interval in which it is supposed to be placed, and
secondly, the compatibility of the current application with
the one already accepted in the partial solution. In parallel
to the set of sub-options, a set of indices corresponding to
them is formed,  =</p>
      <p>, ℎ = 1,2,3,  = 1, … ,  , where
≤  is the number of the application that generates the
sub-option,</p>
      <p>≤  is the number of the team proposed to
execute the application,</p>
      <p>≤  is the day the execution of
the application</p>
      <p>by the team starts  .</p>
      <p>Consider the procedure for forming a valid subvariant
=  , … ,</p>
      <p>, . For each request  ,  =  , all
possible combinations of its placement in the working
intervals of the teams are selected. At the same time, 
,  ≤  is the length of the request  ; 
=  , 
, where  =  ,  (
) = max</p>
      <p>min 
,…
1 is a multiplier that plays the role of a weighting factor for
the relative importance of the request length for finding a
compromise sub-option; 
, =
,  = 1, … ,  , where
= 
− 
,  = 1, … ,  , 
is the amount of resource
 of the type spent when including the next compromise
sub-option
in a partial solution to the problem:</p>
      <p>= 0,  = 1, … ,  .</p>
      <p>
        Thus, the search for a partial solution to the original
problem is reduced to a discrete multicriteria optimization
model with a set of feasible solutions  and (
+ 2) criteria
to be minimized. If the set of admissible sub-options is not
empty, ≠∅, and not trivial, i.e. | | &gt; 1, we will look for a
compromise. To find a single solution to a multicriteria
optimization problem, it is necessary to set the weighting
coefficients of the criteria [
        <xref ref-type="bibr" rid="ref20 ref21 ref22">31–33</xref>
        ]. Let’s fix the weighting
factor for the length of the application as  —for the sake of
certainty, let’s assume
= 0.5. Let’s denote by 
the
weighting factor of the objective function of the initial
problem of the OCI MOC; the criteria that are “responsible”
for resources are aggregated and denoted by the total
weighting factor

= ∑
 , ∑

,…,
,…,
 ⋅  .
      </p>
      <p>In the case when the solution of (5) is not unique, a
(5)
linear convolution is applied
=
=
;  &gt;

 ⋅  ,
where  is the set of indices of sub-variants equivalent by
criterion (5).</p>
      <p>As a result of the search for the “best” sub-variant, we
complement the partial solution. This modifies the original
problem. The number of requests is reduced, i.e.  =  − 1,
and the number and/or length of work intervals of the teams
are changed.
2. 
3. 
and the placement of the application does
There are four options for modifying the system of working
intervals of brigades by changing the interval in which the
compromise order is placed:
1. The length of the interval 
,  ∈ {1, … , 
} is equal
to the length of the bid</p>
      <p>and the interval is completely
excluded from consideration. At the same time, 
= 
−
1,  =  , where  —is the index of the compromise bid.</p>
      <p>and the compromise application is placed
not correspond to any of the three cases. This generates an
additional interval with the index, i.e.  ,  = 
+ 1,  =
− 
− 
−
 , 
1, and 
= 
+</p>
      <p>, 
= 
,

= 
= 
− 
+ 
.</p>
      <p>In addition, the availability conditions are checked by
comparing the number of requests accepted for execution
on each day of the month  ,  = 1, … ,  , with the
availability limits  ,  = 1, … ,  . If they are equal 
=  ,
 = 1, … ,  , the interval system is adjusted on some days:
working days of teams for which 
− 
= 0, become days
off, which affects the structure of intervals.</p>
      <p>As a result of applying the PS procedure to the original
problem, a partial solution is constructed and the problem is
modified. After</p>
      <p>is the application of the described
procedure, three cases are possible:</p>
      <p>1. The solution to the problem is found and one of the
resources is completely exhausted:
∃ :  
=  ,
and hence,</p>
      <p>= 0. The method of finding the reference
solution is completed.</p>
      <p>2. The solution to the problem is found, but
for ∀ = 1, … ,  ,  
&lt;  ;
in this case, it is necessary to reduce the total weighting of
resources</p>
      <p>by increasing the weight of the objective
function  , taking into account the following condition:

+ 
= 1 −  ;
(6)
3. The task is incompatible. This, in turn, is possible
when:</p>
      <p>3.1) one or more resources have been exhausted to
obtain a complete solution to the problem. Therefore, the
total weight of the resources 
should be increased, taking
into account condition (6). This reduces the weight 
of the
objective
function,
which
could
also
influence the
“unfavourable” placement of the suboption.</p>
      <p>3.2) there is no valid working interval for the next order,
and therefore  ≠∅ . Such a situation is possible if the
coefficient  , which is “responsible” for the length of the
order, is not large enough. In this case, orders of short length
were likely prioritized and “cut” the working intervals that
could accommodate orders of longer length. Such a situation
can be managed by reducing the  indicator. In this case,
 ,  = 1, … ,  , remain unchanged, and  ,  = 2, … , 
+ 2,
 = 1, … ,  , increase by reducing 
with unchanged
weighting factors  ,  = 1, … ,  + 2, and thus “move
where  —is an additional application involved in the
away” from the optima.
replacement chain to generate additional solution options.
As a result of applying the described method, we obtain
It is easy to see that all the more complex cases are
the reference solution 
= (
, … , 
) or make sure that
the initial problem is incompatible. In this case, the
conditions of incompatibility are constructively formulated.</p>
      <p>If the initial problem is admissible, you can improve the
solution. To describe this
method, let’s introduce a
definition.</p>
      <p>Definition 7. A P-admissible sub-variant of 
∈  ,  =
1, … ,  , is one or more bids placed in the same working
interval ( is number of admissible sub-variants,  —
admissible placement option). Moreover, the  —valid
suboption must be valid.</p>
      <p>Definition 8. The length  —of a valid sub-variant will be
the distance from the start of the first order in a fixed
working interval to the end of the last order in that interval.</p>
      <p>Definition 9.  —Valid sub-options are comparable when
the sum of the order lengths of one sub-option does not
exceed the length of the working interval containing the
second sub-option, and vice versa.</p>
      <p>Definition 10.  is valid sub-option 
will be more
promising than  is valid sub-option  . If these sub-options
are comparable for a fixed interval  and  ( ) &gt;  ( ), or
 ( ) =  ( ) and ( ( ) =  ( )  dominates  in terms of
resources).</p>
      <p>( ) denotes</p>
      <p>( ), where  —is the set of options
∈
for placing requests on the interval  .
3.4. Algorithm for improving the reference
solution by changing its P-valid
variants
The initial data for this algorithm are the data described in
the problem statement, as well as the reference solution
), obtained as a result of the previous
described in terms
of  —admissible</p>
      <p>= (
method
subvariants.</p>
      <p>, … , 
and</p>
      <p>Step 0. Ordering by the quality  —of the admissible
subvariants that make up the reference solution. If  ( ) =
 ( ) and the vector  ( ), … , 
( ) are incomparable
with the vector  ( ), … , 
( ) , then the subvariant of
shorter length is considered more promising.</p>
      <p>Step 1. The master selects  —the best quality admissible
sub-variant contained in the reference solution. An attempt
is made to improve it by placing it in other working
intervals or by permissible permutations in its working
interval.</p>
      <p>Step 2. If the leading sub-option cannot be made more
promising, the next best sub-option is considered. If no  is
valid sub-option has improved during the algorithm, the
algorithm ends.</p>
      <p>With improvement, such cases are possible:
a) the application  is “exchanged” by the working
interval of placement with the application  .</p>
      <p>b) the application  shall be placed in the time slot
previously occupied by the application  , and the
application  shall be placed in the previously free time slot.
c) cyclical replacement  →  →  →  ,
the option  (
accepted.
reduced to the cases a)—c) described above.</p>
      <p>If the option remains valid, its  is valid sub-options are
replaced (permuted) and the process proceeds to step 0. If
the option is not valid, an attempt is made to make the
permutation valid by making concessions on the
suboptions found for the permutation.</p>
      <p>At the same time, if   (
) &gt;   ( )
or
  (
) =   ( ) and   (</p>
      <p>) &gt;   ( ) , are used,
), where  —is the iteration number is
3.5. Algorithm for improving the reference
solution by changing its P-admissible
subvariants
Step 1. Search for the maximum possible length of the empty
segment in the intervals that make up  —valid subvariants.</p>
      <p>Step 2. Applications whose length does not exceed the
value of the found segment are sorted in descending order.</p>
      <p>Step 3. The applications of the found set are “tried on”
to the empty segments in which they can be placed. If
  (</p>
      <p>) =   ( ) , the request is moved. If not, other
applications are considered. If there is no improvement as a
result, the option is locally optimal.</p>
      <p>
        The combinatorial formulation of the problem of QMS
and the sequential algorithm for its solution is a convenient
tool for research, structuring the subject area
and
“penetration” of the user into the problem and information
content of the QMS problem. At the same time, the
described heuristic algorithms are an effective apparatus for
finding a locally optimal solution to the problem, since they
allow generating an acceptable variant of request service
with
its
subsequent
improvement
and
identifying
incompatibilities of the problem.
4. The task of coordinating decisions
in a three-level hierarchical
system for ensuring the operation
of a network of critical
infrastructure facilities
In group decision-making and determining the properties of
an object, there is almost always a problem reconciling
assessments [
        <xref ref-type="bibr" rid="ref23 ref24">34, 35</xref>
        ]. Experts’ opinions often do not coincide
and must be aggregated to obtain a single conclusion [
        <xref ref-type="bibr" rid="ref25 ref26">36,
37</xref>
        ]. In some practical tasks, the definition of an aggregated
(integral, resultant, etc.) solution is carried out in the form
of intervals or a membership function of a fuzzy set [
        <xref ref-type="bibr" rid="ref27">38</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref28">39</xref>
        ], the authors considered and studied the problem
of coordinating decisions in a two-level hierarchical model
for choosing the mode of operation of a communication
system. Due to the urgency of the problem of critical
infrastructure protection at the regional and state levels,
this task was adapted to the problems of ensuring the
operation of a hierarchical system of critical infrastructure
facilities. The technology for coordinating decisions in a
hierarchical system was improved and refined to ensure that
decisions are coordinated in a three-tier hierarchical system.
three-level hierarchical model, considering that the modes
The interpretation of the problem area of research was also
of operation of the network of elements are subsystems (SS)
naturally adapted to the issues related to the functioning
of the lower level, and the capital costs for the creation and
and characteristics of the critical infrastructure network.
4.1. Formulation of the problem of decision
coordination in a three-level
hierarchical system of critical
infrastructure
Let there be given a set of alternatives (objects, options,
plans, projects, etc.) 
is characterized by 
factors, etc.)
∈  ,  ∈  = {1, … ,  }, each of which
features (attributes, characteristics,

=  , … , 
,
 ∈  .
      </p>
      <p>To build a model of a specific task, it is often necessary
to determine the relative weight of characteristics and their
influence on decision-making—to increase certainty and
increase the structure of the subject area. Since a person in
most cases is not able to adequately assign relative weights,
indirect methods are a promising direction for solving the
problem</p>
      <p>
        of determining the weighting coefficients of
characteristics [
        <xref ref-type="bibr" rid="ref29 ref30">40, 41</xref>
        ].
      </p>
      <p>As a rule, there is a history of preferences between
objects (alternatives, players, projects, units, etc.)—based on
the results of measuring experts’ preferences or any other
natural information. This can be a series of tournaments or
a ranking of objects, i.e. a complete preference relation.</p>
      <p>We will assume that the topology of the set (network)
of IEDs requiring regular
maintenance and ensuring
uninterrupted operation in the event of emergency outages
or planned rolling outages is given: the number of IEDs and
their geolocation coordinates on the plane. It is necessary to
determine:
●
●
●
●</p>
      <p>A sufficient number of QMS centers.</p>
      <p>Their location (the QIS RM center can only be
located in an element of the QIS network).</p>
      <p>Provision of the CMI centers with brigades
(network equipment), i.e. the optimal number of
brigades in each center (we will assume that all
brigades are integrated, interchangeable, and of
the same type).</p>
      <p>Distribution (division) of the network into service
zones, i.e. finding the best option for clustering
network elements with the identification of the
element number in which the OCI MIS center is
located and the number of elements served by each
center.</p>
      <p>
        At the same time, it is necessary to ensure the minimum
cost of building the I&amp;CMS system and operating the
network in three modes of operation and the maximum
probability of maintaining operability for each mode while
ensuring restrictions on the average recovery time of each
network element. We will interpret the task in terms of a
maintenance of the system, operation of the I&amp;C and
maintenance of crews are arguments for the quality
criterion of the upper-level SS [
        <xref ref-type="bibr" rid="ref31 ref32">42, 43</xref>
        ].
      </p>
      <p>
        Let us consider the problem of reconciling the decisions
of a certain set of PS of a hierarchical organizational system
with indices  = {0, … ,  }, connected by a three-level
hierarchical structure [
        <xref ref-type="bibr" rid="ref33">44</xref>
        ]. We will assume that the
analytical or tabular dependencies of the values of  ( ),  ∈
 , of the quality criteria of the PS on the attributes
(characteristics,
attributes,
etc.)
are
known.
      </p>
      <p>The
relationships between the criteria (also given analytically or
tabularly) are denoted by</p>
      <p>( ),  ∈  ,
where  is the set of permissible variants of the values of
the features that affect the values of the quality criteria
 ( ),  ∈  ,  ∈  .
4.2. A mathematical model of the problem
of decision coordination in a
threelevel hierarchical system
The three-tier hierarchical management system under
consideration consists of:
●
●
●
+ 1, … ,</p>
      <p>+  }.


{
One top-level PS (denoted by the index 0).</p>
      <p>of medium-sized substations isolated from each
other with a set of indices</p>
      <p>= {1, … ,  }.
subordinate systems of the set 
of isolated
lower-level substations with a set of indices  =
As a rule, the model of the hierarchical system of the
above structure is built as follows.</p>
      <p>The top-level PS</p>
      <p>coordinates the operation of the
middle-level PS</p>
      <p>,  = 1, … ,  , using control vectors
 ,  ∈  , whose values are determined when solving the
top-level optimization problem according to the top-level
optimality criterion. The control influences of each
medium-level AC  ,  ∈  , are determined when solving
optimization problems according to the
medium-level
optimality criterion, taking into account the calculated
control influences ul,  ∈  , received from the upper-level
AC. In turn, each  —and ( ∈  ) of the middle level
coordinates the work of isolated lower level 
infrastructure network
We will assume that the choice of control influences 
in
the  of the lower-level AC 
corresponding hyperparallelepipeds (10), (14), (17). The
constraints (9) and (13) are set by the tables of
correspondence between the binding and own control
influences. The eigenconstraints of the PS (8), (10), and (12)
are
given
by
the
where  ( ) =</p>
      <p>( ) ,  ∈  relative deviations from the
optimums of the quality criteria for the functioning of  th PS
at the values of parameters  , 0 ≤  ( ) ≤ 1; 
is
weighting coefficients of the importance of PS for achieving
the goals of the entire hierarchical system. Finding the
weighting coefficients is an independent task. We only note
that additional restrictions
may be imposed on the
weighting factors, for example,
(18)
∑ ∈</p>
      <p>=  ,  ∈  ,
where  —are the coefficients of the lower-level PS,  —are
the “weights” of the upper-level PS.</p>
      <p>,</p>
      <p>∈  . In the case when the solution (18) is not
unique, an additional criterion of the form
∈
  ( ) → min .</p>
      <p>∈
The function of the quality of the upper-level PS functioning
is calculated by the formula
 =  ∗ ∑</p>
      <p>+ ∑
∑
∑ ∈</p>
      <p>∑ ∈ 
,  ∈  ,
+


where</p>
      <p>is the coefficient related to capital expenditures;
 is the number of QMS centers (a factor whose value
should
be found); 
= 
= 
where  ,</p>
      <p>are the average specific costs of restoring a
network element and maintenance, respectively; 
, 
are the given constants; БР is the average failure-free life,
which is determined by the formula
 БР =</p>
      <p>( +  )
+  ⋅
(1 − 
(−( +  ) ⋅ 
( +  )
))
,
in which  is a constant:  is the failure rate,  = 1/ , 
is the average recovery time 
= 
+  ; 
is a
constant related to the restoration of operability; 
=  /
is the time spent on moving from the OCI’s emergency
response center to the network element, = 
average speed of brigades’ movement,  is the distance
between points.</p>
      <p>Е and 
=  ∙ 
∙ (1/ БР + 1/
)
are the specified constants.</p>
      <p>The values of the functionalities of the quality of
operation of the lower-level substation are given in the form
of a table in the form of a correspondence
 , 
⇔</p>
      <p>,  ∈  ,  ∈  ,  = 1,2,3,
where  ,  is a string of values of “connecting” (“linking”)
characteristics,  ,  is a string of eigenvalues of
characteristics  of the lower-level PS,  is a set of indices
of variants of values of characteristics of the lower-level PS.
4.3. Algorithm for reconciling decisions in
a three-level hierarchical system
The algorithm for matching solutions of a three-level
hierarchical system that models the solution of the OCI
WRM problem can be described by the following sequence
of steps.</p>
      <p>Step 0. Reading the data required for the algorithm to
function: variants of the values of general characteristics,
variants of the values of the characteristics of the
substations of all three levels. Calculate or explicitly enter
the weighting coefficients of the relative importance of the
PS for the functioning of the system as a whole. Calculation
or specification of the optimal and worst values of the
quality criteria for the functioning of all the PSs of the
is calculated on the next variant of the parameter values, the
values of the lower-level PS criteria are searched for in the
correspondence tables and these values are converted to a
dimensionless form. The next 
and values of 

are also calculated, respectively. If 
&gt; 
dimensionless form. The next 
and values of 
 , are also calculated, respectively. If 
&gt; 
,  , and
or to a
, 
or 
and
=
&gt;  , proceed to step 4. Otherwise, the values are
= 
, 
= 
. Go to step 4.
5. Prospects for further research
In further research, it is advisable to consider and improve
the solution of the problem described in this paper for other
classes of problems. In particular, it is promising to
formalize the described problem in other classes of
mathematical problems:





</p>
      <p>
        Determination of the collective resultant ranking
of all applications [
        <xref ref-type="bibr" rid="ref34">45</xref>
        ] based on individual
applications received from the QIS MQM centers,
i.e. formalization of the QIS system in ordinal
scales.
or interval.
[
        <xref ref-type="bibr" rid="ref36">47</xref>
        ].
      </p>
      <p>
        Determination of the relative importance of
individual applications [
        <xref ref-type="bibr" rid="ref35">46</xref>
        ] from the QMS centers
in the form of normalized weighting factors—fixed
Formalization of the relative importance of
individual applications from the QIS RMA centers
in the form of membership functions of a fuzzy set
Clustering of applications received from the CMI
centers and prioritization of the response of teams
to the needs of the CMI centers [
        <xref ref-type="bibr" rid="ref37">48</xref>
        ].
      </p>
      <p>
        Building a functionally stable QMS system, i.e.
ensuring redundancy in the QMS system and its
reasonable use [
        <xref ref-type="bibr" rid="ref38 ref39">49, 50</xref>
        ].
      </p>
      <p>
        Introduction of the concept of criticality categories
of CMI [
        <xref ref-type="bibr" rid="ref40">51</xref>
        ] and consideration of this indicator
when
      </p>
      <p>
        making decisions on the reliable and
uninterrupted operation of CMI’s CMM [
        <xref ref-type="bibr" rid="ref41">52</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>6. Conclusions</title>
      <p>Thus, the paper considers the problems of ensuring the
functioning of the critical infrastructure system. The
relevance of the study is due, in particular, to the massive
attacks on Ukraine's critical infrastructure during Russia’s
large-scale aggression since February 2024. The paper
presents a
mathematical
model of the
problem
of
maintenance of a system of critical infrastructure facilities
developed by the authors. The authors propose a scheme for
solving the problem of ensuring the operation of a system
of critical infrastructure facilities. The procedures for
finding a valid solution to the problem, searching for a
reference solution to the problem, and algorithms for
improving the reference solution in various variations are
described. The problem statement and the mathematical
model of decision coordination in a three-level hierarchical
system for ensuring the operation of a network of critical
infrastructure facilities are also presented. An algorithm for
coordinating decisions in a three-level hierarchical system
is developed and described.</p>
      <p>Protecting</p>
      <p>Europe’s</p>
      <p>Critical
Infrastructures:</p>
      <p>Problems
and</p>
      <p>Prospects,</p>
      <p>J.</p>
      <p>Contingencies Crisis Manag. 15(1) (2007) 30–41.
L. Labaka, J. Hernantes,</p>
      <p>M. Sarriegi,</p>
      <p>A</p>
      <p>Holistic
Framework for</p>
      <p>Building</p>
      <p>Critical Infrastructure
Resilience,</p>
      <p>Technological Forecasting
&amp;</p>
      <p>Social
Change, 103 (2016) 21–33.</p>
      <p>P. D. Wright, M. J. Liberatore, R. L. Nydick, A Survey
of Operations Research Models and Applications in
Homeland Security, Interfaces, 36(6) (2006) 514–529.
S. O. Johnsen,</p>
      <p>M. Veen,</p>
      <p>Risk</p>
      <p>Assessment
and
Resilience of Critical Communication Infrastructure
in Railways, Cognition Technology &amp; Work, 15 (2013)
95–107.</p>
      <p>330–350.
[5]</p>
      <p>L. F. Gay, S. K. Sinha, Resilience of Civil Infrastructure
Systems: Literature</p>
      <p>Review
for Improved
asset</p>
      <p>Management, Int. J. Critical Infrastructures, 9(4) (2013)
[6]</p>
      <p>V. Hrechko, H. Hnatienko, T. Babenko, An Intelligent
Model to Assess Information Systems Security level,
Fifth World Conference on Smart Trends in Systems
Security and Sustainability (WorldS4) (2021) 128–133.
[7]</p>
      <p>A. Fekete,</p>
      <p>K. Tzavella,</p>
      <p>R. Baumhauer,</p>
      <p>Spatial
Exposure Aspects Contributing to Vulnerability and
Resilience</p>
      <p>Assessments
of</p>
      <p>Urban</p>
      <p>Critical
Infrastructure in a Flood and Blackout Context,
Natural</p>
      <p>Hazards,
86
(2017)
151–176.</p>
      <p>doi:
[10] J. W. Herrmann, Using Operations Research Methods
for</p>
      <p>Homeland</p>
      <p>Security</p>
      <p>Problems. Handbook
Operations</p>
      <p>Research
for</p>
      <p>Homeland</p>
      <p>Security,
International Series in</p>
      <p>Operations Research
of
&amp;</p>
      <p>Management Science, 183 (2013) 1–24.
[11] D. Řehák, et al., Strengthening Resilience in the</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>European</given-names>
            <surname>Commission</surname>
          </string-name>
          ,
          <year>2020</year>
          .
          <article-title>Proposal for a Directive of the European Parliament and of the Council on the Resilience of Critical Entities (COM/</article-title>
          <year>2020</year>
          /829 final).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Directive</surname>
          </string-name>
          (EU)
          <year>2022</year>
          /
          <article-title>2557 of the European Parliament and of the Council of 14 December 2022 on the Resilience of Critical Entities and Repealing Council Directive (</article-title>
          <year>2008</year>
          /114/EC).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>G.</given-names>
            <surname>Otto</surname>
          </string-name>
          , et al.,
          <article-title>Parametric Model of a Laser with External Distributed Feedback in the System of Remote Measurement of Nanovibrations</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>284</fpage>
          -
          <lpage>292</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Zahynei</surname>
          </string-name>
          , et al.,
          <article-title>Method for Calculating the Residual Resource of Fog Node Elements of Distributed Information Systems of Critical Infrastructure Facilities</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>432</fpage>
          -
          <lpage>439</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Simon</surname>
          </string-name>
          ,
          <source>The Structure of Ill Structured Problems, Artificial Intelligence</source>
          ,
          <volume>4</volume>
          (
          <year>1973</year>
          )
          <fpage>181</fpage>
          -
          <lpage>201</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Grohs</surname>
          </string-name>
          , et al.,
          <article-title>Assessing Systems Thinking: A Tool to Measure Complex Reasoning through IllStructured Problems, Thinking Skills</article-title>
          and Creativity,
          <volume>28</volume>
          (
          <year>2018</year>
          )
          <fpage>110</fpage>
          -
          <lpage>130</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.tsc.
          <year>2018</year>
          .
          <volume>03</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Voloshin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. N.</given-names>
            <surname>Gnatienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. V.</given-names>
            <surname>Drobot</surname>
          </string-name>
          ,
          <article-title>A Method of Indirect Determination of Intervals of Weight Coefficients of Parameters for Metricized Relations Between Objects</article-title>
          ,
          <string-name>
            <given-names>J. Automation</given-names>
            <surname>Inf</surname>
          </string-name>
          . Sci.
          <volume>35</volume>
          (
          <issue>1-4</issue>
          ) (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wu</surname>
          </string-name>
          , et al.,
          <article-title>Consensus Analysis for AHP Multiplicative Preference Relations based on Consistency Control: A Heuristic Approach</article-title>
          ,
          <source>Knowledge-based Systems</source>
          ,
          <volume>191</volume>
          (
          <year>2020</year>
          )
          <fpage>105</fpage>
          -
          <lpage>137</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.knosys.
          <year>2019</year>
          .
          <volume>105317</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.</given-names>
            <surname>Boz</surname>
          </string-name>
          <article-title>´oki, V. Tsyganok, The (Logarithmic) least Squares Optimality of the Arithmetic (Geometric) Mean of Weight Vectors Calculated from All Spanning Trees for Incomplete Additive (Multiplicative) Pairwise Comparison Matrices</article-title>
          ,
          <source>Int. J. General Syst</source>
          .
          <volume>48</volume>
          (
          <issue>4</issue>
          ) (
          <year>2019</year>
          )
          <fpage>362</fpage>
          -
          <lpage>381</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>J.</given-names>
            <surname>Mazurek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kułakowski</surname>
          </string-name>
          ,
          <article-title>On the Derivation of Weights from Incomplete Pairwise Comparisons Matrices via Spanning Trees with Crisp and Fuzzy Confidence Levels</article-title>
          ,
          <source>Int. J. Approximate Reasoning</source>
          ,
          <volume>150</volume>
          (
          <year>2022</year>
          )
          <fpage>242</fpage>
          -
          <lpage>257</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.ijar.
          <year>2022</year>
          .
          <volume>08</volume>
          .014.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bohlouli</surname>
          </string-name>
          , et al.,
          <article-title>Competence Assessment as an Expert System for Human Resource Management: A Mathematical Approach</article-title>
          ,
          <source>Expert Systems with Applications</source>
          ,
          <volume>70</volume>
          (
          <issue>1</issue>
          ) (
          <year>2017</year>
          )
          <fpage>83</fpage>
          -
          <lpage>102</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatiienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Snytyuk</surname>
          </string-name>
          ,
          <article-title>A Posteriori Determination of Expert Competence under Uncertainty, Selected Papers of the 19th International Scientific</article-title>
          and Practical Conference “Information Technologies and Security” (
          <year>2019</year>
          )
          <fpage>82</fpage>
          -
          <lpage>99</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S.</given-names>
            <surname>Siraj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mikhailov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Keane</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Contribution of Individual Judgments Toward Inconsistency in Pairwise Comparisons</article-title>
          ,
          <source>European J. Operational Res</source>
          .
          <volume>242</volume>
          (
          <issue>2</issue>
          ) (
          <year>2015</year>
          )
          <fpage>557</fpage>
          -
          <lpage>567</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>M.</given-names>
            <surname>Brunelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fedrizzi</surname>
          </string-name>
          , A
          <article-title>General Formulation for Some Inconsistency Indices of Pairwise Comparisons</article-title>
          , Ann. Oper. Res.
          <volume>274</volume>
          (
          <year>2019</year>
          )
          <fpage>155</fpage>
          -
          <lpage>169</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10479-018-2936-6.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>O.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Mulesa,
          <article-title>Methods of Considering the Subjective Character of Input Data in Voting, Eastern-European J</article-title>
          .
          <source>Enterprise Technol</source>
          .
          <volume>1</volume>
          (
          <issue>3</issue>
          (
          <issue>73</issue>
          )) (
          <year>2015</year>
          )
          <fpage>20</fpage>
          -
          <lpage>25</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2015</year>
          .
          <volume>36699</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>[27] Council Directive</source>
          <year>2008</year>
          /114/EC of 8
          <article-title>December 2008 on the Identification and Designation of European Critical Infrastructures and the Assessment of the Need to Improve Their Protection (</article-title>
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>D.</given-names>
            <surname>Palko</surname>
          </string-name>
          , et al.,
          <source>Determining Key Risks for Modern Distributed Information Systems, II International Scientific Symposium “Intelligent Solutions” IntSol2021</source>
          , vol.
          <volume>3018</volume>
          (
          <year>2021</year>
          )
          <fpage>81</fpage>
          -
          <lpage>100</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>UN</given-names>
            <surname>News Global Perspective Human Stories</surname>
          </string-name>
          .
          <article-title>Ukraine: UN Condemns Latest Wave of Russian Attacks</article-title>
          . URL: https://news.un.org/en/story/2023/11/1143202#:~:text =
          <source>Russia%20has%20bombarded%20more%20than,coun try%2C%20which%20reportedly%20resulted</source>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Voloshin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. N.</given-names>
            <surname>Gnatienko</surname>
          </string-name>
          ,
          <article-title>The Problem of Maintenance of a Network of Communication Elements and an Algorithm for its Solution</article-title>
          ,
          <source>Research of Operations and Automated Control Systems</source>
          <volume>37</volume>
          (
          <year>1991</year>
          )
          <fpage>99</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>A. T. W.</given-names>
            <surname>Chu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. E.</given-names>
            <surname>Kalaba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Spingarn</surname>
          </string-name>
          ,
          <article-title>A Comparison of Two Methods for Determining the Weights of Belonging to Fuzzy Sets</article-title>
          , J.
          <source>Optimization Theory Appl</source>
          .
          <volume>27</volume>
          (
          <issue>4</issue>
          ) (
          <year>1979</year>
          )
          <fpage>531</fpage>
          -
          <lpage>538</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>T. L.</given-names>
            <surname>Saaty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sodenkamp</surname>
          </string-name>
          ,
          <article-title>The Analytic Hierarchy and Analytic Network Measurement Processes: The Measurement of Intangibles: Decision Making under Benefits, Opportunities, Costs</article-title>
          and Risks,
          <source>Handbook of Multicriteria Analysis, Applied Optimization</source>
          <volume>103</volume>
          (
          <year>2010</year>
          )
          <fpage>91</fpage>
          -
          <lpage>166</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -92828-
          <issue>7</issue>
          _
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bigdan</surname>
          </string-name>
          , et al.,
          <source>Detection of Cybersecurity Events Based on Entropy Analysis, in: Proceedings of the 7th International Conference on Digital Technologies in Education, Science and Industry (DTESI</source>
          <year>2022</year>
          ), vol.
          <volume>3382</volume>
          (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [34]
          <string-name>
            <surname>H. M. Hnatiienko</surname>
            ,
            <given-names>V. Y.</given-names>
          </string-name>
          <string-name>
            <surname>Snytyuk</surname>
            ,
            <given-names>O. O.</given-names>
          </string-name>
          <string-name>
            <surname>Suprun</surname>
          </string-name>
          ,
          <article-title>Application of Decision-Making Methods for Evaluation of Complex Information System Functioning Quality, Selected Papers of the XVIII International Scientific</article-title>
          and Practical Conference “
          <source>Information Technologies and Security” (ITS</source>
          <year>2018</year>
          ), vol.
          <volume>2318</volume>
          (
          <year>2018</year>
          )
          <fpage>56</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kułakowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Talaga</surname>
          </string-name>
          ,
          <article-title>Inconsistency Indices for Incomplete Pairwise Comparisons Matrices</article-title>
          ,
          <source>Int. J. General Syst</source>
          .
          <volume>49</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          )
          <fpage>174</fpage>
          -
          <lpage>200</lpage>
          , doi: 10.1080/03081079.
          <year>2020</year>
          .
          <volume>1713116</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatiienko</surname>
          </string-name>
          , et al.,
          <article-title>Greenhouse Gas Emission Determination Based on the Pseudo-Base Matrix Method for Environmental Pollution Quotas Between Countries Allocation Problem</article-title>
          ,
          <source>in: IEEE 2nd International Conference on System Analysis &amp; Intelligent Computing (SAIC)</source>
          (
          <year>2020</year>
          )
          <fpage>150</fpage>
          -
          <lpage>157</lpage>
          . doi:
          <volume>10</volume>
          .1109/SAIC51296.
          <year>2020</year>
          .
          <volume>9239125</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kubler</surname>
          </string-name>
          , et al.,
          <article-title>Measuring Inconsistency and Deriving Priorities from Fuzzy Pairwise Comparison Matrices using the Knowledge-based Consistency Index</article-title>
          ,
          <source>Knowledge-Based Systems</source>
          ,
          <volume>162</volume>
          (
          <year>2018</year>
          )
          <fpage>147</fpage>
          -
          <lpage>160</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.knosys.
          <year>2018</year>
          .
          <volume>09</volume>
          .015.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>M.</given-names>
            <surname>Palangetić</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>A</surname>
          </string-name>
          <article-title>Novel Machine Learning Approach to Data Inconsistency with respect to a Fuzzy Relation (</article-title>
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>O. F.</given-names>
            <surname>Voloshyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Gnatienko</surname>
          </string-name>
          ,
          <article-title>A Software Complex for Supporting the Coordination of Decisions in a Two-Level Hierarchical Model for Choosing the Mode of Operation of the Communication System</article-title>
          , Bulletin of the Kyiv University,
          <volume>7</volume>
          (
          <year>1992</year>
          )
          <fpage>19</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>L.</given-names>
            <surname>Csat</surname>
          </string-name>
          ´o, L. R´onyai, Incomplete Pairwise Comparison Matrices and
          <string-name>
            <given-names>Weighting</given-names>
            <surname>Methods</surname>
          </string-name>
          , Fundamenta Informatica,
          <volume>144</volume>
          (
          <issue>3-4</issue>
          ) (
          <year>2016</year>
          )
          <fpage>309</fpage>
          -
          <lpage>320</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>R.</given-names>
            <surname>Blanquero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Carrizosa</surname>
          </string-name>
          , E. Conde,
          <article-title>Inferring e-Cient Weights from Pairwise Comparison Matrices</article-title>
          ,
          <source>Mathematical Methods of Operations Research</source>
          ,
          <volume>64</volume>
          (
          <issue>2</issue>
          ) (
          <year>2006</year>
          )
          <fpage>271</fpage>
          -
          <lpage>284</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Koriyama</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. I. Ozkes</surname>
          </string-name>
          , Inclusive Cognitive Hierarchy, J. Economic Behavior Organization,
          <volume>186</volume>
          (
          <year>2021</year>
          )
          <fpage>458</fpage>
          -
          <lpage>480</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>T. L.</given-names>
            <surname>Landes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. D.</given-names>
            <surname>Howe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kashima</surname>
          </string-name>
          , A Hierarchy of Mindreading Strategies in Joint Action Participation,
          <source>Judgment and Decision Making</source>
          ,
          <volume>16</volume>
          (
          <issue>4</issue>
          ) (
          <year>2021</year>
          )
          <fpage>844</fpage>
          -
          <lpage>897</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Byts</surname>
          </string-name>
          <string-name>
            <surname>'</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Zulunov</surname>
          </string-name>
          ,
          <article-title>Specification of matrix algebra problems by reduction</article-title>
          ,
          <source>J. Math. Sci. 71</source>
          (
          <year>1994</year>
          )
          <fpage>2719</fpage>
          -
          <lpage>2726</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mulesa</surname>
          </string-name>
          , et al.,
          <article-title>Information Technology for Time Series Forecasting with Considering Fuzzy Expert Evaluations</article-title>
          , in: 12th
          <source>International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          (
          <year>2017</year>
          )
          <fpage>105</fpage>
          -
          <lpage>108</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatiienko</surname>
          </string-name>
          , et al.,
          <article-title>Mathematical Support of the Task of Determining the Strategic Directions of Development and Priorities of the Organization</article-title>
          , in: 9th
          <source>International Scientific Conference “Information Technology and Implementation”</source>
          , vol.
          <volume>3347</volume>
          (
          <year>2022</year>
          )
          <fpage>169</fpage>
          -
          <lpage>184</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mulesa</surname>
          </string-name>
          et al.,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Information Technology for Time Series Forecasting with Considering Fuzzy Expert Evaluations</article-title>
          , in: 12th
          <source>International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          (
          <year>2017</year>
          )
          <fpage>105</fpage>
          -
          <lpage>108</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatiienko</surname>
          </string-name>
          , et al.,
          <article-title>Application of Cluster Analysis for Condition Assessment of Banks in Ukraine</article-title>
          , in: 8th
          <source>International Scientific Conference “Information Technology and Implementation”</source>
          , vol.
          <volume>3179</volume>
          (
          <year>2022</year>
          )
          <fpage>112</fpage>
          -
          <lpage>121</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>T.</given-names>
            <surname>Babenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatiienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vialkova</surname>
          </string-name>
          ,
          <article-title>Modeling of Information Security System and Automated Assessment of the Integrated Quality of the Impact of Controls on the Functional Stability of the Organizational System, in: Selected Papers of the XX International Scientific</article-title>
          and Practical Conference “Information Technologies and Security” (
          <year>2020</year>
          ), vol.
          <volume>2859</volume>
          (
          <year>2020</year>
          )
          <fpage>188</fpage>
          -
          <lpage>198</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>T.</given-names>
            <surname>Babenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatiienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vialkova</surname>
          </string-name>
          ,
          <article-title>Modeling of the Integrated Quality Assessment System of the Information Security Management System</article-title>
          ,
          <source>in: 7th International Conference “Information Technology and Interactions”</source>
          , vol.
          <volume>2845</volume>
          (
          <year>2021</year>
          )
          <fpage>75</fpage>
          -
          <lpage>84</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [51]
          <string-name>
            <given-names>T.</given-names>
            <surname>Babenko</surname>
          </string-name>
          , et al.,
          <article-title>Modeling of Critical Nodes in Complex Poorly Structured Organizational Systems</article-title>
          , in: Information Society and University Studies, vol.
          <volume>2915</volume>
          (
          <year>2021</year>
          )
          <fpage>92</fpage>
          -
          <lpage>101</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [52]
          <string-name>
            <given-names>J.</given-names>
            <surname>Matzenberger</surname>
          </string-name>
          , et al.,
          <article-title>A Novel Approach to Assess Resilience of Energy Systems</article-title>
          ,
          <source>Int. J. Disaster Resilience in the Built Environment</source>
          ,
          <volume>6</volume>
          (
          <issue>2</issue>
          ) (
          <year>2015</year>
          )
          <fpage>168</fpage>
          -
          <lpage>181</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>