=Paper= {{Paper |id=Vol-3826/paper10 |storemode=property |title=Mathematical models and methods for decision coordination in critical infrastructure operations |pdfUrl=https://ceur-ws.org/Vol-3826/paper10.pdf |volume=Vol-3826 |authors=Hryhorii Hnatiienko,Oleksii Hnatiienko,Tetiana Babenko,Larysa Myrutenko |dblpUrl=https://dblp.org/rec/conf/cpits/HnatiienkoHBM24 }} ==Mathematical models and methods for decision coordination in critical infrastructure operations== https://ceur-ws.org/Vol-3826/paper10.pdf
                                Mathematical models and methods for decision
                                coordination in critical infrastructure operations ⋆
                                Hryhorii Hnatiienko1,†, Oleksii Hnatiienko1,†, Tetiana Babenko1,2,† and Larysa Myrutenko1,*,†
                                1
                                    Taras Shevchenko National University of Kyiv, 64/13 Volodymyrska str., 01601 Kyiv, Ukraine
                                2
                                    International Information Technology University, 34/1 Manas str., A15M0E6 Almaty, Kazakhstan



                                                   Abstract
                                                   This paper considers the problems associated with ensuring the functioning of the critical infrastructure
                                                   network. It is proposed to consider a poorly formalized system of ensuring the functioning of critical
                                                   infrastructure facilities using expert information processing methods. The urgency of solving the problem
                                                   under consideration is confirmed by the massive attacks on critical infrastructure by the Russian troops
                                                   during Russia’s large-scale aggression against Ukraine. The paper presents a mathematical model of the
                                                   problem of maintenance of a network of critical infrastructure facilities developed by the authors. A scheme
                                                   of sequential analysis of options for solving the problem of ensuring the operation of the critical
                                                   infrastructure system is proposed. Methods for finding a valid solution to the problem, searching for a
                                                   reference solution to the problem, and algorithms for improving the reference solution in various variations
                                                   are described. The problem statement and the mathematical model of decision coordination in a three-level
                                                   hierarchical system for ensuring the operation of a network of critical infrastructure facilities are also
                                                   described. An algorithm for coordinating decisions in a three-level hierarchical system is presented.

                                                   Keywords
                                                   organizational system, functional stability, critical elements, weighting factors, layering method 1



                         1. Introduction                                                              in particular, it is difficult for subject matter experts to build
                                                                                                      metric relations on a set of objects [18, 19].
                         The possibilities of applying mathematical models and                            In particular, a person cannot set reliable weighting
                         decision-making methods to study the problems of                             coefficients for the relative importance of parameters or
                         vulnerability, protection, and management of critical                        criteria [20, 21], expert competence coefficients [22, 23],
                         infrastructure systems are in the field of view of many                      elements of metricated pairwise comparison matrices [24,
                         researchers [1, 2]. This issue has been studied by scientists                25], or build a reasonable reliable membership function
                         from different countries for many years [3–5] and its                        using direct methods [26]. Meanwhile, such problems
                         relevance is not decreasing [6–8]. To date, a large number                   regularly arise in everyday life and require their solution.
                         of approaches and mathematical models have been
                         developed that demonstrate the authors’ attempts to ensure                   2. Critical infrastructure facilities
                         the effective functioning and protection of critical
                         infrastructure [9–11]. At the same time, the problems of                     Critical infrastructure facilities are those that are
                         protecting critical infrastructure from terrorist attacks
                         remain extremely relevant [12, 13]. This is explained, in                                   Particularly important for the state.
                         particular, by the fact that the problem of critical                                        Capable of significantly affecting other critical
                         infrastructure protection is poorly structured, and the                                      infrastructure facilities.
                         systems that describe the network of critical infrastructure                                Whose disruption causes a crisis of national
                         facilities are poorly formalized organizational systems [14,                                 importance.
                         15].                                                                                        Vital at the regional level.
                              In many practical decision-making situations in poorly                                 Whose disruption or malfunction causes a
                         formalized organizational systems, the decision-maker is                                     crisis of regional, local, or local significance.
                         forced to act in poorly structured subject areas [16, 17]. To
                         ensure the quality of decision support in poorly structured                      Critical infrastructure facilities include enterprises and
                         subject areas, expert knowledge is traditionally and                         institutions operating in the following industries:
                         effectively involved. In addition, building a preference
                         structure in a formalized form is a difficult task for humans:                              Energy


                                CPITS-II 2024: Workshop on Cybersecurity Providing in Information           0000-0002-0465-5018 (H. Hnatiienko);
                                and Telecommunication Systems II, October 26, 2024, Kyiv, Ukraine         0000-0001-8546-5074 (O. Hnatiienko);
                                ∗
                                  Corresponding author.                                                   0000-0003-1184-9483 (T. Babenko);
                                †
                                  These authors contributed equally.                                      0000-0003-1686-261X (L. Myrutenko)
                                   g.gna5@ukr.net (H. Hnatiienko);                                                      © 2024 Copyright for this paper by its authors. Use permitted under
                                                                                                                        Creative Commons License Attribution 4.0 International (CC BY 4.0).
                                oleksii.hnatiienko@knu.ua (O. Hnatiienko);
                                babenkot@ua.fm (T. Babenko);
                                myrutenko.lara@gmail.com (L. Myrutenko)
CEUR
Workshop
                  ceur-ws.org
              ISSN 1613-0073
                                                                                                    105
Proceedings
             Chemical                                                   𝛽 here 𝑘 is the number of days when the execution of the𝑗
             Food                                                       is request starts; 𝑚 is the number of types of resources;
             Transport                                                  𝛽 , 𝑖 = 1, … , 𝐷 are restrictions on the readiness of the OCI’s
             Financial and banking                                      command center for the EWM brigades, which means that
             Information technology and telecommuni-                    no more than 𝑖 is requests can be serviced on a given day,
              cations                                                           𝛽 ≤ 𝐵, 𝑖 = 1, … , 𝐷.                                 (3)
             Utilities: water, heat, and gas supply                          It should be noted that requests for activation of the next
             Healthcare, etc.                                           I&CS teams are received directly from CI facilities, I&CS
                                                                         subsystems (SS), or the governing bodies of the I&CS
    According to [27], critical infrastructure assets are                system.
systems that are essential for maintaining vital social                       Array of inconsistencies (incompatibilities) of
functions, health, safety, security, and economic or social              applications
well-being of people.                                                           𝐶= 𝐶        , 𝑠 = 1, … , 𝑆, ℎ = 1,2, …,              (4)
    Timely restoration of critical infrastructure facilities             where 𝐶        is the number of requests that cannot be
during military operations is particularly important. As a               executed simultaneously; 𝑆 is the number of array lines; ℎ
result of unprovoked aggression by Russia, Ukraine faced                 is the indices of incompatible requests of the 𝑠th line of the
large-scale and targeted attacks on its critical infrastructure          unstacked array.
[28]. Attacks were carried out in more than a hundred cities
in Ukraine [29].                                                         3.2. Scheme for solving the problem of
                                                                              ensuring the operation of the QMS
3. The task of maintaining a network
                                                                         The solution to the problem is sought in two stages: building
    of critical infrastructure facilities                                a reference solution and building an optimal solution. To
The maintenance task was considered and studied in [30] as               describe the algorithms, we present the necessary
the task of maintaining a network of communication                       definitions.
elements. Subsequently, the problem statement, approaches                    Definition 1. A variant of the problem (1)–(4) is a vector
to its solution, and the algorithm for sequential analysis of            𝑣 = (𝑣 , … , 𝑣 ), whose elements are triples𝑣 =
options were adapted to the extremely relevant problem of                 𝑣 , 𝑣 , 𝑣 , where 𝑖 is the number of the request; 𝑣 is the
timely and efficient operation of the C&I system.                        duration of the ith request; 𝑣 is the number of the team that
3.1. Setting the task of ensuring the                                    executes ith the request; 𝑣 is the day the request starts ith
     operation of the OCI network                                        the request.
                                                                              Definition 2. An admissible (complete) variant (solution)
Let 𝑅 = 𝑟 , 𝑖 = 1, … , 𝑁 , 𝑏 = 1, … , 𝐵, 𝑁 ≤ 𝐷, 𝑅 is the                 of the problem (1)–(4) is the variant 𝑣 = (𝑣 , … , 𝑣 ), that
set of working intervals in a month, 𝑁 is the number of                  satisfies constraints (2)–(4).
intervals (windows) for the 𝑏 is the team that ensures the                    Definition 3. A partial solution to problem (1)–(4) is a
operation of the OCI network; 𝐵 is the number of teams,                  vector, 𝑣 = (𝑣 , … , 𝑣 ), 𝑠 < 𝑛, that satisfies constraints (2)–
 ∩ 𝑟 , 𝑖 = 1, … , 𝑁 =  (in particular, the system of                    (4).
intervals may coincide for all teams); 𝑟 is determined by                     Definition 4. A locally valid subvariant 𝑣 =
the beginning 𝜂 and duration 𝛿 , 𝑟 = 𝜂 , 𝛿 , 𝑖 =                          𝑣 , 𝑣 , 𝑣 , 𝑙 ∈ {1, … , 𝑛} of problem (1)–(4) is the
1, … , 𝑁 ; 𝐷 number of working days in a month; 𝛼 , 𝑗 =                  placement of a request in some working interval that
1, … , 𝑛, is the set of requests for activation of the work of           satisfies conditions (2)–(4).
                                                                              Definition 5. An admissible subvariant of problem (2)–(4)
the CMI NMS teams, the duration of which is equal to 𝜏 =
                                                                         is a locally admissible subvariant that leads to an admissible
𝜏 𝛼 , 1 ≤ 𝜏 ≤ 𝐴; 𝑛 is number of requests; 𝐴 is the                       variant.
maximum length of the request; 𝑓 = 𝑓 𝛼 , 𝑖 = 1, … , 𝐷,                        Definition 6. A reference solution to problems (1)–(4) is a
𝑗 = 1, … , 𝑛, is the efficiency of execution of the 𝑗 is request         feasible solution (variant) that can, without being optimal,
if it starts to be executed on the 𝑖 th day of the month. Target         make the most of resources and at the same time deliver a
function of the task:                                                    local optimum to the objective function.

         𝐹(𝛼) =       𝑓   𝛼   →     𝑚𝑎𝑥 ,
                                   ∈{ ,…, }
                                                          (1)            3.3. Method for finding a valid solution to
                                                                              the problem of ensuring the operation
where 𝑘 is the number of working days in the calendar                         of the QMS
month on which the 𝑗 is request starts to be executed. Let
                                                                         The method of finding a feasible solution consists of the
𝑔 = 𝑔 𝛼 is the resource of the 𝑙 is the type required to
                                                                         sequential construction of a reference solution as a union of
satisfy the 𝑗 is request if it starts executing on the 𝑖 th day,         locally feasible subvariants. Therefore, it is reduced to the
𝑙 = 1, … , 𝑚, 𝑖 = 1, … , 𝐷, 𝑗 = 1, … , 𝑛. Then the resource              sequential application of the following procedure.
constraints are                                                              Procedure for finding a locally admissible subvariant PS.
      ∑ 𝑔 𝛼 ≤ 𝐺 , 𝑙 = 1, … , 𝑚,                             (2)          The basis of the method is the formation of a set of
                                                                         admissible subvariants 𝑉 = (𝑣 ), 𝑖 = 1, … , 𝑚 + 2, 𝑙 =


                                                                   106
1, … , 𝐿, from which a compromise subvariant is selected, 𝐿—                      There are four options for modifying the system of working
the number of admissible subvariants. The condition for                           intervals of brigades by changing the interval in which the
generating a sub-variant is, firstly, 𝛿 ≥ 𝛼 , 𝑖 = 1, … , 𝑁 ,                      compromise order is placed:
𝑏 = 1, … , 𝐵, 𝑗 = 1, … , 𝑛, i.e., the application 𝛼 should not                        1. The length of the interval 𝑟 , 𝑘 ∈ {1, … , 𝑁 } is equal
exceed the interval in which it is supposed to be placed, and                     to the length of the bid 𝜏 and the interval is completely
secondly, the compatibility of the current application with                       excluded from consideration. At the same time, 𝑁 = 𝑁 −
the one already accepted in the partial solution. In parallel                     1, 𝑏 = 𝑡 , where 𝑘—is the index of the compromise bid.
to the set of sub-options, a set of indices corresponding to
                                                                                      2. 𝑟    >𝜏     and the compromise application is placed
them is formed, 𝑇 = 𝑡 , ℎ = 1,2,3, 𝑙 = 1, … , 𝐿, where
                                                                                  at the beginning of the interval 𝜂        > 𝑡 . In this case,
𝑡 ≤ 𝑛 is the number of the application that generates the
sub-option, 𝑡 ≤ 𝐵 is the number of the team proposed to
                                                                                      =       + 𝑡 , 𝛿       =𝛿      −𝑡 .
execute the application, 𝑡 ≤ 𝐷 is the day the execution of                            3. 𝑟    >𝜏     and the compromise bid is placed at the
the application 𝑡 by the team starts 𝑡 .                                          end of the interval. Then       =      ,𝛿    =𝛿      −𝑡 .
    Consider the procedure for forming a valid subvariant                             4. 𝑟   ≥ 𝜏 and the placement of the application does
𝑣 = 𝑣 ,…,𝑣          , . For each request 𝛼 , 𝑗 = 𝑡 , all                          not correspond to any of the three cases. This generates an
possible combinations of its placement in the working                             additional interval with the index, i.e. 𝑑, 𝑑 = 𝑁 + 1, 𝑏 =
intervals of the teams are selected. At the same time, 𝑣 =                        𝑡 , 𝛿     = 𝑡 +𝜏 , 𝛿          = 𝜂 +𝛿 −𝑡 −𝜏 −
        
(           )
                , 𝜏 ≤ 𝐴 is the length of the request 𝑡 ; 𝑣   = 𝜔 ,𝜔 =             1, and  =  , 𝛿             =𝑡 −𝜂 .
    (            )                                                                     In addition, the availability conditions are checked by
                     , where 𝑠 = 𝑡 , 𝐹 (𝐹 ) = max min 𝑓 ; 𝜇 >
    (            )                                    ,…                          comparing the number of requests accepted for execution
1 is a multiplier that plays the role of a weighting factor for                   on each day of the month 𝑧 , 𝑖 = 1, … , 𝐷, with the
the relative importance of the request length for finding a                       availability limits 𝛽 , 𝑖 = 1, … , 𝐷. If they are equal 𝑧 = 𝛽 ,
compromise sub-option; 𝑣                ,    =      , 𝑖 = 1, … , 𝑚, where         𝑖 = 1, … , 𝐷, the interval system is adjusted on some days:
                                                                                  working days of teams for which 𝑧 − 𝛽 = 0, become days
𝐺 = 𝐺 − 𝛥𝐺 , 𝑠 = 1, … , 𝑛, 𝛥𝐺 is the amount of resource                           off, which affects the structure of intervals.
𝑖 of the type spent when including the next compromise                                 As a result of applying the PS procedure to the original
sub-option𝑣 in a partial solution to the problem:                                 problem, a partial solution is constructed and the problem is
                   𝐺 = 0, 𝑖 = 1, … , 𝑚 .                                          modified. After 𝑛 is the application of the described
    Thus, the search for a partial solution to the original                       procedure, three cases are possible:
problem is reduced to a discrete multicriteria optimization                            1. The solution to the problem is found and one of the
model with a set of feasible solutions 𝑉 and (𝑚 + 2) criteria                     resources is completely exhausted:
to be minimized. If the set of admissible sub-options is not                                                  ∃𝑖: 𝛥𝐺 = 𝐺 ,
empty,𝑉 ≠∅, and not trivial, i.e. |𝑉| > 1, we will look for a                     and hence, 𝐺 = 0. The method of finding the reference
compromise. To find a single solution to a multicriteria                          solution is completed.
optimization problem, it is necessary to set the weighting                             2. The solution to the problem is found, but
coefficients of the criteria [31–33]. Let’s fix the weighting                                         for ∀𝑖 = 1, … , 𝑚, 𝛥𝐺 < 𝐺 ;
factor for the length of the application as 𝜌 —for the sake of                    in this case, it is necessary to reduce the total weighting of
certainty, let’s assume𝜌 = 0.5. Let’s denote by 𝜌 the                             resources 𝜌 by increasing the weight of the objective
weighting factor of the objective function of the initial
                                                                                  function 𝜌 , taking into account the following condition:
problem of the OCI MOC; the criteria that are “responsible”
                                                                                                    𝜌 +𝜌 =1−𝜌 ;                               (6)
for resources are aggregated and denoted by the total
                                                                                       3. The task is incompatible. This, in turn, is possible
weighting factor
                                                                                  when:
                  𝜌 =∑         𝜌,∑       𝜌 = 1.                                        3.1) one or more resources have been exhausted to
    We are looking for a compromise option as                                     obtain a complete solution to the problem. Therefore, the
         𝑣 = 𝑎𝑟𝑔 𝑚𝑖𝑛 𝑚𝑎𝑥 𝜌 ⋅ 𝑣 .                        (5)
                                ,…,    ,…,                                        total weight of the resources 𝜌 should be increased, taking
    In the case when the solution of (5) is not unique, a                         into account condition (6). This reduces the weight 𝜌 of the
linear convolution is applied                                                     objective function, which could also influence the
                                                                                  “unfavourable” placement of the suboption.
                          𝑣 = 𝑎𝑟𝑔 𝑚𝑖𝑛            𝜌 ⋅𝑣 ,                                3.2) there is no valid working interval for the next order,
                                       ∈
                                                                                  and therefore 𝑉 ≠∅ . Such a situation is possible if the
where 𝑈 is the set of indices of sub-variants equivalent by                       coefficient 𝜌 , which is “responsible” for the length of the
criterion (5).                                                                    order, is not large enough. In this case, orders of short length
    As a result of the search for the “best” sub-variant, we                      were likely prioritized and “cut” the working intervals that
complement the partial solution. This modifies the original                       could accommodate orders of longer length. Such a situation
problem. The number of requests is reduced, i.e. 𝑛 = 𝑛 − 1,                       can be managed by reducing the 𝜇 indicator. In this case,
and the number and/or length of work intervals of the teams                       𝑣 , 𝑙 = 1, … , 𝐿, remain unchanged, and 𝑣 , 𝑖 = 2, … , 𝑚 + 2,
are changed.                                                                      𝑙 = 1, … , 𝐿, increase by reducing 𝜇 with unchanged




                                                                            107
weighting factors 𝜌 , 𝑖 = 1, … , 𝑚 + 2, and thus “move                  where 𝑧—is an additional application involved in the
away” from the optima.                                                  replacement chain to generate additional solution options.
    As a result of applying the described method, we obtain                 It is easy to see that all the more complex cases are
the reference solution 𝑣 = (𝑣 , … , 𝑣 ) or make sure that               reduced to the cases a)—c) described above.
the initial problem is incompatible. In this case, the                      If the option remains valid, its 𝑃 is valid sub-options are
conditions of incompatibility are constructively formulated.            replaced (permuted) and the process proceeds to step 0. If
    If the initial problem is admissible, you can improve the           the option is not valid, an attempt is made to make the
solution. To describe this method, let’s introduce a                    permutation valid by making concessions on the sub-
definition.                                                             options found for the permutation.
    Definition 7. A P-admissible sub-variant of 𝛼 ∈ 𝛼, 𝑖 =                  At the same time, if 𝑓 𝛼 ( ) > 𝑓 𝛼 ( )                   or
1, … , 𝑠, is one or more bids placed in the same working                𝑓 𝛼 ( ) = 𝑓 𝛼 ( ) and 𝑔 𝛼 ( ) > 𝑔 𝛼 ( ) , are used,
interval (𝑠 is number of admissible sub-variants, 𝑃—                    the option 𝛼 ( ) , where 𝑘—is the iteration number is
admissible placement option). Moreover, the 𝑃—valid sub-                accepted.
option must be valid.
    Definition 8. The length 𝑃—of a valid sub-variant will be           3.5. Algorithm for improving the reference
the distance from the start of the first order in a fixed                    solution by changing its P-admissible
working interval to the end of the last order in that interval.
                                                                             subvariants
    Definition 9. 𝑃—Valid sub-options are comparable when
the sum of the order lengths of one sub-option does not                 Step 1. Search for the maximum possible length of the empty
exceed the length of the working interval containing the                segment in the intervals that make up 𝑃—valid subvariants.
second sub-option, and vice versa.                                          Step 2. Applications whose length does not exceed the
    Definition 10. 𝑃 is valid sub-option 𝛼 will be more                 value of the found segment are sorted in descending order.
promising than 𝑃 is valid sub-option 𝑦. If these sub-options                Step 3. The applications of the found set are “tried on”
are comparable for a fixed interval 𝑧 and 𝑓(𝛼) > 𝑓(𝑦), or               to the empty segments in which they can be placed. If
𝑓(𝛼) = 𝑓(𝑦) and (𝑔(𝛼) = 𝑔(𝑦) 𝛼 dominates 𝑦 in terms of                  𝑓 𝛼 ( ) = 𝑓 𝛼 ( ) , the request is moved. If not, other
resources).                                                             applications are considered. If there is no improvement as a
    𝑓(𝛼) denotes 𝑚𝑎𝑥 𝑓 (𝛼), where 𝑋—is the set of options               result, the option is locally optimal.
                    ∈
                                                                            The combinatorial formulation of the problem of QMS
for placing requests on the interval 𝑧.
                                                                        and the sequential algorithm for its solution is a convenient
                                                                        tool for research, structuring the subject area and
3.4. Algorithm for improving the reference
                                                                        “penetration” of the user into the problem and information
     solution by changing its P-valid                                   content of the QMS problem. At the same time, the
     variants                                                           described heuristic algorithms are an effective apparatus for
The initial data for this algorithm are the data described in           finding a locally optimal solution to the problem, since they
the problem statement, as well as the reference solution                allow generating an acceptable variant of request service
𝑣 = (𝑣 , … , 𝑣 ), obtained as a result of the previous                  with its subsequent improvement and identifying
method and described in terms of 𝑃—admissible                           incompatibilities of the problem.
subvariants.
    Step 0. Ordering by the quality 𝑃—of the admissible                 4. The task of coordinating decisions
subvariants that make up the reference solution. If 𝑓(𝛼) =                 in a three-level hierarchical
𝑓(𝑦) and the vector 𝑔 (𝛼), … , 𝑔 (𝛼) are incomparable                      system for ensuring the operation
with the vector 𝑔 (𝑦), … , 𝑔 (𝑦) , then the subvariant of
                                                                           of a network of critical
shorter length is considered more promising.
    Step 1. The master selects 𝑃—the best quality admissible               infrastructure facilities
sub-variant contained in the reference solution. An attempt             In group decision-making and determining the properties of
is made to improve it by placing it in other working                    an object, there is almost always a problem reconciling
intervals or by permissible permutations in its working                 assessments [34, 35]. Experts’ opinions often do not coincide
interval.                                                               and must be aggregated to obtain a single conclusion [36,
    Step 2. If the leading sub-option cannot be made more               37]. In some practical tasks, the definition of an aggregated
promising, the next best sub-option is considered. If no 𝑃 is           (integral, resultant, etc.) solution is carried out in the form
valid sub-option has improved during the algorithm, the                 of intervals or a membership function of a fuzzy set [38].
algorithm ends.                                                             In [39], the authors considered and studied the problem
    With improvement, such cases are possible:                          of coordinating decisions in a two-level hierarchical model
    a) the application 𝛼 is “exchanged” by the working                  for choosing the mode of operation of a communication
interval of placement with the application 𝑦.                           system. Due to the urgency of the problem of critical
    b) the application 𝛼 shall be placed in the time slot               infrastructure protection at the regional and state levels,
previously occupied by the application 𝑦, and the                       this task was adapted to the problems of ensuring the
application 𝑦 shall be placed in the previously free time slot.         operation of a hierarchical system of critical infrastructure
    c) cyclical replacement 𝛼 → 𝑦 → 𝑧 → 𝛼,                              facilities. The technology for coordinating decisions in a
                                                                        hierarchical system was improved and refined to ensure that


                                                                  108
decisions are coordinated in a three-tier hierarchical system.          three-level hierarchical model, considering that the modes
The interpretation of the problem area of research was also             of operation of the network of elements are subsystems (SS)
naturally adapted to the issues related to the functioning              of the lower level, and the capital costs for the creation and
and characteristics of the critical infrastructure network.             maintenance of the system, operation of the I&C and
                                                                        maintenance of crews are arguments for the quality
4.1. Formulation of the problem of decision                             criterion of the upper-level SS [42, 43].
     coordination in a three-level                                          Let us consider the problem of reconciling the decisions
     hierarchical system of critical                                    of a certain set of PS of a hierarchical organizational system
     infrastructure                                                     with indices 𝐼 = {0, … , 𝑀}, connected by a three-level
                                                                        hierarchical structure [44]. We will assume that the
Let there be given a set of alternatives (objects, options,             analytical or tabular dependencies of the values of 𝑓 (𝑢), 𝑙 ∈
plans, projects, etc.) 𝑎 ∈ 𝐴, 𝑖 ∈ 𝐼 = {1, … , 𝑛}, each of which         𝐼, of the quality criteria of the PS on the attributes
is characterized by 𝑚 features (attributes, characteristics,            (characteristics, attributes, etc.) are known. The
factors, etc.)                                                          relationships between the criteria (also given analytically or
                 𝑎 = 𝑎 ,…,𝑎 ,            𝑖 ∈ 𝐼.                         tabularly) are denoted by
    To build a model of a specific task, it is often necessary                                    𝑀 (𝐷), 𝑙 ∈ 𝐼,
to determine the relative weight of characteristics and their           where 𝐷 is the set of permissible variants of the values of
influence on decision-making—to increase certainty and                  the features that affect the values of the quality criteria
increase the structure of the subject area. Since a person in           𝑓 (𝑢), 𝑙 ∈ 𝐼, 𝑢 ∈ 𝐷.
most cases is not able to adequately assign relative weights,
indirect methods are a promising direction for solving the              4.2. A mathematical model of the problem
problem of determining the weighting coefficients of                         of decision coordination in a three-
characteristics [40, 41].
                                                                             level hierarchical system
    As a rule, there is a history of preferences between
objects (alternatives, players, projects, units, etc.)—based on         The three-tier hierarchical management system under
the results of measuring experts’ preferences or any other              consideration consists of:
natural information. This can be a series of tournaments or
a ranking of objects, i.e. a complete preference relation.                  ●    One top-level PS (denoted by the index 0).
    We will assume that the topology of the set (network)                   ●    𝑛 of medium-sized substations isolated from each
of IEDs requiring regular maintenance and ensuring                               other with a set of indices 𝐼 = {1, … , 𝑛 }.
uninterrupted operation in the event of emergency outages                   ●    𝑛 subordinate systems of the set 𝐼 of isolated
or planned rolling outages is given: the number of IEDs and                      lower-level substations with a set of indices 𝐼 =
their geolocation coordinates on the plane. It is necessary to                   {𝑛 + 1, … , 𝑛 + 𝑛 }.
determine:
                                                                             As a rule, the model of the hierarchical system of the
    ●    A sufficient number of QMS centers.                            above structure is built as follows.
    ●    Their location (the QIS RM center can only be                       The top-level PS 𝑆𝑆𝐻 coordinates the operation of the
         located in an element of the QIS network).                     middle-level PS 𝑆𝑆𝑀 , 𝑖 = 1, … , 𝑛 , using control vectors
    ●    Provision of the CMI centers with brigades                     𝑢 , 𝑙 ∈ 𝐼 , whose values are determined when solving the
         (network equipment), i.e. the optimal number of                top-level optimization problem according to the top-level
         brigades in each center (we will assume that all               optimality criterion. The control influences of each
         brigades are integrated, interchangeable, and of               medium-level AC 𝑢 , 𝑙 ∈ 𝐼 , are determined when solving
         the same type).                                                optimization problems according to the medium-level
    ●    Distribution (division) of the network into service            optimality criterion, taking into account the calculated
         zones, i.e. finding the best option for clustering             control influences ul, 𝑙 ∈ 𝐼 , received from the upper-level
         network elements with the identification of the                AC. In turn, each 𝑙—and (𝑙 ∈ 𝐼 ) of the middle level
         element number in which the OCI MIS center is                  coordinates the work of isolated lower level 𝑆𝑆𝐿 , 𝑖 = 𝑛 +
         located and the number of elements served by each              1, … , 𝑛 , associated with it (the set of indices of which is
         center.
                                                                        denoted by 𝐼 , 𝑙 ∈ 𝐼 , ∑ 𝐼 = 𝑛 . Each 𝑙 and lower level
    At the same time, it is necessary to ensure the minimum             substation, taking into account the control influence of 𝑙 is
cost of building the I&CMS system and operating the                     the middle-level substation 𝑢 , finds its solution 𝑢
network in three modes of operation and the maximum                     according to its optimality criterion.
probability of maintaining operability for each mode while                   A diagram of the relationships between subsystems of
ensuring restrictions on the average recovery time of each              different levels of the three-tier hierarchical system is
network element. We will interpret the task in terms of a               shown in Fig. 1.




                                                                  109
Figure 1: Schematic diagram of the three-level hierarchical structure for ensuring the sustainable operation of the critical
infrastructure network

We will assume that the choice of control influences 𝑢 in               where all notations correspond to those in problems (7)–
the 𝑙 of the lower-level AC 𝑆𝑆𝐿 , 𝑖 = 𝑛 + 1, … , 𝑛 , is carried         (10), 𝑢 is control influence transmitted to 𝑙 that middle-
out when solving a discrete optimization problem of the                 level PS from the upper-level PS 𝑆𝑆𝐻 .
form                                                                        The choice of control influences 𝑢 , 𝑙 ∈ 𝐼 , in the upper-
                 𝑓 𝑢 → 𝑚𝑖𝑛,                               (7)           level control system is carried out when solving the discrete
                 𝐻 𝑢 ≤𝐻 ,       ∗                         (8)           optimization problem of the form
                                                          (9)                             𝑓 (𝑢) → 𝑚𝑖𝑛,                           (15)
                  𝑔 𝑢 ≤𝑢 ,
                                                                                           𝐻(𝑢) ≤ 𝐻 ∗ ,                          (16)
               𝑢 ∈𝑈 =           𝑈 ,                      (10)
                                                                                         𝑢∈𝑈=          𝑈 ,                        (17)
where 𝑢 is the solution vector, the dimension of which is
                                                                        where 𝑢 = {𝑢 , 𝑙 ∈ 𝐼 }; 𝑈 are finite sets; 𝑓 is a scalar
determined by condition (10); 𝑈 is the finite sets of possible
                                                                        function; 𝐻 is a vector function; 𝐻 ∗ is a vector of constants
variants 𝑗 and components of the vector 𝑢 ; 𝑓 are scalar                (the requirements for 𝑓 are similar to those for problem
functions; 𝐻 , 𝑔 are vector functions of a discrete                     (7)–(10)).
argument of the corresponding dimension, specified                          The variants of the values of characteristics (factors,
analytically or in the form of tables, such that for each               features, attributes, etc.) that satisfy condition (8) for a
component of 𝑢           vectors 𝑢       the values of                  particular model are set explicitly (taking into account
𝑎𝑟𝑔 𝑚𝑖𝑛 max ()        𝐻 ,𝑔        to 𝑢    at fixed values of            information about the peculiarities of the functioning of 𝑙 of
                                                                        the PS obtained from experts or by solving auxiliary tasks
other variables do not depend on the value of this
                                                                        of finding the quality of functioning of 𝑙 of the PS).
component (this condition is satisfied, for example, by
                                                                        Conditions (9) in a particular model are set by tables of
monotonic or separable functions); 𝐻 ∗ —vector of given                 correspondence of variants of values of external
constants.                                                              characteristics to internal ones.
     Relationship (9) characterizes the own constraints of the              A “partial” mathematical model of the general model
PS, i.e. the relationship between the own parameters of the             discussed above is presented.
PS (𝐻 ∗ —its resource, so condition (9) sets the law of                     We will assume that the set of possible values of
distribution of the own resources of the PS), and relations             characteristics U is divided into the set of 𝑈 з general
(8) determine the relationship with the medium-level PS (i.e.           characteristics, on which the quality of the system
the relationship between the own parameters of the PS and               functioning as a whole depends, and 𝑈 , 𝑙 ∈ 𝐼 , the set of
external influences—interpreted as the “external” resource              own characteristics of the PS, i.e., characteristics that affect
of the PS). This is carried out with the help of control
                                                                        only the functioning of individual PS; 𝑈 𝑢 , 𝑙, 𝑖 ∈ 𝐼, 𝑢 , 𝑙 ∈
influences 𝑢 , that is determined by solving a similar
                                                                        𝑖 ≠ 𝑗, characteristics that reflect the “vertical” links between
problem for each 𝑙 of the medium-level PS 𝑆𝑆𝑀 , 𝑖 =
                                                                        PS of different levels.
1, … , 𝑛 ,
                                                                            Let us denote by 𝑈 = 𝑈 з × ∏ ∈ 𝑈 × ∏ , ∈ 𝑈 , the set
                   𝑓 𝑢 → 𝑚𝑖𝑛,                           (11)
                                                                        of possible values of characteristics in the functioning of a
                   𝐻 𝑢 ≤𝐻 ,      ∗                      (12)
                                                                        hierarchical system.
                    𝑔 𝑢 ≤𝑢 ,                            (13)                Then, the partial mathematical model of the OCI CMM
                                                                        system is interpreted in terms of the general mathematical
               𝑢 ∈𝑈 =           𝑈 ,                      (14)           model as follows. The values of the criterion functions (7),
                                                                        (11), (15) are set as a function of the given points of the


                                                                  110
corresponding hyperparallelepipeds (10), (14), (17). The                where 𝐶 , 𝐶 are the average specific costs of restoring a
constraints (9) and (13) are set by the tables of                       network element and maintenance, respectively; 𝜏 , 𝑇
correspondence between the binding and own control                      are the given constants;𝑇БР is the average failure-free life,
influences. The eigenconstraints of the PS (8), (10), and (12)          which is determined by the formula
are given by the table dependencies on their                                              𝜇          (1 − 𝑒𝑥𝑝(−(𝜇 + 𝜆) ⋅ 𝑇 ))
eigenparameters.                                                          𝑇БР = 𝑇 ⋅            +𝜆⋅                               ,
                                                                                       (𝜇 + 𝜆)                (𝜇 + 𝜆)
    A consistent solution of a hierarchical system is                   in which 𝜆 is a constant: 𝜇 is the failure rate, 𝜇 = 1/𝑇 , 𝑇
calculated as a “compromise” solution:
                                                                        is the average recovery time 𝑇 = 𝑇 + 𝜏 ; 𝑇                 is a
      𝑢 = 𝑎𝑟𝑔 𝑚𝑖𝑛 𝑚𝑎𝑥 𝜌 𝜔 (𝑢),                           (18)
                    ∈       ∈                                           constant related to the restoration of operability; 𝜏 = 𝑆/𝑣
where 𝜔 (𝑢) = 𝜔 𝑓 (𝑢) , 𝑖 ∈ 𝐼 relative deviations from the              is the time spent on moving from the OCI’s emergency
optimums of the quality criteria for the functioning of 𝑖 th PS         response center to the network element,𝑣 = 𝑐𝑜𝑛𝑠𝑡 is the
at the values of parameters 𝑢, 0 ≤ 𝜔 (𝑢) ≤ 1; 𝜌 is                      average speed of brigades’ movement, 𝑆 is the distance
weighting coefficients of the importance of PS for achieving            between points.
the goals of the entire hierarchical system. Finding the                             𝑆 = 𝑇 ∙ 𝐶 ∙ (1/𝑇БР + 1/𝑇 )
weighting coefficients is an independent task. We only note                 𝑇Е and 𝑇 are the specified constants.
that additional restrictions may be imposed on the                          The values of the functionalities of the quality of
weighting factors, for example,                                         operation of the lower-level substation are given in the form
                      ∑∈ 𝜌 =𝜌 ,𝑖∈𝐼 ,                                    of a table in the form of a correspondence
where 𝜌 —are the coefficients of the lower-level PS, 𝜌 —are                          𝑢 , 𝑢 ⇔ 𝑓 , 𝑞 ∈ 𝑄, 𝑗 ∈ 𝐼 , 𝑖 = 1,2,3,
the “weights” of the upper-level PS.                                    where 𝑢 , 𝑞 is a string of values of “connecting” (“linking”)
    𝑈 , 𝑢 ∈ 𝑈 . In the case when the solution (18) is not
                                                                        characteristics, 𝑢 , 𝑗 is a string of eigenvalues of
unique, an additional criterion of the form
                                                                        characteristics 𝑖 of the lower-level PS, 𝐼 is a set of indices
                        𝑝 𝑤 (𝑢 ) → min .                                of variants of values of characteristics of the lower-level PS.
                                      ∈
                    ∈
The function of the quality of the upper-level PS functioning           4.3. Algorithm for reconciling decisions in
is calculated by the formula                                                 a three-level hierarchical system
        𝑆 =𝐸 ∗∑          𝑆 +∑         ∑ ∈ 𝑆            +
                                                                        The algorithm for matching solutions of a three-level
                  ∑      ∑ ∈ 𝑆      ,𝑖∈𝐼 ,                              hierarchical system that models the solution of the OCI
where 𝐸 is the coefficient related to capital expenditures;             WRM problem can be described by the following sequence
𝑁 is the number of QMS centers (a factor whose value                    of steps.
should be found); 𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 is the capital                               Step 0. Reading the data required for the algorithm to
expenditures for the establishment and operation of the                 function: variants of the values of general characteristics,
𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 center (for the sake of simplicity, we                    variants of the values of the characteristics of the
                                                                        substations of all three levels. Calculate or explicitly enter
assume 𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 for ); ∀𝑗 = 1, … , 𝑁, 𝑅 , 𝑗 = 1, … , 𝑁
                                                                        the weighting coefficients of the relative importance of the
is the number of service teams in the 𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡
                                                                        PS for the functioning of the system as a whole. Calculation
center (we assume that all teams are of the same type, i.e.             or specification of the optimal and worst values of the
𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 for 𝑏 ∈ 𝐵 , ∀𝑗 = 1, … , 𝑁) characteristics                quality criteria for the functioning of all the PSs of the
whose values are to be calculated; 𝑟 ∈ 𝑅 , ∀𝑗 = 1, … , 𝑁 is the         hierarchical system.
composition of sets of indices of elements served by the 𝑆                   Step 1. Formation of sets of indices of variants of values
center values of characteristics whose values are to be                 of characteristics of those PSs that are connected by the
calculated; 𝑆 is operating costs to maintain the operability            same common characteristics. If a certain variant of the
of the 𝑟—network element served by the 𝑆 = 𝑆 = 𝑆 (𝑆),                   common values of characteristics is absent in a PS, then it
the center of the MIS OCI.                                              cannot be included in the search for an agreed solution—it
    The value 𝑆 = 𝑆 = 𝑆 (𝑆), where 𝑆 is the distance                    is concluded that it is inadmissible.
                                                                             Step 2. Based on the coordinates of the network elements,
between the center of the OCI RFM with the index 𝑗 and the
                                                                        distances between them are calculated to use their values in
network element to be served with the index 𝑟. The value of
                                                                        calculating the quality of the upper-level substation, which is
the distance 𝑆 is calculated by the formula
                                                                        set in an analytical form.
                                               /
            𝑆=     𝑥 −𝑥         + 𝑥 −𝑥             ,                         Step 3. Set the initial values of the trade-off 𝜔 = 1,
where 𝑥 , 𝑥 , are the geolocation coordinates of the 𝑗 of the           𝜔 = 1, where 𝜔 is the initial value of the parameter 𝑘 ,
OCI network element on the plane (this network element                  𝜔 is the initial value of the linear function of the PS criteria
may or may not contain an OCI center).                                  with the weighting coefficients set in step 0.
    The meaning of 𝑆 is calculated as follows:                               Step 4. A complete search of the sets of indices of
                                                                        variants of the values of the characteristics of the PS,
                     𝑆 = 𝑆 +𝑆 ,
                                                                        connected by the same common characteristics, is
where 𝑆 are the costs of CMM O&M and repairs, 𝑆 are                     organized. If the search is completed, an agreed solution is
transport costs.                                                        displayed, i.e., a variant of the values of the characteristics
     𝑆 = 𝑇 ⋅ (𝐶 ⋅ (𝑇 − 𝑇БР ) + 𝐶 ⋅ 𝜏 )/𝑇 ,


                                                                  111
of the PS that delivers a minimum of 𝜔 and 𝜔 . This                    model of decision coordination in a three-level hierarchical
completes the algorithm.                                               system for ensuring the operation of a network of critical
     Step 5. The value of the upper-level PS quality criterion         infrastructure facilities are also presented. An algorithm for
is calculated on the next variant of the parameter values, the         coordinating decisions in a three-level hierarchical system
values of the lower-level PS criteria are searched for in the          is developed and described.
correspondence tables and these values are converted to a
dimensionless form. The next 𝜔 and values of 𝜔 , 𝜔 , and               References
𝜔 are also calculated, respectively. If 𝜔 > 𝜔 or to a                  [1]    A. Fritzon, et al., Protecting Europe’s Critical
dimensionless form. The next 𝜔 and values of 𝜔 , 𝜔 and                        Infrastructures: Problems and Prospects, J.
𝜔 , are also calculated, respectively. If 𝜔 > 𝜔 or 𝜔 =                        Contingencies Crisis Manag. 15(1) (2007) 30–41.
𝜔 , and 𝜔 > 𝜔 , proceed to step 4. Otherwise, the values are           [2]    L. Labaka, J. Hernantes, M. Sarriegi, A Holistic
reassigned to 𝜔 = 𝜔 , 𝜔 = 𝜔 . Go to step 4.                                   Framework for Building Critical Infrastructure
                                                                              Resilience, Technological Forecasting & Social
5. Prospects for further research                                             Change, 103 (2016) 21–33.
                                                                       [3]    P. D. Wright, M. J. Liberatore, R. L. Nydick, A Survey
In further research, it is advisable to consider and improve
                                                                              of Operations Research Models and Applications in
the solution of the problem described in this paper for other
                                                                              Homeland Security, Interfaces, 36(6) (2006) 514–529.
classes of problems. In particular, it is promising to
                                                                       [4]    S. O. Johnsen, M. Veen, Risk Assessment and
formalize the described problem in other classes of
                                                                              Resilience of Critical Communication Infrastructure
mathematical problems:
                                                                              in Railways, Cognition Technology & Work, 15 (2013)
                                                                              95–107.
        Determination of the collective resultant ranking
                                                                       [5]    L. F. Gay, S. K. Sinha, Resilience of Civil Infrastructure
         of all applications [45] based on individual
                                                                              Systems: Literature Review for Improved asset
         applications received from the QIS MQM centers,
                                                                              Management, Int. J. Critical Infrastructures, 9(4) (2013)
         i.e. formalization of the QIS system in ordinal
                                                                              330–350.
         scales.
                                                                       [6]    V. Hrechko, H. Hnatienko, T. Babenko, An Intelligent
        Determination of the relative importance of
                                                                              Model to Assess Information Systems Security level,
         individual applications [46] from the QMS centers
                                                                              Fifth World Conference on Smart Trends in Systems
         in the form of normalized weighting factors—fixed
                                                                              Security and Sustainability (WorldS4) (2021) 128–133.
         or interval.
                                                                              doi: 10.1109/WorldS451998.2021.9514019.
        Formalization of the relative importance of                   [7]    A. Fekete, K. Tzavella, R. Baumhauer, Spatial
         individual applications from the QIS RMA centers                     Exposure Aspects Contributing to Vulnerability and
         in the form of membership functions of a fuzzy set                   Resilience     Assessments       of    Urban       Critical
         [47].                                                                Infrastructure in a Flood and Blackout Context,
        Clustering of applications received from the CMI                     Natural Hazards, 86 (2017) 151–176. doi:
         centers and prioritization of the response of teams                  10.1007/s11069-016-2720-3.
         to the needs of the CMI centers [48].                         [8]    V. A. Zaslavskyi, O. A. Horbunov, The Type-Variety
        Building a functionally stable QMS system, i.e.                      Principle in Ensuring the Reliability, Safety and
         ensuring redundancy in the QMS system and its                        Resilience of Critical Infrastructures, Modern
         reasonable use [49, 50].                                             Optimization Methods for Decision Making under
        Introduction of the concept of criticality categories                Risk and Uncertainty, CRC Press (2023) 245−274.
         of CMI [51] and consideration of this indicator               [9]    E. D. Vugrin, et al., A Framework for Assessing the
         when making decisions on the reliable and                            Resilience of Infrastructure and Economic Systems,
         uninterrupted operation of CMI’s CMM [52].                           Sustainable & Resilient Critical Infrastructure Systems
                                                                              (2010) 77–116. doi: 10.1007/978-3-642-11405-2_3.
6. Conclusions                                                         [10]   J. W. Herrmann, Using Operations Research Methods
                                                                              for Homeland Security Problems. Handbook of
Thus, the paper considers the problems of ensuring the
                                                                              Operations Research for Homeland Security,
functioning of the critical infrastructure system. The
                                                                              International Series in Operations Research &
relevance of the study is due, in particular, to the massive
                                                                              Management Science, 183 (2013) 1–24.
attacks on Ukraine's critical infrastructure during Russia’s
                                                                       [11]   D. Řehák, et al., Strengthening Resilience in the
large-scale aggression since February 2024. The paper
                                                                              Energy Critical Infrastructure: Methodological
presents a mathematical model of the problem of
                                                                              Overview, Energies, 15 (2022) 5276.
maintenance of a system of critical infrastructure facilities
                                                                       [12]   European Commission, 2020. Proposal for a Directive
developed by the authors. The authors propose a scheme for
                                                                              of the European Parliament and of the Council on the
solving the problem of ensuring the operation of a system
                                                                              Resilience of Critical Entities (COM/2020/829 final).
of critical infrastructure facilities. The procedures for
                                                                       [13]   Directive (EU) 2022/2557 of the European Parliament
finding a valid solution to the problem, searching for a
                                                                              and of the Council of 14 December 2022 on the
reference solution to the problem, and algorithms for
                                                                              Resilience of Critical Entities and Repealing Council
improving the reference solution in various variations are
                                                                              Directive (2008/114/EC).
described. The problem statement and the mathematical


                                                                 112
[14] G. Otto, et al., Parametric Model of a Laser with                [27] Council Directive 2008/114/EC of 8 December 2008 on
     External Distributed Feedback in the System of                        the Identification and Designation of European
     Remote Measurement of Nanovibrations, in:                             Critical Infrastructures and the Assessment of the
     Workshop on Cybersecurity Providing in Information                    Need to Improve Their Protection (2008).
     and Telecommunication Systems, CPITS, vol. 3421                  [28] D. Palko, et al., Determining Key Risks for Modern
     (2023) 284–292.                                                       Distributed Information Systems, II International
[15] A. Zahynei, et al., Method for Calculating the Residual               Scientific Symposium “Intelligent Solutions” IntSol-
     Resource of Fog Node Elements of Distributed                          2021, vol. 3018 (2021) 81–100.
     Information Systems of Critical Infrastructure                   [29] UN News Global Perspective Human Stories. Ukraine:
     Facilities, in: Workshop on Cybersecurity Providing in                UN Condemns Latest Wave of Russian Attacks. URL:
     Information and Telecommunication Systems, CPITS,                     https://news.un.org/en/story/2023/11/1143202#:~:text
     vol. 3654 (2024) 432–439.                                             =Russia%20has%20bombarded%20more%20than,coun
[16] H. A. Simon, The Structure of Ill Structured Problems,                try%2C%20which%20reportedly%20resulted
     Artificial Intelligence, 4 (1973) 181–201.                       [30] A. F. Voloshin, G. N. Gnatienko, The Problem of
[17] J. R. Grohs, et al., Assessing Systems Thinking: A Tool               Maintenance of a Network of Communication
     to Measure Complex Reasoning through Ill-                             Elements and an Algorithm for its Solution, Research
     Structured Problems, Thinking Skills and Creativity,                  of Operations and Automated Control Systems 37
     28 (2018) 110–130. doi: 10.1016/j.tsc.2018.03.003.                    (1991) 99–105.
[18] A. F. Voloshin, G. N. Gnatienko, E. V. Drobot, A                 [31] A. T. W. Chu,      R. E. Kalaba,    K. Spingarn,    A
     Method of Indirect Determination of Intervals of                      Comparison of Two Methods for Determining the
     Weight Coefficients of Parameters for Metricized                      Weights of Belonging to Fuzzy Sets, J. Optimization
     Relations Between Objects, J. Automation Inf. Sci.                    Theory Appl. 27(4) (1979) 531–538.
     35(1–4) (2003).                                                  [32] T. L. Saaty, M. Sodenkamp, The Analytic Hierarchy
[19] Z. Wu, et al., Consensus Analysis for AHP                             and Analytic Network Measurement Processes: The
     Multiplicative Preference Relations based on                          Measurement of Intangibles: Decision Making under
     Consistency Control: A Heuristic Approach,                            Benefits, Opportunities, Costs and Risks, Handbook of
     Knowledge-based Systems, 191 (2020) 105–137. doi:                     Multicriteria Analysis, Applied Optimization 103
     10.1016/j.knosys.2019.105317.                                         (2010) 91–166. doi: 10.1007/978-3-540-92828-7_4.
[20] S. Boz´oki, V. Tsyganok, The (Logarithmic) least                 [33] A. Bigdan, et al., Detection of Cybersecurity Events
     Squares Optimality of the Arithmetic (Geometric)                      Based on Entropy Analysis, in: Proceedings of the 7th
     Mean of Weight Vectors Calculated from All                            International Conference on Digital Technologies in
     Spanning        Trees     for    Incomplete    Additive               Education, Science and Industry (DTESI 2022), vol.
     (Multiplicative) Pairwise Comparison Matrices, Int. J.                3382 (2022).
     General Syst. 48(4) (2019) 362–381.                              [34] H. M. Hnatiienko,      V. Y. Snytyuk,    O. O. Suprun,
[21] J. Mazurek, K. Kułakowski, On the Derivation of                       Application of Decision-Making Methods for
     Weights from Incomplete Pairwise Comparisons                          Evaluation of Complex Information System
     Matrices via Spanning Trees with Crisp and Fuzzy                      Functioning Quality, Selected Papers of the XVIII
     Confidence Levels, Int. J. Approximate Reasoning, 150                 International Scientific and Practical Conference
     (2022) 242–257. doi: 10.1016/j.ijar.2022.08.014.                      “Information Technologies and Security” (ITS 2018),
[22] M. Bohlouli, et al., Competence Assessment as an                      vol. 2318 (2018) 56–65.
     Expert System for Human Resource Management: A                   [35] K. Kułakowski, D. Talaga, Inconsistency Indices for
     Mathematical Approach, Expert Systems with                            Incomplete Pairwise Comparisons Matrices, Int. J.
     Applications, 70(1) (2017) 83–102.                                    General Syst.        49(2) (2020) 174-200,        doi:
[23] H. Hnatiienko,         V. Snytyuk,     A      Posteriori              10.1080/03081079.2020.1713116.
     Determination of Expert Competence under                         [36] H. Hnatiienko, et al., Greenhouse Gas Emission
     Uncertainty, Selected Papers of the 19th International                Determination Based on the Pseudo-Base Matrix
     Scientific and Practical Conference “Information                      Method for Environmental Pollution Quotas Between
     Technologies and Security” (2019) 82–99.                              Countries Allocation Problem, in: IEEE 2nd
[24] S. Siraj, L. Mikhailov, J. Keane, A. Contribution of                  International Conference on System Analysis &
     Individual Judgments Toward Inconsistency in                          Intelligent Computing (SAIC) (2020) 150–157. doi:
     Pairwise Comparisons, European J. Operational Res.                    10.1109/SAIC51296.2020.9239125.
     242(2) (2015) 557–567.                                           [37] S. Kubler, et al., Measuring Inconsistency and
[25] M. Brunelli, M. Fedrizzi, A General Formulation for                   Deriving Priorities from Fuzzy Pairwise Comparison
     Some Inconsistency Indices of Pairwise Comparisons,                   Matrices using the Knowledge-based Consistency
     Ann. Oper. Res. 274 (2019) 155–169. doi:                              Index, Knowledge-Based Systems, 162 (2018) 147–160.
     10.1007/s10479-018-2936-6.                                            doi: 10.1016/j.knosys.2018.09.015.
[26] O. Yu. Mulesa, Methods of Considering the Subjective             [38] M. Palangetić, et al., A Novel Machine Learning
     Character of Input Data in Voting, Eastern-European                   Approach to Data Inconsistency with respect to a
     J. Enterprise Technol. 1(3(73)) (2015) 20–25. doi:                    Fuzzy Relation (2021).
     10.15587/1729-4061.2015.36699.                                   [39] O. F. Voloshyn, H. M. Gnatienko, A Software
                                                                           Complex for Supporting the Coordination of



                                                                113
       Decisions in a Two-Level Hierarchical Model for                 Resilience in the Built Environment, 6(2) (2015) 168–
       Choosing the Mode of Operation of the                           181.
       Communication System, Bulletin of the Kyiv
       University, 7 (1992) 19–24.
[40]   L. Csat´o,     L. R´onyai,     Incomplete     Pairwise
       Comparison Matrices and Weighting Methods,
       Fundamenta Informatica, 144(3–4) (2016) 309–320.
[41]   R. Blanquero, E. Carrizosa, E. Conde, Inferring
       e-Cient Weights from Pairwise Comparison Matrices,
       Mathematical Methods of Operations Research, 64(2)
       (2006) 271–284.
[42]   Y. Koriyama, A. I. Ozkes, Inclusive Cognitive
       Hierarchy, J. Economic Behavior Organization, 186
       (2021) 458–480.
[43]   T. L. Landes, P. D. Howe, Y. Kashima, A Hierarchy of
       Mindreading Strategies in Joint Action Participation,
       Judgment and Decision Making, 16(4) (2021) 844–897.
[44]   V. V. Byts’, R. M. Zulunov, Specification of matrix
       algebra problems by reduction, J. Math. Sci. 71 (1994)
       2719–2726.
[45]   O. Mulesa, et al., Information Technology for Time
       Series Forecasting with Considering Fuzzy Expert
       Evaluations, in: 12th International Scientific and
       Technical Conference on Computer Sciences and
       Information Technologies (2017) 105–108.
[46]   H. Hnatiienko, et al., Mathematical Support of the
       Task of Determining the Strategic Directions of
       Development and Priorities of the Organization, in: 9th
       International Scientific Conference “Information
       Technology and Implementation”, vol. 3347 (2022)
       169–184.
[47]   O. Mulesa et al., A. Information Technology for Time
       Series Forecasting with Considering Fuzzy Expert
       Evaluations, in: 12th International Scientific and
       Technical Conference on Computer Sciences and
       Information Technologies (2017) 105–108.
[48]   H. Hnatiienko, et al., Application of Cluster Analysis
       for Condition Assessment of Banks in Ukraine, in: 8th
       International Scientific Conference “Information
       Technology and Implementation”, vol. 3179 (2022)
       112–121.
[49]   T. Babenko, H. Hnatiienko, V. Vialkova, Modeling of
       Information Security System and Automated
       Assessment of the Integrated Quality of the Impact of
       Controls on the Functional Stability of the
       Organizational System, in: Selected Papers of the XX
       International Scientific and Practical Conference
       “Information Technologies and Security” (2020), vol.
       2859 (2020) 188–198.
[50]   T. Babenko, H. Hnatiienko, V. Vialkova, Modeling of
       the Integrated Quality Assessment System of the
       Information Security Management System, in: 7th
       International Conference “Information Technology
       and Interactions”, vol. 2845 (2021) 75–84.
[51]   T. Babenko, et al., Modeling of Critical Nodes in
       Complex Poorly Structured Organizational Systems,
       in: Information Society and University Studies, vol.
       2915 (2021) 92–101.
[52]   J. Matzenberger, et al., A Novel Approach to Assess
       Resilience of Energy Systems, Int. J. Disaster




                                                                 114