=Paper=
{{Paper
|id=Vol-3826/paper10
|storemode=property
|title=Mathematical models and methods for decision coordination in critical infrastructure operations
|pdfUrl=https://ceur-ws.org/Vol-3826/paper10.pdf
|volume=Vol-3826
|authors=Hryhorii Hnatiienko,Oleksii Hnatiienko,Tetiana Babenko,Larysa Myrutenko
|dblpUrl=https://dblp.org/rec/conf/cpits/HnatiienkoHBM24
}}
==Mathematical models and methods for decision coordination in critical infrastructure operations==
Mathematical models and methods for decision
coordination in critical infrastructure operations ⋆
Hryhorii Hnatiienko1,†, Oleksii Hnatiienko1,†, Tetiana Babenko1,2,† and Larysa Myrutenko1,*,†
1
Taras Shevchenko National University of Kyiv, 64/13 Volodymyrska str., 01601 Kyiv, Ukraine
2
International Information Technology University, 34/1 Manas str., A15M0E6 Almaty, Kazakhstan
Abstract
This paper considers the problems associated with ensuring the functioning of the critical infrastructure
network. It is proposed to consider a poorly formalized system of ensuring the functioning of critical
infrastructure facilities using expert information processing methods. The urgency of solving the problem
under consideration is confirmed by the massive attacks on critical infrastructure by the Russian troops
during Russia’s large-scale aggression against Ukraine. The paper presents a mathematical model of the
problem of maintenance of a network of critical infrastructure facilities developed by the authors. A scheme
of sequential analysis of options for solving the problem of ensuring the operation of the critical
infrastructure system is proposed. Methods for finding a valid solution to the problem, searching for a
reference solution to the problem, and algorithms for improving the reference solution in various variations
are described. The problem statement and the mathematical model of decision coordination in a three-level
hierarchical system for ensuring the operation of a network of critical infrastructure facilities are also
described. An algorithm for coordinating decisions in a three-level hierarchical system is presented.
Keywords
organizational system, functional stability, critical elements, weighting factors, layering method 1
1. Introduction in particular, it is difficult for subject matter experts to build
metric relations on a set of objects [18, 19].
The possibilities of applying mathematical models and In particular, a person cannot set reliable weighting
decision-making methods to study the problems of coefficients for the relative importance of parameters or
vulnerability, protection, and management of critical criteria [20, 21], expert competence coefficients [22, 23],
infrastructure systems are in the field of view of many elements of metricated pairwise comparison matrices [24,
researchers [1, 2]. This issue has been studied by scientists 25], or build a reasonable reliable membership function
from different countries for many years [3–5] and its using direct methods [26]. Meanwhile, such problems
relevance is not decreasing [6–8]. To date, a large number regularly arise in everyday life and require their solution.
of approaches and mathematical models have been
developed that demonstrate the authors’ attempts to ensure 2. Critical infrastructure facilities
the effective functioning and protection of critical
infrastructure [9–11]. At the same time, the problems of Critical infrastructure facilities are those that are
protecting critical infrastructure from terrorist attacks
remain extremely relevant [12, 13]. This is explained, in Particularly important for the state.
particular, by the fact that the problem of critical Capable of significantly affecting other critical
infrastructure protection is poorly structured, and the infrastructure facilities.
systems that describe the network of critical infrastructure Whose disruption causes a crisis of national
facilities are poorly formalized organizational systems [14, importance.
15]. Vital at the regional level.
In many practical decision-making situations in poorly Whose disruption or malfunction causes a
formalized organizational systems, the decision-maker is crisis of regional, local, or local significance.
forced to act in poorly structured subject areas [16, 17]. To
ensure the quality of decision support in poorly structured Critical infrastructure facilities include enterprises and
subject areas, expert knowledge is traditionally and institutions operating in the following industries:
effectively involved. In addition, building a preference
structure in a formalized form is a difficult task for humans: Energy
CPITS-II 2024: Workshop on Cybersecurity Providing in Information 0000-0002-0465-5018 (H. Hnatiienko);
and Telecommunication Systems II, October 26, 2024, Kyiv, Ukraine 0000-0001-8546-5074 (O. Hnatiienko);
∗
Corresponding author. 0000-0003-1184-9483 (T. Babenko);
†
These authors contributed equally. 0000-0003-1686-261X (L. Myrutenko)
g.gna5@ukr.net (H. Hnatiienko); © 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).
oleksii.hnatiienko@knu.ua (O. Hnatiienko);
babenkot@ua.fm (T. Babenko);
myrutenko.lara@gmail.com (L. Myrutenko)
CEUR
Workshop
ceur-ws.org
ISSN 1613-0073
105
Proceedings
Chemical 𝛽 here 𝑘 is the number of days when the execution of the𝑗
Food is request starts; 𝑚 is the number of types of resources;
Transport 𝛽 , 𝑖 = 1, … , 𝐷 are restrictions on the readiness of the OCI’s
Financial and banking command center for the EWM brigades, which means that
Information technology and telecommuni- no more than 𝑖 is requests can be serviced on a given day,
cations 𝛽 ≤ 𝐵, 𝑖 = 1, … , 𝐷. (3)
Utilities: water, heat, and gas supply It should be noted that requests for activation of the next
Healthcare, etc. I&CS teams are received directly from CI facilities, I&CS
subsystems (SS), or the governing bodies of the I&CS
According to [27], critical infrastructure assets are system.
systems that are essential for maintaining vital social Array of inconsistencies (incompatibilities) of
functions, health, safety, security, and economic or social applications
well-being of people. 𝐶= 𝐶 , 𝑠 = 1, … , 𝑆, ℎ = 1,2, …, (4)
Timely restoration of critical infrastructure facilities where 𝐶 is the number of requests that cannot be
during military operations is particularly important. As a executed simultaneously; 𝑆 is the number of array lines; ℎ
result of unprovoked aggression by Russia, Ukraine faced is the indices of incompatible requests of the 𝑠th line of the
large-scale and targeted attacks on its critical infrastructure unstacked array.
[28]. Attacks were carried out in more than a hundred cities
in Ukraine [29]. 3.2. Scheme for solving the problem of
ensuring the operation of the QMS
3. The task of maintaining a network
The solution to the problem is sought in two stages: building
of critical infrastructure facilities a reference solution and building an optimal solution. To
The maintenance task was considered and studied in [30] as describe the algorithms, we present the necessary
the task of maintaining a network of communication definitions.
elements. Subsequently, the problem statement, approaches Definition 1. A variant of the problem (1)–(4) is a vector
to its solution, and the algorithm for sequential analysis of 𝑣 = (𝑣 , … , 𝑣 ), whose elements are triples𝑣 =
options were adapted to the extremely relevant problem of 𝑣 , 𝑣 , 𝑣 , where 𝑖 is the number of the request; 𝑣 is the
timely and efficient operation of the C&I system. duration of the ith request; 𝑣 is the number of the team that
3.1. Setting the task of ensuring the executes ith the request; 𝑣 is the day the request starts ith
operation of the OCI network the request.
Definition 2. An admissible (complete) variant (solution)
Let 𝑅 = 𝑟 , 𝑖 = 1, … , 𝑁 , 𝑏 = 1, … , 𝐵, 𝑁 ≤ 𝐷, 𝑅 is the of the problem (1)–(4) is the variant 𝑣 = (𝑣 , … , 𝑣 ), that
set of working intervals in a month, 𝑁 is the number of satisfies constraints (2)–(4).
intervals (windows) for the 𝑏 is the team that ensures the Definition 3. A partial solution to problem (1)–(4) is a
operation of the OCI network; 𝐵 is the number of teams, vector, 𝑣 = (𝑣 , … , 𝑣 ), 𝑠 < 𝑛, that satisfies constraints (2)–
∩ 𝑟 , 𝑖 = 1, … , 𝑁 = (in particular, the system of (4).
intervals may coincide for all teams); 𝑟 is determined by Definition 4. A locally valid subvariant 𝑣 =
the beginning 𝜂 and duration 𝛿 , 𝑟 = 𝜂 , 𝛿 , 𝑖 = 𝑣 , 𝑣 , 𝑣 , 𝑙 ∈ {1, … , 𝑛} of problem (1)–(4) is the
1, … , 𝑁 ; 𝐷 number of working days in a month; 𝛼 , 𝑗 = placement of a request in some working interval that
1, … , 𝑛, is the set of requests for activation of the work of satisfies conditions (2)–(4).
Definition 5. An admissible subvariant of problem (2)–(4)
the CMI NMS teams, the duration of which is equal to 𝜏 =
is a locally admissible subvariant that leads to an admissible
𝜏 𝛼 , 1 ≤ 𝜏 ≤ 𝐴; 𝑛 is number of requests; 𝐴 is the variant.
maximum length of the request; 𝑓 = 𝑓 𝛼 , 𝑖 = 1, … , 𝐷, Definition 6. A reference solution to problems (1)–(4) is a
𝑗 = 1, … , 𝑛, is the efficiency of execution of the 𝑗 is request feasible solution (variant) that can, without being optimal,
if it starts to be executed on the 𝑖 th day of the month. Target make the most of resources and at the same time deliver a
function of the task: local optimum to the objective function.
𝐹(𝛼) = 𝑓 𝛼 → 𝑚𝑎𝑥 ,
∈{ ,…, }
(1) 3.3. Method for finding a valid solution to
the problem of ensuring the operation
where 𝑘 is the number of working days in the calendar of the QMS
month on which the 𝑗 is request starts to be executed. Let
The method of finding a feasible solution consists of the
𝑔 = 𝑔 𝛼 is the resource of the 𝑙 is the type required to
sequential construction of a reference solution as a union of
satisfy the 𝑗 is request if it starts executing on the 𝑖 th day, locally feasible subvariants. Therefore, it is reduced to the
𝑙 = 1, … , 𝑚, 𝑖 = 1, … , 𝐷, 𝑗 = 1, … , 𝑛. Then the resource sequential application of the following procedure.
constraints are Procedure for finding a locally admissible subvariant PS.
∑ 𝑔 𝛼 ≤ 𝐺 , 𝑙 = 1, … , 𝑚, (2) The basis of the method is the formation of a set of
admissible subvariants 𝑉 = (𝑣 ), 𝑖 = 1, … , 𝑚 + 2, 𝑙 =
106
1, … , 𝐿, from which a compromise subvariant is selected, 𝐿— There are four options for modifying the system of working
the number of admissible subvariants. The condition for intervals of brigades by changing the interval in which the
generating a sub-variant is, firstly, 𝛿 ≥ 𝛼 , 𝑖 = 1, … , 𝑁 , compromise order is placed:
𝑏 = 1, … , 𝐵, 𝑗 = 1, … , 𝑛, i.e., the application 𝛼 should not 1. The length of the interval 𝑟 , 𝑘 ∈ {1, … , 𝑁 } is equal
exceed the interval in which it is supposed to be placed, and to the length of the bid 𝜏 and the interval is completely
secondly, the compatibility of the current application with excluded from consideration. At the same time, 𝑁 = 𝑁 −
the one already accepted in the partial solution. In parallel 1, 𝑏 = 𝑡 , where 𝑘—is the index of the compromise bid.
to the set of sub-options, a set of indices corresponding to
2. 𝑟 >𝜏 and the compromise application is placed
them is formed, 𝑇 = 𝑡 , ℎ = 1,2,3, 𝑙 = 1, … , 𝐿, where
at the beginning of the interval 𝜂 > 𝑡 . In this case,
𝑡 ≤ 𝑛 is the number of the application that generates the
sub-option, 𝑡 ≤ 𝐵 is the number of the team proposed to
= + 𝑡 , 𝛿 =𝛿 −𝑡 .
execute the application, 𝑡 ≤ 𝐷 is the day the execution of 3. 𝑟 >𝜏 and the compromise bid is placed at the
the application 𝑡 by the team starts 𝑡 . end of the interval. Then = ,𝛿 =𝛿 −𝑡 .
Consider the procedure for forming a valid subvariant 4. 𝑟 ≥ 𝜏 and the placement of the application does
𝑣 = 𝑣 ,…,𝑣 , . For each request 𝛼 , 𝑗 = 𝑡 , all not correspond to any of the three cases. This generates an
possible combinations of its placement in the working additional interval with the index, i.e. 𝑑, 𝑑 = 𝑁 + 1, 𝑏 =
intervals of the teams are selected. At the same time, 𝑣 = 𝑡 , 𝛿 = 𝑡 +𝜏 , 𝛿 = 𝜂 +𝛿 −𝑡 −𝜏 −
( )
, 𝜏 ≤ 𝐴 is the length of the request 𝑡 ; 𝑣 = 𝜔 ,𝜔 = 1, and = , 𝛿 =𝑡 −𝜂 .
( ) In addition, the availability conditions are checked by
, where 𝑠 = 𝑡 , 𝐹 (𝐹 ) = max min 𝑓 ; 𝜇 >
( ) ,… comparing the number of requests accepted for execution
1 is a multiplier that plays the role of a weighting factor for on each day of the month 𝑧 , 𝑖 = 1, … , 𝐷, with the
the relative importance of the request length for finding a availability limits 𝛽 , 𝑖 = 1, … , 𝐷. If they are equal 𝑧 = 𝛽 ,
compromise sub-option; 𝑣 , = , 𝑖 = 1, … , 𝑚, where 𝑖 = 1, … , 𝐷, the interval system is adjusted on some days:
working days of teams for which 𝑧 − 𝛽 = 0, become days
𝐺 = 𝐺 − 𝛥𝐺 , 𝑠 = 1, … , 𝑛, 𝛥𝐺 is the amount of resource off, which affects the structure of intervals.
𝑖 of the type spent when including the next compromise As a result of applying the PS procedure to the original
sub-option𝑣 in a partial solution to the problem: problem, a partial solution is constructed and the problem is
𝐺 = 0, 𝑖 = 1, … , 𝑚 . modified. After 𝑛 is the application of the described
Thus, the search for a partial solution to the original procedure, three cases are possible:
problem is reduced to a discrete multicriteria optimization 1. The solution to the problem is found and one of the
model with a set of feasible solutions 𝑉 and (𝑚 + 2) criteria resources is completely exhausted:
to be minimized. If the set of admissible sub-options is not ∃𝑖: 𝛥𝐺 = 𝐺 ,
empty,𝑉 ≠∅, and not trivial, i.e. |𝑉| > 1, we will look for a and hence, 𝐺 = 0. The method of finding the reference
compromise. To find a single solution to a multicriteria solution is completed.
optimization problem, it is necessary to set the weighting 2. The solution to the problem is found, but
coefficients of the criteria [31–33]. Let’s fix the weighting for ∀𝑖 = 1, … , 𝑚, 𝛥𝐺 < 𝐺 ;
factor for the length of the application as 𝜌 —for the sake of in this case, it is necessary to reduce the total weighting of
certainty, let’s assume𝜌 = 0.5. Let’s denote by 𝜌 the resources 𝜌 by increasing the weight of the objective
weighting factor of the objective function of the initial
function 𝜌 , taking into account the following condition:
problem of the OCI MOC; the criteria that are “responsible”
𝜌 +𝜌 =1−𝜌 ; (6)
for resources are aggregated and denoted by the total
3. The task is incompatible. This, in turn, is possible
weighting factor
when:
𝜌 =∑ 𝜌,∑ 𝜌 = 1. 3.1) one or more resources have been exhausted to
We are looking for a compromise option as obtain a complete solution to the problem. Therefore, the
𝑣 = 𝑎𝑟𝑔 𝑚𝑖𝑛 𝑚𝑎𝑥 𝜌 ⋅ 𝑣 . (5)
,…, ,…, total weight of the resources 𝜌 should be increased, taking
In the case when the solution of (5) is not unique, a into account condition (6). This reduces the weight 𝜌 of the
linear convolution is applied objective function, which could also influence the
“unfavourable” placement of the suboption.
𝑣 = 𝑎𝑟𝑔 𝑚𝑖𝑛 𝜌 ⋅𝑣 , 3.2) there is no valid working interval for the next order,
∈
and therefore 𝑉 ≠∅ . Such a situation is possible if the
where 𝑈 is the set of indices of sub-variants equivalent by coefficient 𝜌 , which is “responsible” for the length of the
criterion (5). order, is not large enough. In this case, orders of short length
As a result of the search for the “best” sub-variant, we were likely prioritized and “cut” the working intervals that
complement the partial solution. This modifies the original could accommodate orders of longer length. Such a situation
problem. The number of requests is reduced, i.e. 𝑛 = 𝑛 − 1, can be managed by reducing the 𝜇 indicator. In this case,
and the number and/or length of work intervals of the teams 𝑣 , 𝑙 = 1, … , 𝐿, remain unchanged, and 𝑣 , 𝑖 = 2, … , 𝑚 + 2,
are changed. 𝑙 = 1, … , 𝐿, increase by reducing 𝜇 with unchanged
107
weighting factors 𝜌 , 𝑖 = 1, … , 𝑚 + 2, and thus “move where 𝑧—is an additional application involved in the
away” from the optima. replacement chain to generate additional solution options.
As a result of applying the described method, we obtain It is easy to see that all the more complex cases are
the reference solution 𝑣 = (𝑣 , … , 𝑣 ) or make sure that reduced to the cases a)—c) described above.
the initial problem is incompatible. In this case, the If the option remains valid, its 𝑃 is valid sub-options are
conditions of incompatibility are constructively formulated. replaced (permuted) and the process proceeds to step 0. If
If the initial problem is admissible, you can improve the the option is not valid, an attempt is made to make the
solution. To describe this method, let’s introduce a permutation valid by making concessions on the sub-
definition. options found for the permutation.
Definition 7. A P-admissible sub-variant of 𝛼 ∈ 𝛼, 𝑖 = At the same time, if 𝑓 𝛼 ( ) > 𝑓 𝛼 ( ) or
1, … , 𝑠, is one or more bids placed in the same working 𝑓 𝛼 ( ) = 𝑓 𝛼 ( ) and 𝑔 𝛼 ( ) > 𝑔 𝛼 ( ) , are used,
interval (𝑠 is number of admissible sub-variants, 𝑃— the option 𝛼 ( ) , where 𝑘—is the iteration number is
admissible placement option). Moreover, the 𝑃—valid sub- accepted.
option must be valid.
Definition 8. The length 𝑃—of a valid sub-variant will be 3.5. Algorithm for improving the reference
the distance from the start of the first order in a fixed solution by changing its P-admissible
working interval to the end of the last order in that interval.
subvariants
Definition 9. 𝑃—Valid sub-options are comparable when
the sum of the order lengths of one sub-option does not Step 1. Search for the maximum possible length of the empty
exceed the length of the working interval containing the segment in the intervals that make up 𝑃—valid subvariants.
second sub-option, and vice versa. Step 2. Applications whose length does not exceed the
Definition 10. 𝑃 is valid sub-option 𝛼 will be more value of the found segment are sorted in descending order.
promising than 𝑃 is valid sub-option 𝑦. If these sub-options Step 3. The applications of the found set are “tried on”
are comparable for a fixed interval 𝑧 and 𝑓(𝛼) > 𝑓(𝑦), or to the empty segments in which they can be placed. If
𝑓(𝛼) = 𝑓(𝑦) and (𝑔(𝛼) = 𝑔(𝑦) 𝛼 dominates 𝑦 in terms of 𝑓 𝛼 ( ) = 𝑓 𝛼 ( ) , the request is moved. If not, other
resources). applications are considered. If there is no improvement as a
𝑓(𝛼) denotes 𝑚𝑎𝑥 𝑓 (𝛼), where 𝑋—is the set of options result, the option is locally optimal.
∈
The combinatorial formulation of the problem of QMS
for placing requests on the interval 𝑧.
and the sequential algorithm for its solution is a convenient
tool for research, structuring the subject area and
3.4. Algorithm for improving the reference
“penetration” of the user into the problem and information
solution by changing its P-valid content of the QMS problem. At the same time, the
variants described heuristic algorithms are an effective apparatus for
The initial data for this algorithm are the data described in finding a locally optimal solution to the problem, since they
the problem statement, as well as the reference solution allow generating an acceptable variant of request service
𝑣 = (𝑣 , … , 𝑣 ), obtained as a result of the previous with its subsequent improvement and identifying
method and described in terms of 𝑃—admissible incompatibilities of the problem.
subvariants.
Step 0. Ordering by the quality 𝑃—of the admissible 4. The task of coordinating decisions
subvariants that make up the reference solution. If 𝑓(𝛼) = in a three-level hierarchical
𝑓(𝑦) and the vector 𝑔 (𝛼), … , 𝑔 (𝛼) are incomparable system for ensuring the operation
with the vector 𝑔 (𝑦), … , 𝑔 (𝑦) , then the subvariant of
of a network of critical
shorter length is considered more promising.
Step 1. The master selects 𝑃—the best quality admissible infrastructure facilities
sub-variant contained in the reference solution. An attempt In group decision-making and determining the properties of
is made to improve it by placing it in other working an object, there is almost always a problem reconciling
intervals or by permissible permutations in its working assessments [34, 35]. Experts’ opinions often do not coincide
interval. and must be aggregated to obtain a single conclusion [36,
Step 2. If the leading sub-option cannot be made more 37]. In some practical tasks, the definition of an aggregated
promising, the next best sub-option is considered. If no 𝑃 is (integral, resultant, etc.) solution is carried out in the form
valid sub-option has improved during the algorithm, the of intervals or a membership function of a fuzzy set [38].
algorithm ends. In [39], the authors considered and studied the problem
With improvement, such cases are possible: of coordinating decisions in a two-level hierarchical model
a) the application 𝛼 is “exchanged” by the working for choosing the mode of operation of a communication
interval of placement with the application 𝑦. system. Due to the urgency of the problem of critical
b) the application 𝛼 shall be placed in the time slot infrastructure protection at the regional and state levels,
previously occupied by the application 𝑦, and the this task was adapted to the problems of ensuring the
application 𝑦 shall be placed in the previously free time slot. operation of a hierarchical system of critical infrastructure
c) cyclical replacement 𝛼 → 𝑦 → 𝑧 → 𝛼, facilities. The technology for coordinating decisions in a
hierarchical system was improved and refined to ensure that
108
decisions are coordinated in a three-tier hierarchical system. three-level hierarchical model, considering that the modes
The interpretation of the problem area of research was also of operation of the network of elements are subsystems (SS)
naturally adapted to the issues related to the functioning of the lower level, and the capital costs for the creation and
and characteristics of the critical infrastructure network. maintenance of the system, operation of the I&C and
maintenance of crews are arguments for the quality
4.1. Formulation of the problem of decision criterion of the upper-level SS [42, 43].
coordination in a three-level Let us consider the problem of reconciling the decisions
hierarchical system of critical of a certain set of PS of a hierarchical organizational system
infrastructure with indices 𝐼 = {0, … , 𝑀}, connected by a three-level
hierarchical structure [44]. We will assume that the
Let there be given a set of alternatives (objects, options, analytical or tabular dependencies of the values of 𝑓 (𝑢), 𝑙 ∈
plans, projects, etc.) 𝑎 ∈ 𝐴, 𝑖 ∈ 𝐼 = {1, … , 𝑛}, each of which 𝐼, of the quality criteria of the PS on the attributes
is characterized by 𝑚 features (attributes, characteristics, (characteristics, attributes, etc.) are known. The
factors, etc.) relationships between the criteria (also given analytically or
𝑎 = 𝑎 ,…,𝑎 , 𝑖 ∈ 𝐼. tabularly) are denoted by
To build a model of a specific task, it is often necessary 𝑀 (𝐷), 𝑙 ∈ 𝐼,
to determine the relative weight of characteristics and their where 𝐷 is the set of permissible variants of the values of
influence on decision-making—to increase certainty and the features that affect the values of the quality criteria
increase the structure of the subject area. Since a person in 𝑓 (𝑢), 𝑙 ∈ 𝐼, 𝑢 ∈ 𝐷.
most cases is not able to adequately assign relative weights,
indirect methods are a promising direction for solving the 4.2. A mathematical model of the problem
problem of determining the weighting coefficients of of decision coordination in a three-
characteristics [40, 41].
level hierarchical system
As a rule, there is a history of preferences between
objects (alternatives, players, projects, units, etc.)—based on The three-tier hierarchical management system under
the results of measuring experts’ preferences or any other consideration consists of:
natural information. This can be a series of tournaments or
a ranking of objects, i.e. a complete preference relation. ● One top-level PS (denoted by the index 0).
We will assume that the topology of the set (network) ● 𝑛 of medium-sized substations isolated from each
of IEDs requiring regular maintenance and ensuring other with a set of indices 𝐼 = {1, … , 𝑛 }.
uninterrupted operation in the event of emergency outages ● 𝑛 subordinate systems of the set 𝐼 of isolated
or planned rolling outages is given: the number of IEDs and lower-level substations with a set of indices 𝐼 =
their geolocation coordinates on the plane. It is necessary to {𝑛 + 1, … , 𝑛 + 𝑛 }.
determine:
As a rule, the model of the hierarchical system of the
● A sufficient number of QMS centers. above structure is built as follows.
● Their location (the QIS RM center can only be The top-level PS 𝑆𝑆𝐻 coordinates the operation of the
located in an element of the QIS network). middle-level PS 𝑆𝑆𝑀 , 𝑖 = 1, … , 𝑛 , using control vectors
● Provision of the CMI centers with brigades 𝑢 , 𝑙 ∈ 𝐼 , whose values are determined when solving the
(network equipment), i.e. the optimal number of top-level optimization problem according to the top-level
brigades in each center (we will assume that all optimality criterion. The control influences of each
brigades are integrated, interchangeable, and of medium-level AC 𝑢 , 𝑙 ∈ 𝐼 , are determined when solving
the same type). optimization problems according to the medium-level
● Distribution (division) of the network into service optimality criterion, taking into account the calculated
zones, i.e. finding the best option for clustering control influences ul, 𝑙 ∈ 𝐼 , received from the upper-level
network elements with the identification of the AC. In turn, each 𝑙—and (𝑙 ∈ 𝐼 ) of the middle level
element number in which the OCI MIS center is coordinates the work of isolated lower level 𝑆𝑆𝐿 , 𝑖 = 𝑛 +
located and the number of elements served by each 1, … , 𝑛 , associated with it (the set of indices of which is
center.
denoted by 𝐼 , 𝑙 ∈ 𝐼 , ∑ 𝐼 = 𝑛 . Each 𝑙 and lower level
At the same time, it is necessary to ensure the minimum substation, taking into account the control influence of 𝑙 is
cost of building the I&CMS system and operating the the middle-level substation 𝑢 , finds its solution 𝑢
network in three modes of operation and the maximum according to its optimality criterion.
probability of maintaining operability for each mode while A diagram of the relationships between subsystems of
ensuring restrictions on the average recovery time of each different levels of the three-tier hierarchical system is
network element. We will interpret the task in terms of a shown in Fig. 1.
109
Figure 1: Schematic diagram of the three-level hierarchical structure for ensuring the sustainable operation of the critical
infrastructure network
We will assume that the choice of control influences 𝑢 in where all notations correspond to those in problems (7)–
the 𝑙 of the lower-level AC 𝑆𝑆𝐿 , 𝑖 = 𝑛 + 1, … , 𝑛 , is carried (10), 𝑢 is control influence transmitted to 𝑙 that middle-
out when solving a discrete optimization problem of the level PS from the upper-level PS 𝑆𝑆𝐻 .
form The choice of control influences 𝑢 , 𝑙 ∈ 𝐼 , in the upper-
𝑓 𝑢 → 𝑚𝑖𝑛, (7) level control system is carried out when solving the discrete
𝐻 𝑢 ≤𝐻 , ∗ (8) optimization problem of the form
(9) 𝑓 (𝑢) → 𝑚𝑖𝑛, (15)
𝑔 𝑢 ≤𝑢 ,
𝐻(𝑢) ≤ 𝐻 ∗ , (16)
𝑢 ∈𝑈 = 𝑈 , (10)
𝑢∈𝑈= 𝑈 , (17)
where 𝑢 is the solution vector, the dimension of which is
where 𝑢 = {𝑢 , 𝑙 ∈ 𝐼 }; 𝑈 are finite sets; 𝑓 is a scalar
determined by condition (10); 𝑈 is the finite sets of possible
function; 𝐻 is a vector function; 𝐻 ∗ is a vector of constants
variants 𝑗 and components of the vector 𝑢 ; 𝑓 are scalar (the requirements for 𝑓 are similar to those for problem
functions; 𝐻 , 𝑔 are vector functions of a discrete (7)–(10)).
argument of the corresponding dimension, specified The variants of the values of characteristics (factors,
analytically or in the form of tables, such that for each features, attributes, etc.) that satisfy condition (8) for a
component of 𝑢 vectors 𝑢 the values of particular model are set explicitly (taking into account
𝑎𝑟𝑔 𝑚𝑖𝑛 max () 𝐻 ,𝑔 to 𝑢 at fixed values of information about the peculiarities of the functioning of 𝑙 of
the PS obtained from experts or by solving auxiliary tasks
other variables do not depend on the value of this
of finding the quality of functioning of 𝑙 of the PS).
component (this condition is satisfied, for example, by
Conditions (9) in a particular model are set by tables of
monotonic or separable functions); 𝐻 ∗ —vector of given correspondence of variants of values of external
constants. characteristics to internal ones.
Relationship (9) characterizes the own constraints of the A “partial” mathematical model of the general model
PS, i.e. the relationship between the own parameters of the discussed above is presented.
PS (𝐻 ∗ —its resource, so condition (9) sets the law of We will assume that the set of possible values of
distribution of the own resources of the PS), and relations characteristics U is divided into the set of 𝑈 з general
(8) determine the relationship with the medium-level PS (i.e. characteristics, on which the quality of the system
the relationship between the own parameters of the PS and functioning as a whole depends, and 𝑈 , 𝑙 ∈ 𝐼 , the set of
external influences—interpreted as the “external” resource own characteristics of the PS, i.e., characteristics that affect
of the PS). This is carried out with the help of control
only the functioning of individual PS; 𝑈 𝑢 , 𝑙, 𝑖 ∈ 𝐼, 𝑢 , 𝑙 ∈
influences 𝑢 , that is determined by solving a similar
𝑖 ≠ 𝑗, characteristics that reflect the “vertical” links between
problem for each 𝑙 of the medium-level PS 𝑆𝑆𝑀 , 𝑖 =
PS of different levels.
1, … , 𝑛 ,
Let us denote by 𝑈 = 𝑈 з × ∏ ∈ 𝑈 × ∏ , ∈ 𝑈 , the set
𝑓 𝑢 → 𝑚𝑖𝑛, (11)
of possible values of characteristics in the functioning of a
𝐻 𝑢 ≤𝐻 , ∗ (12)
hierarchical system.
𝑔 𝑢 ≤𝑢 , (13) Then, the partial mathematical model of the OCI CMM
system is interpreted in terms of the general mathematical
𝑢 ∈𝑈 = 𝑈 , (14) model as follows. The values of the criterion functions (7),
(11), (15) are set as a function of the given points of the
110
corresponding hyperparallelepipeds (10), (14), (17). The where 𝐶 , 𝐶 are the average specific costs of restoring a
constraints (9) and (13) are set by the tables of network element and maintenance, respectively; 𝜏 , 𝑇
correspondence between the binding and own control are the given constants;𝑇БР is the average failure-free life,
influences. The eigenconstraints of the PS (8), (10), and (12) which is determined by the formula
are given by the table dependencies on their 𝜇 (1 − 𝑒𝑥𝑝(−(𝜇 + 𝜆) ⋅ 𝑇 ))
eigenparameters. 𝑇БР = 𝑇 ⋅ +𝜆⋅ ,
(𝜇 + 𝜆) (𝜇 + 𝜆)
A consistent solution of a hierarchical system is in which 𝜆 is a constant: 𝜇 is the failure rate, 𝜇 = 1/𝑇 , 𝑇
calculated as a “compromise” solution:
is the average recovery time 𝑇 = 𝑇 + 𝜏 ; 𝑇 is a
𝑢 = 𝑎𝑟𝑔 𝑚𝑖𝑛 𝑚𝑎𝑥 𝜌 𝜔 (𝑢), (18)
∈ ∈ constant related to the restoration of operability; 𝜏 = 𝑆/𝑣
where 𝜔 (𝑢) = 𝜔 𝑓 (𝑢) , 𝑖 ∈ 𝐼 relative deviations from the is the time spent on moving from the OCI’s emergency
optimums of the quality criteria for the functioning of 𝑖 th PS response center to the network element,𝑣 = 𝑐𝑜𝑛𝑠𝑡 is the
at the values of parameters 𝑢, 0 ≤ 𝜔 (𝑢) ≤ 1; 𝜌 is average speed of brigades’ movement, 𝑆 is the distance
weighting coefficients of the importance of PS for achieving between points.
the goals of the entire hierarchical system. Finding the 𝑆 = 𝑇 ∙ 𝐶 ∙ (1/𝑇БР + 1/𝑇 )
weighting coefficients is an independent task. We only note 𝑇Е and 𝑇 are the specified constants.
that additional restrictions may be imposed on the The values of the functionalities of the quality of
weighting factors, for example, operation of the lower-level substation are given in the form
∑∈ 𝜌 =𝜌 ,𝑖∈𝐼 , of a table in the form of a correspondence
where 𝜌 —are the coefficients of the lower-level PS, 𝜌 —are 𝑢 , 𝑢 ⇔ 𝑓 , 𝑞 ∈ 𝑄, 𝑗 ∈ 𝐼 , 𝑖 = 1,2,3,
the “weights” of the upper-level PS. where 𝑢 , 𝑞 is a string of values of “connecting” (“linking”)
𝑈 , 𝑢 ∈ 𝑈 . In the case when the solution (18) is not
characteristics, 𝑢 , 𝑗 is a string of eigenvalues of
unique, an additional criterion of the form
characteristics 𝑖 of the lower-level PS, 𝐼 is a set of indices
𝑝 𝑤 (𝑢 ) → min . of variants of values of characteristics of the lower-level PS.
∈
∈
The function of the quality of the upper-level PS functioning 4.3. Algorithm for reconciling decisions in
is calculated by the formula a three-level hierarchical system
𝑆 =𝐸 ∗∑ 𝑆 +∑ ∑ ∈ 𝑆 +
The algorithm for matching solutions of a three-level
∑ ∑ ∈ 𝑆 ,𝑖∈𝐼 , hierarchical system that models the solution of the OCI
where 𝐸 is the coefficient related to capital expenditures; WRM problem can be described by the following sequence
𝑁 is the number of QMS centers (a factor whose value of steps.
should be found); 𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 is the capital Step 0. Reading the data required for the algorithm to
expenditures for the establishment and operation of the function: variants of the values of general characteristics,
𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 center (for the sake of simplicity, we variants of the values of the characteristics of the
substations of all three levels. Calculate or explicitly enter
assume 𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 for ); ∀𝑗 = 1, … , 𝑁, 𝑅 , 𝑗 = 1, … , 𝑁
the weighting coefficients of the relative importance of the
is the number of service teams in the 𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡
PS for the functioning of the system as a whole. Calculation
center (we assume that all teams are of the same type, i.e. or specification of the optimal and worst values of the
𝑆 = 𝑆 = 𝑐𝑜𝑛𝑠𝑡 for 𝑏 ∈ 𝐵 , ∀𝑗 = 1, … , 𝑁) characteristics quality criteria for the functioning of all the PSs of the
whose values are to be calculated; 𝑟 ∈ 𝑅 , ∀𝑗 = 1, … , 𝑁 is the hierarchical system.
composition of sets of indices of elements served by the 𝑆 Step 1. Formation of sets of indices of variants of values
center values of characteristics whose values are to be of characteristics of those PSs that are connected by the
calculated; 𝑆 is operating costs to maintain the operability same common characteristics. If a certain variant of the
of the 𝑟—network element served by the 𝑆 = 𝑆 = 𝑆 (𝑆), common values of characteristics is absent in a PS, then it
the center of the MIS OCI. cannot be included in the search for an agreed solution—it
The value 𝑆 = 𝑆 = 𝑆 (𝑆), where 𝑆 is the distance is concluded that it is inadmissible.
Step 2. Based on the coordinates of the network elements,
between the center of the OCI RFM with the index 𝑗 and the
distances between them are calculated to use their values in
network element to be served with the index 𝑟. The value of
calculating the quality of the upper-level substation, which is
the distance 𝑆 is calculated by the formula
set in an analytical form.
/
𝑆= 𝑥 −𝑥 + 𝑥 −𝑥 , Step 3. Set the initial values of the trade-off 𝜔 = 1,
where 𝑥 , 𝑥 , are the geolocation coordinates of the 𝑗 of the 𝜔 = 1, where 𝜔 is the initial value of the parameter 𝑘 ,
OCI network element on the plane (this network element 𝜔 is the initial value of the linear function of the PS criteria
may or may not contain an OCI center). with the weighting coefficients set in step 0.
The meaning of 𝑆 is calculated as follows: Step 4. A complete search of the sets of indices of
variants of the values of the characteristics of the PS,
𝑆 = 𝑆 +𝑆 ,
connected by the same common characteristics, is
where 𝑆 are the costs of CMM O&M and repairs, 𝑆 are organized. If the search is completed, an agreed solution is
transport costs. displayed, i.e., a variant of the values of the characteristics
𝑆 = 𝑇 ⋅ (𝐶 ⋅ (𝑇 − 𝑇БР ) + 𝐶 ⋅ 𝜏 )/𝑇 ,
111
of the PS that delivers a minimum of 𝜔 and 𝜔 . This model of decision coordination in a three-level hierarchical
completes the algorithm. system for ensuring the operation of a network of critical
Step 5. The value of the upper-level PS quality criterion infrastructure facilities are also presented. An algorithm for
is calculated on the next variant of the parameter values, the coordinating decisions in a three-level hierarchical system
values of the lower-level PS criteria are searched for in the is developed and described.
correspondence tables and these values are converted to a
dimensionless form. The next 𝜔 and values of 𝜔 , 𝜔 , and References
𝜔 are also calculated, respectively. If 𝜔 > 𝜔 or to a [1] A. Fritzon, et al., Protecting Europe’s Critical
dimensionless form. The next 𝜔 and values of 𝜔 , 𝜔 and Infrastructures: Problems and Prospects, J.
𝜔 , are also calculated, respectively. If 𝜔 > 𝜔 or 𝜔 = Contingencies Crisis Manag. 15(1) (2007) 30–41.
𝜔 , and 𝜔 > 𝜔 , proceed to step 4. Otherwise, the values are [2] L. Labaka, J. Hernantes, M. Sarriegi, A Holistic
reassigned to 𝜔 = 𝜔 , 𝜔 = 𝜔 . Go to step 4. Framework for Building Critical Infrastructure
Resilience, Technological Forecasting & Social
5. Prospects for further research Change, 103 (2016) 21–33.
[3] P. D. Wright, M. J. Liberatore, R. L. Nydick, A Survey
In further research, it is advisable to consider and improve
of Operations Research Models and Applications in
the solution of the problem described in this paper for other
Homeland Security, Interfaces, 36(6) (2006) 514–529.
classes of problems. In particular, it is promising to
[4] S. O. Johnsen, M. Veen, Risk Assessment and
formalize the described problem in other classes of
Resilience of Critical Communication Infrastructure
mathematical problems:
in Railways, Cognition Technology & Work, 15 (2013)
95–107.
Determination of the collective resultant ranking
[5] L. F. Gay, S. K. Sinha, Resilience of Civil Infrastructure
of all applications [45] based on individual
Systems: Literature Review for Improved asset
applications received from the QIS MQM centers,
Management, Int. J. Critical Infrastructures, 9(4) (2013)
i.e. formalization of the QIS system in ordinal
330–350.
scales.
[6] V. Hrechko, H. Hnatienko, T. Babenko, An Intelligent
Determination of the relative importance of
Model to Assess Information Systems Security level,
individual applications [46] from the QMS centers
Fifth World Conference on Smart Trends in Systems
in the form of normalized weighting factors—fixed
Security and Sustainability (WorldS4) (2021) 128–133.
or interval.
doi: 10.1109/WorldS451998.2021.9514019.
Formalization of the relative importance of [7] A. Fekete, K. Tzavella, R. Baumhauer, Spatial
individual applications from the QIS RMA centers Exposure Aspects Contributing to Vulnerability and
in the form of membership functions of a fuzzy set Resilience Assessments of Urban Critical
[47]. Infrastructure in a Flood and Blackout Context,
Clustering of applications received from the CMI Natural Hazards, 86 (2017) 151–176. doi:
centers and prioritization of the response of teams 10.1007/s11069-016-2720-3.
to the needs of the CMI centers [48]. [8] V. A. Zaslavskyi, O. A. Horbunov, The Type-Variety
Building a functionally stable QMS system, i.e. Principle in Ensuring the Reliability, Safety and
ensuring redundancy in the QMS system and its Resilience of Critical Infrastructures, Modern
reasonable use [49, 50]. Optimization Methods for Decision Making under
Introduction of the concept of criticality categories Risk and Uncertainty, CRC Press (2023) 245−274.
of CMI [51] and consideration of this indicator [9] E. D. Vugrin, et al., A Framework for Assessing the
when making decisions on the reliable and Resilience of Infrastructure and Economic Systems,
uninterrupted operation of CMI’s CMM [52]. Sustainable & Resilient Critical Infrastructure Systems
(2010) 77–116. doi: 10.1007/978-3-642-11405-2_3.
6. Conclusions [10] J. W. Herrmann, Using Operations Research Methods
for Homeland Security Problems. Handbook of
Thus, the paper considers the problems of ensuring the
Operations Research for Homeland Security,
functioning of the critical infrastructure system. The
International Series in Operations Research &
relevance of the study is due, in particular, to the massive
Management Science, 183 (2013) 1–24.
attacks on Ukraine's critical infrastructure during Russia’s
[11] D. Řehák, et al., Strengthening Resilience in the
large-scale aggression since February 2024. The paper
Energy Critical Infrastructure: Methodological
presents a mathematical model of the problem of
Overview, Energies, 15 (2022) 5276.
maintenance of a system of critical infrastructure facilities
[12] European Commission, 2020. Proposal for a Directive
developed by the authors. The authors propose a scheme for
of the European Parliament and of the Council on the
solving the problem of ensuring the operation of a system
Resilience of Critical Entities (COM/2020/829 final).
of critical infrastructure facilities. The procedures for
[13] Directive (EU) 2022/2557 of the European Parliament
finding a valid solution to the problem, searching for a
and of the Council of 14 December 2022 on the
reference solution to the problem, and algorithms for
Resilience of Critical Entities and Repealing Council
improving the reference solution in various variations are
Directive (2008/114/EC).
described. The problem statement and the mathematical
112
[14] G. Otto, et al., Parametric Model of a Laser with [27] Council Directive 2008/114/EC of 8 December 2008 on
External Distributed Feedback in the System of the Identification and Designation of European
Remote Measurement of Nanovibrations, in: Critical Infrastructures and the Assessment of the
Workshop on Cybersecurity Providing in Information Need to Improve Their Protection (2008).
and Telecommunication Systems, CPITS, vol. 3421 [28] D. Palko, et al., Determining Key Risks for Modern
(2023) 284–292. Distributed Information Systems, II International
[15] A. Zahynei, et al., Method for Calculating the Residual Scientific Symposium “Intelligent Solutions” IntSol-
Resource of Fog Node Elements of Distributed 2021, vol. 3018 (2021) 81–100.
Information Systems of Critical Infrastructure [29] UN News Global Perspective Human Stories. Ukraine:
Facilities, in: Workshop on Cybersecurity Providing in UN Condemns Latest Wave of Russian Attacks. URL:
Information and Telecommunication Systems, CPITS, https://news.un.org/en/story/2023/11/1143202#:~:text
vol. 3654 (2024) 432–439. =Russia%20has%20bombarded%20more%20than,coun
[16] H. A. Simon, The Structure of Ill Structured Problems, try%2C%20which%20reportedly%20resulted
Artificial Intelligence, 4 (1973) 181–201. [30] A. F. Voloshin, G. N. Gnatienko, The Problem of
[17] J. R. Grohs, et al., Assessing Systems Thinking: A Tool Maintenance of a Network of Communication
to Measure Complex Reasoning through Ill- Elements and an Algorithm for its Solution, Research
Structured Problems, Thinking Skills and Creativity, of Operations and Automated Control Systems 37
28 (2018) 110–130. doi: 10.1016/j.tsc.2018.03.003. (1991) 99–105.
[18] A. F. Voloshin, G. N. Gnatienko, E. V. Drobot, A [31] A. T. W. Chu, R. E. Kalaba, K. Spingarn, A
Method of Indirect Determination of Intervals of Comparison of Two Methods for Determining the
Weight Coefficients of Parameters for Metricized Weights of Belonging to Fuzzy Sets, J. Optimization
Relations Between Objects, J. Automation Inf. Sci. Theory Appl. 27(4) (1979) 531–538.
35(1–4) (2003). [32] T. L. Saaty, M. Sodenkamp, The Analytic Hierarchy
[19] Z. Wu, et al., Consensus Analysis for AHP and Analytic Network Measurement Processes: The
Multiplicative Preference Relations based on Measurement of Intangibles: Decision Making under
Consistency Control: A Heuristic Approach, Benefits, Opportunities, Costs and Risks, Handbook of
Knowledge-based Systems, 191 (2020) 105–137. doi: Multicriteria Analysis, Applied Optimization 103
10.1016/j.knosys.2019.105317. (2010) 91–166. doi: 10.1007/978-3-540-92828-7_4.
[20] S. Boz´oki, V. Tsyganok, The (Logarithmic) least [33] A. Bigdan, et al., Detection of Cybersecurity Events
Squares Optimality of the Arithmetic (Geometric) Based on Entropy Analysis, in: Proceedings of the 7th
Mean of Weight Vectors Calculated from All International Conference on Digital Technologies in
Spanning Trees for Incomplete Additive Education, Science and Industry (DTESI 2022), vol.
(Multiplicative) Pairwise Comparison Matrices, Int. J. 3382 (2022).
General Syst. 48(4) (2019) 362–381. [34] H. M. Hnatiienko, V. Y. Snytyuk, O. O. Suprun,
[21] J. Mazurek, K. Kułakowski, On the Derivation of Application of Decision-Making Methods for
Weights from Incomplete Pairwise Comparisons Evaluation of Complex Information System
Matrices via Spanning Trees with Crisp and Fuzzy Functioning Quality, Selected Papers of the XVIII
Confidence Levels, Int. J. Approximate Reasoning, 150 International Scientific and Practical Conference
(2022) 242–257. doi: 10.1016/j.ijar.2022.08.014. “Information Technologies and Security” (ITS 2018),
[22] M. Bohlouli, et al., Competence Assessment as an vol. 2318 (2018) 56–65.
Expert System for Human Resource Management: A [35] K. Kułakowski, D. Talaga, Inconsistency Indices for
Mathematical Approach, Expert Systems with Incomplete Pairwise Comparisons Matrices, Int. J.
Applications, 70(1) (2017) 83–102. General Syst. 49(2) (2020) 174-200, doi:
[23] H. Hnatiienko, V. Snytyuk, A Posteriori 10.1080/03081079.2020.1713116.
Determination of Expert Competence under [36] H. Hnatiienko, et al., Greenhouse Gas Emission
Uncertainty, Selected Papers of the 19th International Determination Based on the Pseudo-Base Matrix
Scientific and Practical Conference “Information Method for Environmental Pollution Quotas Between
Technologies and Security” (2019) 82–99. Countries Allocation Problem, in: IEEE 2nd
[24] S. Siraj, L. Mikhailov, J. Keane, A. Contribution of International Conference on System Analysis &
Individual Judgments Toward Inconsistency in Intelligent Computing (SAIC) (2020) 150–157. doi:
Pairwise Comparisons, European J. Operational Res. 10.1109/SAIC51296.2020.9239125.
242(2) (2015) 557–567. [37] S. Kubler, et al., Measuring Inconsistency and
[25] M. Brunelli, M. Fedrizzi, A General Formulation for Deriving Priorities from Fuzzy Pairwise Comparison
Some Inconsistency Indices of Pairwise Comparisons, Matrices using the Knowledge-based Consistency
Ann. Oper. Res. 274 (2019) 155–169. doi: Index, Knowledge-Based Systems, 162 (2018) 147–160.
10.1007/s10479-018-2936-6. doi: 10.1016/j.knosys.2018.09.015.
[26] O. Yu. Mulesa, Methods of Considering the Subjective [38] M. Palangetić, et al., A Novel Machine Learning
Character of Input Data in Voting, Eastern-European Approach to Data Inconsistency with respect to a
J. Enterprise Technol. 1(3(73)) (2015) 20–25. doi: Fuzzy Relation (2021).
10.15587/1729-4061.2015.36699. [39] O. F. Voloshyn, H. M. Gnatienko, A Software
Complex for Supporting the Coordination of
113
Decisions in a Two-Level Hierarchical Model for Resilience in the Built Environment, 6(2) (2015) 168–
Choosing the Mode of Operation of the 181.
Communication System, Bulletin of the Kyiv
University, 7 (1992) 19–24.
[40] L. Csat´o, L. R´onyai, Incomplete Pairwise
Comparison Matrices and Weighting Methods,
Fundamenta Informatica, 144(3–4) (2016) 309–320.
[41] R. Blanquero, E. Carrizosa, E. Conde, Inferring
e-Cient Weights from Pairwise Comparison Matrices,
Mathematical Methods of Operations Research, 64(2)
(2006) 271–284.
[42] Y. Koriyama, A. I. Ozkes, Inclusive Cognitive
Hierarchy, J. Economic Behavior Organization, 186
(2021) 458–480.
[43] T. L. Landes, P. D. Howe, Y. Kashima, A Hierarchy of
Mindreading Strategies in Joint Action Participation,
Judgment and Decision Making, 16(4) (2021) 844–897.
[44] V. V. Byts’, R. M. Zulunov, Specification of matrix
algebra problems by reduction, J. Math. Sci. 71 (1994)
2719–2726.
[45] O. Mulesa, et al., Information Technology for Time
Series Forecasting with Considering Fuzzy Expert
Evaluations, in: 12th International Scientific and
Technical Conference on Computer Sciences and
Information Technologies (2017) 105–108.
[46] H. Hnatiienko, et al., Mathematical Support of the
Task of Determining the Strategic Directions of
Development and Priorities of the Organization, in: 9th
International Scientific Conference “Information
Technology and Implementation”, vol. 3347 (2022)
169–184.
[47] O. Mulesa et al., A. Information Technology for Time
Series Forecasting with Considering Fuzzy Expert
Evaluations, in: 12th International Scientific and
Technical Conference on Computer Sciences and
Information Technologies (2017) 105–108.
[48] H. Hnatiienko, et al., Application of Cluster Analysis
for Condition Assessment of Banks in Ukraine, in: 8th
International Scientific Conference “Information
Technology and Implementation”, vol. 3179 (2022)
112–121.
[49] T. Babenko, H. Hnatiienko, V. Vialkova, Modeling of
Information Security System and Automated
Assessment of the Integrated Quality of the Impact of
Controls on the Functional Stability of the
Organizational System, in: Selected Papers of the XX
International Scientific and Practical Conference
“Information Technologies and Security” (2020), vol.
2859 (2020) 188–198.
[50] T. Babenko, H. Hnatiienko, V. Vialkova, Modeling of
the Integrated Quality Assessment System of the
Information Security Management System, in: 7th
International Conference “Information Technology
and Interactions”, vol. 2845 (2021) 75–84.
[51] T. Babenko, et al., Modeling of Critical Nodes in
Complex Poorly Structured Organizational Systems,
in: Information Society and University Studies, vol.
2915 (2021) 92–101.
[52] J. Matzenberger, et al., A Novel Approach to Assess
Resilience of Energy Systems, Int. J. Disaster
114