<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>W. Lihui. Smart manufacturing process and system automation - A critical
review of the standards and envisioned scenarios. Journal of Manufacturing Systems</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1016/j.procs.2022.10.079</article-id>
      <title-group>
        <article-title>Selection of models for operational management of hierarchically structured systems under threats⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Volodymyr Sabat</string-name>
          <email>v_sabat@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Tymchenko</string-name>
          <email>alextymchenko53@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Myroslava Kulynych</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kuhot</string-name>
          <email>v.kuhot@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavlo Hibey</string-name>
          <email>pavlo.hibey@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National University "Lviv Polytechnic"</institution>
          ,
          <addr-line>12, Stepan Bandera St., Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <volume>8</volume>
      <fpage>570</fpage>
      <lpage>576</lpage>
      <abstract>
        <p>Operational management of technological production processes in complex hierarchical systems and economic complexes in the event of emergencies and natural disasters is based on operational planning and supervisory synchronous control of all system components, human resources, and unorganized masses of people in a threatening situation. Such emergencies can also include the events taking place in Ukraine during the undeclared war and the full-scale invasion of Russia with the seizure of territories and critical infrastructure of our country. It is usually difficult to predict terrorist attacks by the aggressor country, which periodically launches missile and saber attacks on our critical infrastructure, but it is possible to accurately identify such facilities that have a complex hierarchical management system and require comprehensive protection systems against both natural disasters and air defense systems. The article is focused primarily on the development of models for the operational management of complex hierarchically structured systems in the face of threats associated with emergencies, while adhering to the strategies of a goal-oriented decision-making method in crisis conditions.</p>
      </abstract>
      <kwd-group>
        <kwd>Complex process management systems</kwd>
        <kwd>decision-making</kwd>
        <kwd>crisis management strategy</kwd>
        <kwd>threats</kwd>
        <kwd>risks1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The most important element of managing complex integrated facilities in a hierarchical organization
of the production process is to coordinate the technical level of management with the strategic level
for making decisions both operationally and at the terminal time cycle of the technological process.
The main problem of such systemic strategic and technical management of integrated structures (IS)
is the construction of models and algorithms for integrated management and action planning to
address target, current, and crisis situations. It is also important to increase the amount of knowledge,
especially in the event of critical situations for the management of hierarchical structures, as
described in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], where the authors use the general economic database of Brazil for modeling. In a
monograph devoted to modern technologies for designing automation systems for complex
hierarchical objects [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], in addition to the classical methods of diagnosis, forecasting, adaptation and
coordination, genetic algorithms and network structures, in particular, neural, hierarchical and fuzzy
hierarchical situational-event networks, are also considered.
      </p>
      <p>
        The problem of goal orientation in a hierarchical organization and the selection of decision
makers (leaders) is addressed in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], which focuses on the selection and training of decision makers
in crisis situations.
      </p>
      <p>
        The issue of integrating planning and control is based on the construction of conceptual models from
a set of components and the entire structure, which, accordingly, will be the basis for analyzing the
current dynamics and synthesizing goal-oriented strategies for the behavior of both the operator and
automated control systems in the context of identifying emergency risks [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4-6</xref>
        ].
      </p>
      <p>
        A methodology for assessing the risk of an emergency in the security system of the information
complex of printing enterprises was developed in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], based on categorical models of the structure
and dynamic state of hierarchical systems to identify attack factors and risks. The use of semantic
analysis of the document text in building risk models in the threat system is considered in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        The development of means of protecting complex hierarchical control systems is devoted to [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
for modeling the process of building a wireless network and evaluating the effectiveness of the
function of assigning a communication radius between individual nodes of a hierarchical control
structure; [10,11], which describes preventive means of detecting attacks on a hierarchical control
system and predicting emergency scenarios. Modern methods for analyzing general industrial
control systems for hierarchical technogenic structures are presented in [12,13].
      </p>
      <p>A decision support system for processing control decisions and decision makers is presented in
[14], a hybrid ontology for assessing security risks for industrial control systems is developed in [15],
a comparative study of methods for analyzing information security risks in complex hierarchical
structures is presented in [16], and a detailed analysis of threats to banking enterprises is conducted
in [17], and risk factors specific to each of the threats are identified.</p>
      <p>Article [18] presents a model of a dynamic and iterative process in which experts discuss a
multicriteria decision-making problem in complex management structures.</p>
      <p>However, a thorough systematic analysis of models of operational management of hierarchically
structured systems in the face of active threats of resource, information and cognitive types has not
yet been conducted. In the context of military operations, the importance and relevance of such
scientific research of complex hierarchical control systems in crisis situations is increasing, and the
choice of operational control models and the identification of factors influencing the control process
allows the development of new preventive information technologies to counteract external negative
factors. Taking into account previous studies of the complex of threats to complex hierarchical and
dynamic systems, the proposed models can be used to identify factors of influence at different levels
of the technological process hierarchy and create means to counteract external attacks on the control
system as a whole.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>A formalized description of the system should be built using the same type of mathematical
apparatus (graphs, operations research, game theory, and decision making), and combined
optimization algorithms should be used to dock it. Some models for solving the above problems have
been considered for simulation modeling systems based on the control of hypersonic vehicles to
determine the flight mechanics of GPSS [19].</p>
      <p>Integrated systems are characterized by an n-level hierarchical structure. For the operational
management of integrated automated control systems [IACS], a three-level system of strategic
planning and management is effective, namely:
•
•
•
situational level;
operational level of decision-making;
calendar level of planning the system's operation.</p>
      <p>At each level, the cycles and phases of the elements of planning and implementation of the
planned actions are identified, using the information base in a dialog mode. To ensure
decisionmaking procedures under conditions of uncertainty in targeted planning, the principle of consistent
disclosure of uncertainties and game situation models are used to simulate behavioral scenarios.
•
•
•
•
•
•
•
•
•
•</p>
      <p>The classical results were obtained in [20] in the form of complexes of mathematical models and
algorithms for multicriteria linear programming, taking into account resources and restrictions on
them. The procedure of multicriteria control coordinates the functioning of all levels of the system.</p>
      <p>The functional procedure for ranking local optimization criteria uses scale methods and
accelerated convergence methods in optimal decision-making algorithms, which is the basis for a
clear formalization of the management decision-making procedure in production conditions [21].</p>
      <p>Lower levels of IAS can be described on the basis of modification to the object of a dynamic
simulation model in both continuous and discrete mode, or in the form of piecewise linear automata
[22,23].</p>
      <p>At the level of operational management, multi-step integration procedures for assessing
situations (dynamic programming and statistical theory) are used, while</p>
      <p>The processes of planning and decision-making based on the choice of action algorithms are
revealed;
action models are deployed in time and space in accordance with targeted plans and
management strategies;
management processes are adjusted based on the operational information received;
a set of significant factors of influence and threats are identified and assessed.
•
•
simulation modeling of the IAS functioning, taking into account possible situations of failure
of the modes for which optimization and adaptation strategies of the structure are introduced;
Dynamic modeling of IACS is based on the digital representation of structure and dynamics
models (graphs, signals, structure, flows), which became the basis for creating high-level
modular models.</p>
      <p>The above-mentioned approaches are logically detailed models that are problem-oriented to solve
a set of tasks: analysis of the dynamics of material and information flows, integrated management
and action planning, and dispatch operational control.</p>
      <p>At the same time, an important problem remains the integration of the operator into the IAS
structure and into management and coordination processes. To solve this problem, two approaches
are substantiated:
determines the type of structure of the management object that is part of the system;
levels of management hierarchy are being formed;
management functions are defined;
methods and schemes for data exchange between levels are being developed;
classes of strategies for making targeted decisions are defined;
the types of data required for decision-making are highlighted;</p>
    </sec>
    <sec id="sec-3">
      <title>3. Materials and methods</title>
      <p>The effectiveness of controlling a technological system with a distributed energy-active structure
depends on the sequence of decisions in the dynamics of terminal time. Decision-making requires
information about the operational situation in real time, a forecast of the process in the system, and
data on past behavior (trends).</p>
      <p>Models such as GRRAY [24] use a hierarchy of decision centers. The information for them should
be hierarchically structured according to the levels of decision-making and with a certain level of
reliability to minimize the risk of making an incorrect decision.</p>
      <p>
        According to the above method, when synthesizing the structure of decision-making centers, it
is necessary to perform a sequence of procedures and operations in accordance with the targeting
strategy [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]:
•
•
•
define the boundaries of acceptable management decisions at different levels of the system
hierarchy;
define the rules of operation and exchange at different levels of the hierarchy;
      </p>
      <p>The dynamics of production processes is determined.</p>
      <p>Figure 1 shows a functional diagram of a hierarchical control system for a complex technogenic
complex under threats with the definition of the levels of control of the hierarchical structure.</p>
      <p>The efficiency of decision-making by the system is based on the use of sufficient and necessary
scientifically correct information both from the object about the situation in real time and from the
integrated database and knowledge. This information is divided into [25]:
current information that is received automatically;
information generated by the operator based on the analysis of data flows;
a priori information from the knowledge and data base;
the information is provided by the designer in diagrams, mnemonic diagrams, and
documentation;
the information is processed and archived by the operator, which requires the elasticity of
adaptive signal and data processing structures, their algorithmic and software.</p>
      <p>Notation in Fig. 1:   - levels of management of the hierarchical structure;   ,  
- factors of
action of information and technical threats, respectively; 
(  ) - strategic management goals;
  - local management goals; ІЗ - information threats to the management process; 

- cognitive
information agent (decision maker in crisis situations); {   (
 )} - management teams;

 
 ⁄ 
- data exchange process control kernel;  
- parameters of the system state and
production system; ACS - automated process control system.
operating modes;   ,   - control of the organization of the technological process and intermediate
stages of production, respectively;   - decision-making; {  } - a set of threats affecting the</p>
      <p>According to the requirements of decision-making procedures, information in data streams is
classified [26]:
a set of information in arrays and data streams, documents, signals;
methods of organizing, structuring, and storing data arrays;
operational data: administrative, economic, technological, regulatory;
information on the functional relationships of the system elements and blocks;
logical and mathematical elements of decision-making procedures (logic of decisions and
actions);
algorithms).
prompt display of information about the system status and the progress of processes;
methods of storing control programs (models of strategies and tactics of targeted actions of
information on the structure and characteristics of the components of the control object (CO)
(link graphs, channels, sensors, flows);
information on the dynamics of the MA and ACS;
information about the external environment, its parameters and characteristics;
information about disturbances and threats;
information on the objectives of the MA and ACS, quality criteria and limitations;
information on permissible and optimal strategies for planning and managing actions under
conditions of uncertainty of performance criteria and information about the impact of threats
and disturbances.</p>
      <p>
        When making targeted decisions, situations arise when there is insufficient information about
the behavior of the system as a whole. Unpredictable stochastic threats arise, and active elements
(persons) with regulated freedom of action and behavior in making non-standard decisions and
performing actions intervene in the control system. In such cases, the classical theories of probability,
games, optimal control, identification, and adaptation do not provide the appropriate logic for action
planning. Therefore, for such cases of management in IASU, it is important to form the appropriate
information support, which includes [
        <xref ref-type="bibr" rid="ref5 ref7">5,7</xref>
        ]:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
      </p>
      <p>
        The target picture of the system [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] is formed on the basis of the normative-algorithmic model
[NAM] as a set of information model of the control object and algorithms for data processing and
management decision-making consistent with the organizational structure.
      </p>
      <p>Normative-algorithmic management models with organizational structure. The NAM model
reflects the processes occurring in the object and the management system with sufficient accuracy
to achieve the goals. The NAM defines the mechanism (logical and mathematical) of the management
system functioning as a team of decision makers who implement the normative technology and
algorithm for achieving management goals in a hierarchical structure.</p>
      <p>The information and organizational structure of the NAM includes the following components:
schemes of control loops for the implementation of processes (logical and mathematical);
decision-making and processing of details;
•
diagrams of typical organizational structures;
technological route cooperation maps of algorithms for performing management actions;
organizational scientific and technical documentation;
mathematical models for optimizing functional, algorithmic, organizational and
technological structures of objects and control systems;
logical and mathematical models of management processes and algorithms for solving
management problems (strategies).</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental research</title>
      <p>
        The expert representation of the hierarchical level of management within the formed knowledge
base is as follows [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
      </p>
      <p>M[DS]R=h = Bek(P, th) ⊗ Bek(U, th) ⊗ Bek(t, tn−1) ⊗ Bek(S, tn), K ∈ Nn (1)
where (p, u, d, s) are variables in the planning and management processes at level h with the
volume of elements,   ⊗ are communication operators,    (∗) are operators for describing
elements in the linguistic base of the expert system,  [ ] =ℎ is a model of a dynamic system of
level h.</p>
      <p>
        The planning process operators for the level n phase are displayed in the form [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]:
∃ = ℎ:  ⃗ ,  ⃗
      </p>
      <p>→  ⃗:   [ ℎ] = П {  [ ℎ]},   ( ℎ),   ( ℎ+1),   ( ℎ),  ∗( ℎ)
where Пk is the vector-function of the planning procedure,   ,   is the planning components
with bounde drı ∈ Rk, nk is the parameter matrix, (X⃗, Z⃗) is the input and state vectors of the system
at the h-level.</p>
      <p>
        Output vector Y⃗ reflects the implementation of the control plan [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ] Y⃗[tn] = Pk[tn], i.e., the
functional planning procedures are performed by the operator based on information about the
system state:
(2)
(3)
(4)
(5)
  [ ℎ],   [ ℎ],   [ ℎ+1],    [ ℎ] 
(  ) →    ℎ →  ℎ+1/  
where Pck is a set of expert system tips.
      </p>
      <p>The linear operators of the plan's links by levels of the system hierarchy are determined based on
the representation:
  [ ℎ+1] =   +1  +1[ ℎ+1]
  [ ℎ] =      ℎ/ ℎ−1,ℎ+1
where λk+1 = quasidiag ⊗ λ1k … λn</p>
      <p>k is the block-diagonal matrix of connections in the system
structure at the k-level.</p>
      <p>
        The local element of planning control actions can be expressed as a model [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>Notation in Figure 2: Alg PL - algorithm of the unit structure functioning; Zı - parameter of the unit's
operating mode; Pmk - information input; Ki - coefficients of influence on the unit's mode; Xmı
operator of information data processing; πin = quasidiag ⊗ πln … πnm operator of horizontal links
presented in the form of a block matrix, responsible for generating data on the system state; Dn
operator of generating parameters for controlling the unit's mode.
4.1. Results
The equation of system dynamics in the mode of targeted planning can be expressed as a differential
time representation in the space of object states.
(6)
(7)
(8)
(9)
(10)
(11)
The model of control actions can be specified in the form:</p>
      <p>=  0( ,  ̅,  )⋁( ) +  0( ,  ̅,  )
∀ ∈ [ 0,  1] ⊂   :  0  ( ),  ( ),  ( ) =</p>
      <p>0[ ( ),  ( ),  ( )] 
 1
 0
programming method.
vector; I(t) - objective function (target area).
where A, B0, F0 - matrix structural functions; X, Y - vectors of states of elements of level K; U - control
We find the control of U(t) ⊂ strat(u/ci) based on the Pontryagin-Belman dynamic
Accordingly, the operators of the technological link in the structure of the process control system
are expressed in the form of matrix equations for state and control.</p>
      <p>( 0) =    0( 0) +   10( 0);
  0( 0) =    0( 0) +   10( 0);
  (  ) =   ( 0) + (  (  ),   (  ));
  (  ) =     (  ),   (  ),   (  ),   (  ) ,
and disturbances.
two phases:
where (g, H, L, M) - structural matrices; Pk(</p>
      <p>) - action plan; Uk( ) - management.</p>
      <p>Based on the foregoing, it follows that an important feature of operational planning and
management is a limited time limit for making and implementing decisions regarding the target in
the event of unpredictable changes in the state of the system and object under the influence of threats</p>
      <p>The smallest element of the production process is an operation, and its implementation requires
the availability of an operation object and resources, as well as additional information about the logic
of the operational cycle. In other words, operational management according to the above consists of
•
•
planning targeted actions;
real-time action management.</p>
      <p>A generalized description of an operation of type j is an expression:</p>
      <p>Ajop(Ulm=1) = rj, Ωj−, Ωj+| A lg Ωj− → Ωj+ , (12)
where Ajop - active operation; rj - resource type; Ωj+ - operation resources; A lg () - transformation
algorithm for performing the operation; Ulm=1 - command to start actions.</p>
      <p>In this representation, the model of processes in the system will be a grid of operational actions
(Figure 3).</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>The paper solves the scientific and applied task of developing a methodology for selecting and
building models of the structure of hierarchical control systems for complex anthropogenic objects
in the face of threats and attacks based on the use of categorical representations of system dynamics
in the mode of targeted planning. The possibility of determining the strategic and technical levels of
the hierarchy of management of a technogenic system on the basis of the proposed functional
diagram of a hierarchical management system of a complex technogenic complex under threats is
substantiated.</p>
      <p>The scientific novelty of the study is as follows:
•
the categorical representation of the model of local targeted actions for controlling the
energy-active unit of a technological system based on the algorithm of the functioning of the
unit structure and the operator of forming the parameters for controlling the unit mode was
improved;
for the first time, a functional diagram of a control system for a complex technogenic complex
under threats has been developed with the definition of levels of management and control of
the technological process parameters of the production structure;
categorical representations of the system process model in the form of diagrams of
operational data processing and decision-making in the block structure of a complex object
with channels for information and management flows and the negative impact of threats on
the management process are proposed.</p>
      <p>The practical significance of the results obtained is that the proposed method of identifying
threats at the hierarchical levels of management of complex technogenic processes allows
determining the risk of emergencies and, accordingly, carrying out operational management in
solving decision-making tasks to prevent crisis situations.</p>
      <p>Further study of the problem is seen in improving the protection of complex hierarchical systems
and assessing the risk of their functioning under the influence of active threats.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lawrense</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Poliquin</surname>
          </string-name>
          .
          <article-title>The growth of hierarchy in organizations: Managing knowledge scope</article-title>
          .
          <source>Strategic Management Journal. V</source>
          .
          <volume>44</volume>
          /13 (
          <year>2023</year>
          ):
          <fpage>3155</fpage>
          -
          <lpage>3184</lpage>
          , doi:10.1002/smj.3539.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>F. J.</given-names>
            <surname>Folgado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Calderón</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. González</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Calderón</surname>
          </string-name>
          .
          <article-title>Review of Industry 4.0 from the Perspective of Automation and Supervision Systems: Definitions, Architectures and Recent Trends</article-title>
          .
          <source>Electronics</source>
          <volume>13</volume>
          ,
          <issue>782</issue>
          (
          <year>2024</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>33</lpage>
          , doi:10.3390/electronics13040782.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E.</given-names>
            <surname>Alston</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Alston</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Mueller</surname>
          </string-name>
          .
          <article-title>Leadership Within Organizational Hierarchies</article-title>
          .
          <source>SSRN Electronic Journal</source>
          . (
          <year>2021</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>46</lpage>
          , doi:10.2139/ssrn.3549964.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Manning</surname>
          </string-name>
          .
          <article-title>Strategic Planning in Emergency Management: Evaluating the Impacts on Local Program Quality</article-title>
          . Research, Publications &amp; Creative Work.
          <volume>92</volume>
          . https://digitalcommons.jsu.edu/fac_res/92.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sabat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Durnyak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kulylnych</surname>
          </string-name>
          , Yu. Lozynskyi,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hibey</surname>
          </string-name>
          .
          <article-title>Decision-making support of emergency risk identification in complex hierarchical control systems</article-title>
          .
          <source>ICyberPhyS-2024: 1st International Workshop on Intelligent &amp; CyberPhysical Systems</source>
          , June 28,
          <year>2024</year>
          , Khmelnytskyi, Ukraine,
          <year>2024</year>
          ,
          <volume>3736</volume>
          , pp.
          <fpage>223</fpage>
          -
          <lpage>238</lpage>
          . https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3736</volume>
          /paper17.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Veloni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Miridakis</surname>
          </string-name>
          .
          <source>Digital Control Systems Theoretical Problems and Simulation Tools</source>
          . CRC Press,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sabat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Sikora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Durnyak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Matsiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hibey</surname>
          </string-name>
          .
          <article-title>Methods for assessing the risk of an emergency in the security system for the information complex of printing enterprises</article-title>
          .
          <source>IntelITSIS'2024: 3rd International Workshop on Intelligent Information Technologies and Systems of Information Security. Khmelnytskyi</source>
          ,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          , V.
          <volume>3675</volume>
          (
          <year>2024</year>
          ):
          <fpage>305</fpage>
          -
          <lpage>317</lpage>
          , https://ceurws.org/Vol-
          <volume>3675</volume>
          /paper22.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sabat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Durnyak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kulynych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Havrylyshyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hibey</surname>
          </string-name>
          .
          <article-title>Using semantic analysis of document text in building risk models in the threats system</article-title>
          .
          <source>IntelITSIS'2024: 3rd International Workshop on Intelligent Information Technologies and Systems of Information Security. Khmelnytskyi</source>
          ,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          , V.
          <volume>3675</volume>
          (
          <year>2024</year>
          ):
          <fpage>330</fpage>
          -
          <lpage>342</lpage>
          , https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3675</volume>
          /paper24.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>B.</given-names>
            <surname>Durnyak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Havrysh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Tymchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zelyanovsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Tymchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Khamula</surname>
          </string-name>
          .
          <article-title>Intelligent System for Sensor Wireless Network Access</article-title>
          .
          <source>Modeling Methods of Network Construction, IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACSSWS)</source>
          , Lviv, Ukraine, (
          <year>2018</year>
          ):
          <fpage>93</fpage>
          -
          <lpage>97</lpage>
          , doi:10.1109/IDAACS-SWS.
          <year>2018</year>
          .
          <volume>8525792</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>