<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Tryhuba);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>An intelligent Model for Identifying Risks of Power Supply Projects for Critical Infrastructure Facilities in the Conditions of Emergency and Martial Law</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Аnatoliy Тryhuba</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Inna Тryhuba</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roman Oliinyk</string-name>
          <email>romanoliynuk1395@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Andrushkiv</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marian</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kotsylovskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv National Environmental University</institution>
          ,
          <addr-line>1, V. Velykoho str., Dubliany-Lviv, 80381</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv State University of Life Safety</institution>
          ,
          <addr-line>35, Kleparivska str., 79007, Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>A substantiated method is presented for assessing risks associated with energy supply initiatives targeting critical infrastructure. The foundation of the proposed model lies in the integration of spatial data, enabling the quantification of threat influence through numerical values that reflect both their likelihood and intensity. The use of geoinformation sources, in particular OpenStreetMap, combined with the flexibility of the Python toolkit, ensures the efficiency and relevance of the information obtained. Based on the use of the developed model and the created program code, highrisk areas for energy supply projects for critical facilities in the Zaporizhzhia region were identified. It was found that Enerhodar and Zaporizhzhia have the highest risk values (R1=11.4 and R2=10.8, respectively), which corresponds to a high-risk area. These territories contain strategic critical infrastructure facilities (Zaporizhzhia NPP) and have a high density of industrial facilities exposed to military attacks. The results are visualized and classified by risk level. Further research should be conducted in the direction of integrating the proposed model into a management decision support system. This will ensure automated risk identification and visualization of risk zones on maps.</p>
      </abstract>
      <kwd-group>
        <kwd>Intelligent model</kwd>
        <kwd>risk identification</kwd>
        <kwd>energy supply</kwd>
        <kwd>infrastructure</kwd>
        <kwd>decision</kwd>
        <kwd>system</kwd>
        <kwd>project</kwd>
        <kwd>management</kwd>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Currently, the stable functioning of critical infrastructure facilities depends on the effectiveness of
project management and, in particular, the management of risks associated with their energy supply
[1-4]. This issue is especially relevant in the context of a state of emergency and martial law, when
traditional sources of power supply are damaged and logistics routes are disrupted. Unlike standard
approaches to risk management in energy projects, the risks of power supply to critical
infrastructure facilities have a number of specific features. In particular, it is crucial to continuously
observe and consider the evolving conditions surrounding the project environment [5-8]. This
includes external threats, the state of the transport network, and dynamic changes in a number of
factors that determine the effectiveness of critical infrastructure energy supply projects during a
state of emergency and martial law.</p>
      <p>The proposed risk management model for critical infrastructure energy supply projects is
an intelligent type. It involves the integration of modern technologies that ensure the adaptation
of risk management processes to dynamic changes in the project environment (network
destruction, logistics constraints, security threats) [9-12]. This method rejects traditional static
risk assessment practices and instead incorporates real-time data on the operational status of
energy infrastructure components.</p>
      <p>One of the distinctive aspects of the model is its reliance on geospatial information derived
from sources such as OpenStreetMap (OSM) and Google Earth Engine [13-15]. These platforms
provide current spatial data, enabling the construction of a comprehensive risk landscape.
Through this data, it becomes feasible to pinpoint damaged infrastructure zones, evaluate the
accessibility of transport pathways, and highlight regions exposed to elevated risk.
Consequently, strategic decisions regarding the development and deployment of energy supply
initiatives are made with full awareness of the fluid and unstable conditions within the project
environment, including shifts in external threat levels and internal resource limitations.</p>
      <p>In addition, the model takes into account the specifics of critical infrastructure power supply
projects in emergency and military conditions. This necessitates a flexible response from project
managers, prompt adjustment of management decisions on the implementation of backup
power sources, re-planning of resource supply, and prioritization of damaged network
restoration scenarios.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysing the State of the Art in the Research Area</title>
      <p>Contemporary research on risk management in energy provision for critical infrastructure
demonstrates a growing academic focus on enhancing the safety, flexibility, and robustness of
such systems under conditions of heightened and dynamic threats. An analysis of the available
literature leads to the conclusion that the dominant approaches are those that prioritize the
integration of information technology into risk management processes, in particular, through
the application of flexible management frameworks that incorporate real-time variations in
environmental conditions [16-20].</p>
      <p>The ISO 31000 standard outlines the fundamental principles of risk management and serves as a
foundational guideline for the development of risk management frameworks across numerous
nations [21]. The main provisions of ISO 31000:2018 define the principles, framework, and processes
of risk management that can be adapted to the specifics of energy projects. The standard emphasizes
the need for a systematic approach to risk assessment, which includes the identification, analysis,
evaluation, and monitoring of risks at all stages of the project life cycle. At the same time, the
application of the provisions of ISO 31000 in a state of emergency or martial law requires
modification, as the standard is focused on stable project conditions and does not take into account
the specifics of a changing project environment and critical threats. That is why several authors
propose to adapt the provisions of the standard to the conditions of a changing project environment.
This may be achieved by embedding advanced information technologies for spatial data forecasting
and analysis into innovative risk management frameworks, which remain a focal point of ongoing
scholarly discourse in the domain of project management [22-26].</p>
      <p>The PMBOK Guide, developed by the Project Management Institute (PMI), is a well-established
standard in the project management discipline [27]. Its most recent versions, particularly the sixth
and seventh editions, highlight the importance of risk-related practices as a core knowledge area.
These practices encompass the planning of risk strategies, identification of potential threats, both
qualitative and quantitative assessments, development of mitigation plans, and continuous oversight
of risk factors. Nevertheless, experts note that the conventional framework presented in the PMBOK
does not fully address the complexities inherent in managing projects under crisis conditions, where
the scope and nature of risks are subject to rapid and unpredictable changes. As such, there is a
pressing need to modify the PMBOK’s process model by incorporating real-time data processing
techniques, including the application of satellite-based imagery, geographic information systems
(GIS), and advanced predictive algorithms.</p>
      <p>In addition, in the context of risk management, it is advisable to take into account the
provisions of ISO 22301 on business continuity management [28]. However, similar to ISO 31000
and PMBOK, this standard needs to be adapted to the emergency conditions of martial law,
which necessitates further research in the direction of integrating these approaches with
modern IT risk management tools.</p>
      <p>Papers [29-33] propose a conceptual framework for risk management in the energy sector
based on a systematic approach and providing for the formalization of the processes of
collecting and processing information about the project environment. Paper [34] substantiates
the feasibility of using a multi-level risk management system that allows for both strategic and
operational control over the state of critical infrastructure.</p>
      <p>Particular emphasis should be placed on the legislative basis governing the protection of critical
infrastructure. In Ukraine, the Law “On Critical Infrastructure” [35] establishes the principal legal
provisions for ensuring the security and functioning of key infrastructure assets. However, the
current legislation does not yet contain specific mechanisms for integrating modern IT solutions for
automated risk identification and management, which creates a certain gap between theoretical
developments and practical implementation [36-38].</p>
      <p>In summary, the review of recent research indicates a clear shift away from static approaches
to project risk management toward more adaptive systems that leverage information
technologies for continuous monitoring and real-time analysis of critical infrastructure
conditions. Simultaneously, there remains a significant demand for the advancement of tools
that can consolidate data from diverse sources to enable timely risk evaluation and forecasting,
thereby underscoring the importance of continued investigation in this domain.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Objectives of the Study</title>
      <p>The purpose of the article is to substantiate an approach and a model for identifying risks of
energy supply projects for critical infrastructure facilities in the context of emergency and
martial law based on the use of geospatial data processing tools and modern information
technologies. The proposed model involves the integration of data from open sources, in
particular OpenStreetMap (OSM), to assess the condition of energy infrastructure facilities, as
well as the use of machine learning algorithms for real-time risk analysis. To achieve this goal,
the study used Google Earth Engine software and the Overpass API using the Overpass QL
query language, as well as Python tools for data processing and model building in the Jupyter
Notebook environment.</p>
      <p>In order to realize the research aim, the study addressed several key tasks:</p>
      <p>– to substantiate the approach and model for identifying risks of critical infrastructure
energy supply projects based on the analysis of geospatial data in the conditions of emergency
and martial law;</p>
      <p>– based on the developed model, to identify high-risk areas for critical infrastructure energy
supply projects in the conditions of emergency and martial law.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Substantiation of an Approach and Model for Identifying Risks</title>
      <p>of Critical Infrastructure Energy Supply Projects Based on</p>
    </sec>
    <sec id="sec-5">
      <title>Geospatial Data Analysis in the Context of Emergency and</title>
    </sec>
    <sec id="sec-6">
      <title>Martial Law</title>
      <p>In the current conditions of Ukraine's development, where there are emergencies and martial law in
some areas, there is a problem of reliable energy supply to critical infrastructure facilities [39-40].
Addressing this issue requires the initiation of energy supply projects aimed at supporting critical
infrastructure. During their execution, a key scientific and practical challenge emerges – the need
for robust risk management strategies. Given the dynamic nature of the project environment, it is
essential to apply a risk identification approach that reflects the unique characteristics of geospatial
information and the presence of military threats.</p>
      <p>The methodology outlined in this study relies on evaluating the condition of the project
environment for energy supply initiatives involving critical infrastructure by combining
geospatial datasets with insights into potential hazards and system vulnerabilities. Figure 1
presents the core elements of the proposed model for identifying risks in such projects.</p>
      <p>The first phase involves gathering and preprocessing geospatial information, which serves
as the foundation for constructing a risk identification model related to energy provision for
critical infrastructure. Relevant data for the target area are obtained from sources such as: 1)
geographic information systems (GIS); 2) open-access platforms like OpenStreetMap and
Google Earth Engine. This stage starts with compiling spatial datasets, which may be formally
represented as a set of:</p>
      <p>
        D = d1, d2 ,..., dn ,
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
where D – a set of geodata on infrastructure objects, dі – a single critical infrastructure object
(coordinates, condition, type of object).
      </p>
      <p>
        Subsequently, the collected data undergo a preprocessing phase that encompasses noise
elimination, image adjustment, and transformation into a unified coordinate reference system.
This stage can be mathematically described by the following preprocessing function:
D = Fprep (D) ,
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
where D – processed data set; Fprep – preprocessing operator (geometric and radiometric
correction).
      </p>
      <p>To identify energy infrastructure objects, a classification based on spectral features is used.
The classification task is formalized as a function:</p>
      <p>
        C = f ( D ') , (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
where C = c1,c2 ,...,cm – is a set of classified critical infrastructure objects; f – is a
classification algorithm (e.g., maximum likelihood or neural network).
      </p>
      <p>After identifying the relevant objects, they are incorporated into a geographic information
system (GIS) to enable subsequent analytical procedures. Comparison between these objects is
carried out through a spatial matching (joining) operation:</p>
      <p>
        S = G (C, L) , (
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
where S – integrated map; L – layers of additional data (population, hazardous objects,
damage), G – spatial joining operator.
      </p>
      <p>Thus, the formalisation of the data collection and processing process allows for the
integration of various data sources that form a database for further risk assessment in critical
infrastructure energy supply projects.</p>
      <p>The next stage involves the identification of potential threats, which is an important process
in the risk analysis of critical infrastructure power supply projects. This stage involves the
systematization and processing of information on all possible factors of the project environment
that affect the stability of the power grids and the creation of threats during their operation in
a state of emergency or martial law. For this purpose, the spatial and temporal characteristics
of threats are formalized. All identified potential threats are collectively represented as the
following set:
 P1   I1
(x1,  y1) ttime </p>
      <p>1
(x2 ,  y2 ) t2time  ,</p>
      <p>
        T = t1,   t2    , ... ,   tm , (
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
where T – is a set of types of threats (military operations, terrorist attacks, natural disasters,
etc.); tі – is a refers to an individual threat element defined by attributes such as spatial position
( xi , yi ) , threat intensity ( Ii ) , probability of occurrence ( Рi ) , and time parameter (titime ) .
      </p>
      <p>The magnitude of a current threat is expressed mathematically as a function dependent on:</p>
      <p>
        Ii = f ( Ai ,   Di ) , (
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
where Ai – represents the geographical region impacted by the threat; Di – denotes the spatial
density of critical infrastructure elements within the affected zone.
      </p>
      <p>A spatio-temporal matrix M is computed for each threat category, capturing its distribution
across space and time, and is structured as follows:</p>
      <p>
        M =  P2   I2 (
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
Pm   Im   (xm ,  ym ) tmtime 

      </p>
      <p>The collected data are incorporated into a geographic information system (GIS) to enable
spatial representation. Incorporating temporal attributes facilitates the prediction of
fluctuations in threat intensity and their geographic spread over time. Thus, this stage provides
a comprehensive understanding of risk zones and creates a basis for further vulnerability
assessment of energy facilities.</p>
      <p>The subsequent phase involves assessing the vulnerability level of each critical infrastructure
object, as previously identified, in relation to possible threats. This takes into account the set of
technical characteristics of the facilities, their physical condition and spatial location relative to
high-risk areas. The level of vulnerability associated with a critical infrastructure facility can be
expressed through the function:</p>
      <p>
        Vi = f (Ci , Si , Li ) , (
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
where Vi – is the vulnerability index of the i-th critical infrastructure facility; Ci – the technical
attributes of the critical infrastructure object, such as its capacity, substation classification, and
presence of auxiliary power sources; Si – the present condition of the critical infrastructure
unit, characterized by factors such as the degree of physical wear and extent of structural
damage; Li – the spatial positioning of the critical infrastructure facility, taking into account
its proximity to hazard zones and ease of logistical access.
      </p>
      <p>For each critical infrastructure facility, a vector of its main characteristics is formed:</p>
      <p>
        Xi = [Ci , Si , Li ] . (
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
      </p>
      <p>Vulnerability is normalised according to a scale from 0 to 1, where 1 means maximum
vulnerability and 0 means no vulnerability. A weighted evaluation approach is applied and can
be mathematically expressed in the following form:</p>
      <p>C S L</p>
      <p>
        Vi = wc  Cmiax + ws  Smiax + wl  Lmiax . (
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
where wc , ws , wl – corresponding weighting factors that represent the influence of individual
elements within the project environment.
      </p>
      <p>Numerical evaluation of critical infrastructure vulnerability makes it possible to determine
which facilities demand urgent protective measures or upgrades. This is the basis for making
management decisions to reduce risks in critical infrastructure energy supply projects [41-43].</p>
      <p>The following phase focuses on modeling risks associated with the execution of power
supply projects for critical infrastructure. This stage is the basis for making informed
management decisions to reduce risks. At this stage, we quantify the probability of negative
events and determine their consequences for energy infrastructure facilities based on previously
collected data on threats and vulnerabilities.</p>
      <p>Risks are structured using a conventional framework that incorporates three core elements:
the likelihood of a threat occurring, the vulnerability of the critical infrastructure asset, and the
magnitude of possible consequences. The overall risk level for the i-th facility is calculated as
follows:
represents the vulnerability score assigned to that specific facility; Ci – is the scope of possible
consequences (economic losses, loss of critical resources, impact on the population, etc.)</p>
      <p>The likelihood of a threat materializing is estimated using historical records, expert
assessments, or machine learning techniques, with consideration given to both spatial and
temporal aspects of the project context. For instance, in the case of facilities situated within
zones of ongoing military conflict, the probability approaches a value of 1.</p>
      <p>The evaluation of consequences Ci is determined by factors such as the operational
performance of the critical infrastructure facility, its significance within the energy network,
and the costs associated with its restoration. The value Ci is normalised for ease of comparison:
maximum possible losses in the power system.</p>
      <p>The final phase of the risk identification procedure entails a structured analysis of risks
influencing the execution of energy supply projects for critical infrastructure. This includes
evaluating their impact on key project parameters such as timeline, financial resources, service
quality, and operational safety. The identification process is grounded in the outcomes of prior
modeling efforts. For each specific infrastructure facility, risk determination is conducted
according to the following conditions:</p>
      <p>1, якщо Ri  Tcrit .</p>
      <p>Riski = 
0, якщо Ri  Tcrit
(13)
where Ri – is the risk level of the i-th critical infrastructure facility determined at the previous
stage; Tcrit – is the critical risk threshold, exceeding which requires management interventions
in project implementation.</p>
      <p>Once risks have been identified, a dedicated risk matrix is created for each facility, outlining
the nature of the risk, its origin, severity level, and a concise summary of its potential influence
on project execution. This matrix serves as a foundation for constructing an appropriate risk
mitigation strategy. Therefore, the concluding phase of the risk identification model delivers
organized input essential for formulating comprehensive risk management plans in the context
of critical infrastructure energy supply projects.</p>
    </sec>
    <sec id="sec-7">
      <title>5. Outcomes of Detecting High-Risk Zones for Energy Supply</title>
    </sec>
    <sec id="sec-8">
      <title>Projects Aimed at Critical Infrastructure Under Emergency and</title>
    </sec>
    <sec id="sec-9">
      <title>Wartime Conditions</title>
      <p>By applying the developed model, it was possible to determine areas with elevated risk levels
for energy supply projects supporting critical infrastructure during conditions of emergency
and martial law. To identify high-risk areas, we collected and processed geospatial data using
OpenStreetMap, which contains information on the location of energy infrastructure facilities,
transport networks, and other important elements. In addition, high-resolution satellite imagery
was obtained using Google Earth Engine, which made it possible to assess the current state of
the territories and identify potential threats, such as war zones, damaged facilities, and other
risk factors for critical infrastructure power supply projects.</p>
      <p>The developed code serves as the informational foundation for generating an interactive map
of risk areas, facilitating the detection of potential threats to power supply projects targeting
critical infrastructure during emergency and wartime scenarios. This solution was implemented
using Python within the Jupyter Notebook environment—one of the most widely adopted
platforms for spatial data processing, analytical computations, and data visualization (Fig. 2).
The core library employed in the implementation is Folium. It allows for the integration of
geospatial data from open mapping sources, including OpenStreetMap, and provides ample
opportunities for creating interactive maps with various graphic elements.</p>
      <p>The information component of this solution is a structured presentation of risk zones by
level (high, medium, low) with a clear geographical location of each event. This allows you to
visualize not only the location of threats but also their level of danger to critical infrastructure.</p>
      <p>Functionally, the Folium library allows integration with other Python libraries, such as
Pandas for tabular data processing, NumPy for mathematical calculations, and GeoPandas for
advanced work with geospatial data. This lays the groundwork for advancing the model further,
such as incorporating big data analytics, applying machine learning techniques for forecasting
risks, and building a system capable of automatically refreshing threat-related information
[4445].</p>
      <p>Using the developed model adapted to the context of the Zaporizhzhia region, a spatio-temporal
matrix of threats affecting energy supply projects for critical infrastructure was constructed (see Table
1).</p>
      <p>The analysis of the spatio-temporal threat matrix for critical infrastructure energy supply
projects in Zaporizhzhia region shows the presence of both man-made and natural threats with
different levels of intensity, spatial coverage, and density of impact. The most critical man-made
threat is the potential hazard associated with the location of Zaporizhzhia NPP in the city of
Enerhodar (coordinates 47.5083, 34.5844). The area of influence of this threat is 15 km², with a
density of 0.8 units per square kilometer, which in total forms 12 conditional threat units. The
impact factor is 0.95, which indicates an extremely high risk to infrastructure facilities in the
event of an accident or attack on the plant. This threat is relevant as of May 1, 2024.</p>
      <p>In general, man-made hazards have higher impact factors (0.90-0.95) and concentrated
hazards with a smaller area, while natural hazards, despite covering a larger area, demonstrate
lower intensity and impact factors (0.60-0.80). This indicates the need to prioritize the protection
of facilities located near critical man-made centers, as well as to develop preventive
environmental measures to reduce long-term risks from natural hazards.</p>
      <p>Zaporizhzhia NPP</p>
      <p>(Enerhodar)
2 Technogenic Industrial plant attack</p>
      <p>(Zaporizhzhia)
3
4
5
6</p>
      <p>Natural</p>
      <sec id="sec-9-1">
        <title>Natural</title>
      </sec>
      <sec id="sec-9-2">
        <title>Natural</title>
      </sec>
      <sec id="sec-9-3">
        <title>Natural</title>
      </sec>
      <sec id="sec-9-4">
        <title>Wildfires in Pology district</title>
      </sec>
      <sec id="sec-9-5">
        <title>Wildfires in Vasylivka district</title>
      </sec>
      <sec id="sec-9-6">
        <title>Wildfires in KamiankaDniprovska forest zone</title>
      </sec>
      <sec id="sec-9-7">
        <title>Drying of Velyki Kuchuhury wetlands (47.5083, 34.5844)</title>
        <p>12
18
18
20
15</p>
        <p>
          The dataset presented in Table 1 is incorporated into the risk identification model's code to
enable subsequent spatial visualization of threats associated with critical infrastructure energy
supply projects. Using the results derived from formulas (
          <xref ref-type="bibr" rid="ref10">10–12</xref>
          ), the key attributes of high-risk
zones within the Zaporizhzhia region have been identified, and these findings are summarized
in Table 2.
        </p>
        <p>The risk level was computed as the product of threat intensity and its associated probability
Pi , previously established within the spatio-temporal matrix. Threshold values were defined as
follows high risk is – Ri  10 , medium risk is – 6  Ri  10 , and low risk is – Ri  6 .</p>
        <p>Based on the data obtained and calculations made, a map was created that shows high-risk
areas for critical infrastructure energy supply projects (Fig. 3).</p>
        <p>The findings indicate that Enerhodar and Zaporizhzhia exhibit the highest calculated risk
levels ( R1 = 11.4 and R = 10.8 ), placing them within the category of high-risk zones (Fig. 3).</p>
        <p>1
These territories contain strategic critical infrastructure facilities (Zaporizhzhia NPP) and have
a high density of industrial facilities exposed to military attacks. Medium risk is observed in the
Vasyliv and Pologiv districts of the Zaporizhzhia region.</p>
        <p>Velyki Kuchuhury (after
the explosion of the</p>
        <p>Kakhovka HPP)</p>
      </sec>
      <sec id="sec-9-8">
        <title>Medium</title>
      </sec>
      <sec id="sec-9-9">
        <title>Vasylivskyi district</title>
        <p>The region faces both environmental risks (e.g., forest fires) and a heightened probability of
infrastructure damage caused by shelling amid ongoing military aggression by Russia.
Kamianka-Dniprovska forest area and Velyki Kuchuhury have a relatively low combined risk
score, mainly due to the lower density of critical facilities and remoteness from major
infrastructure hubs.</p>
        <p>The research has confirmed that the developed model is of practical value for risk
management in critical facilities energy supply projects. The identified risk zones, among which
special attention should be paid to the areas around Zaporizhzhia NPP and industrial districts
of Zaporizhzhia, allow for a more accurate prioritization of critical facilities energy supply
scenarios. By analyzing the indicators of threat intensity alongside the assessed vulnerability of
infrastructure sites, regions in urgent need of enhanced protective measures were identified.
This approach contributes to more efficient allocation of limited resources, which is particularly
critical under conditions of emergency or martial law. Importantly, the model not only captures
the current state of affairs, but also updates the data over time, which helps to make more
informed decisions about further actions. The integration of the model into a management
decision support system significantly expedites the justification and planning of energy supply
configurations for strategically important facilities in uncertain and rapidly changing
conditions.</p>
        <p>Future studies should focus on embedding the proposed model into a management decision
support system capable of automatically gathering data from open platforms such as OSM,
integrating APIs for real-time updates on emergency events (e.g., attacks, incidents, natural
disasters), conducting risk prioritization, and generating automated maps. This would enable
the development of not just a static visualization instrument, but a dynamic, interactive platform
to support real-time decision-making for the deployment of energy supply projects targeting
critical infrastructure.</p>
        <p>Such a system would provide operational institutions and local authorities with timely
insights into the evolving risk landscape. For instance, if part of the power infrastructure is
damaged due to shelling or severe weather, the system could immediately highlight affected
zones and suggest prioritization strategies for restoration or temporary redistribution of loads
across adjacent substations. This flexibility is especially vital in emergency or wartime settings,
where delays in response may threaten the functioning of hospitals, water supply systems, or
communication lines.</p>
        <p>Additionally, the integration of machine learning algorithms could enhance the model’s
ability to recognize early signs of infrastructure degradation or rising threat levels. By analyzing
historical data and correlating it with current geospatial patterns, the system may anticipate
zones of elevated vulnerability. This foresight would support preventive planning and allow
resource-constrained regions to allocate funding and technical efforts more efficiently,
strengthening resilience without the need for reactive crisis management.
6. Conclusions</p>
        <p>1. The conducted research resulted in the justification of a methodological approach and
the creation of an intelligent model designed to detect risks associated with energy supply
projects for critical infrastructure. This model is grounded in the integration of geospatial
information, enabling the transformation of potential threats into quantifiable metrics namely,
intensity and likelihood of occurrence. The main advantage of this model is the possibility of
its further integration into management decision support systems to justify the configurations
of energy supply projects under conditions of uncertainty. Leveraging geospatial data sources,
particularly OpenStreetMap, together with the versatility of Python-based tools, enables the
acquisition of timely and reliable information. This, in turn, substantially enhances the
effectiveness of management activities during the planning phase of energy supply projects for
critical infrastructure, especially in the context of a dynamically evolving project environment
and associated risks.</p>
        <p>2. Based on the use of the developed model and the created software code, high-risk areas
for critical facilities energy supply projects in the Zaporizhzhia region were identified.
Enerhodar and Zaporizhzhia city have the highest risk values (respectively R = 11.4 and
1
R = 10.8 ), which corresponds to the high-risk zone. These territories contain strategic critical
1
infrastructure facilities (Zaporizhzhia NPP) and have a high density of industrial facilities
exposed to military attacks. The findings are mapped and grouped based on their corresponding
risk levels.</p>
        <p>3. Future investigations should focus on embedding the developed model into a decision
support system for management purposes, enabling automated detection of risks and real-time
visualization of risk areas on geospatial maps. This will create not only a static visualization
tool, but also a dynamic platform for making management decisions on the implementation of
energy supply projects for critical infrastructure facilities in real-time.</p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>Declaration on Generative AI</title>
      <p>
        During the preparation of this work Chat-GPT-4o and Grammarly were used to check grammar
and spelling. After using these tool(s)/service(s), the author(s) reviewed and edited the content
as needed and take(s) full responsibility for the publication’s content.
Enterprise Technologies, 4(
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref21 ref22 ref23 ref3 ref4 ref5 ref6 ref7 ref8 ref9">3-100</xref>
        ) (2019) 46–53. URL:
https://doi.org/10.15587/17294061.2019.175275
[11] O. Kovalchuk, O. Zachko and D. Kobylkin, Criteria for intellectual forming a project teams in
safety oriented system, in: 17th International Scientific and Technical Conference on
Computer Sciences and Information Technologies (CSIT), 2, 2022, pp. 430-433.
[12] O. Zachko, V. Grabovets, I. Pavlova, M. Rudynet, Examining the effect of production
conditions at territorial logistic systems of milk harvesting on the parameters of a fleet of
specialized road tanks, in: Eastern-European Journal of Enterprise Technologies, 2018,
5(395), pp. 59–69.
[13] OpenStreetMap. URL: https://www.openstreetmap.org/
[14] Google Earth Engine. URL: https://earthengine.google.com/
[15] I. Kondysiuk, P. Lub. Approach and Software for Risk Assessment of Stakeholders of Hybrid
      </p>
      <p>Projects of Transport Enterprise. CEUR Workshop Proceedings, 2022, 3295, pp. 86–96.
[16] S. Chernov, L. Chernova, L. Chernova, N. Kunanets, V. Piterska, The Synergetic Effect in
the Management of Active System with Distributed Control. IEEE 18-th International
Conference on Computer Science and Information Technologies (CSIT), 2023, pp. 1–6.</p>
      <p>
        DOI: 10.1109/CSIT61576.2023.10324123.
[17] V. Boyarchuk, O. Ftoma, R. Padyuka, M. Rudynets, Forecasting the risk of the resource
demand for dairy farms basing on machine learning (MoMLeT&amp;DS-2020). In: CEUR
Workshop Proceedings, 2020, vol. 2631.
[18] I. Kondysiuk, O. Bashynsky, V. Dembitsky, Formation and risk assessment of stakeholders
value of motor transport enterprises development projects. International Scientific and
Technical Conference on Computer Sciences and Information Technologies, 2021, 2, pp.
303–306.
[19] S.D. Bushuyev, A.V. Ivko, H. Lyakhovych, Method of Maximizing F-Synergistic Value in
IT Development Projects for Self-Managed Organizations. International Journal of
Computing, 2024, 23(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), pp. 371–379.
[20] O. Zachko, V. Demchyna, I. Zachko, Intellectual Models of Projects for the Development
of Transport Infrastructure of Urban Territorial Systems. CEUR Workshop Proceedings,
2022, 3295, pp. 159–169.
[21] ISO 31000:2018, Risk Management – Guidelines. International Organization for
      </p>
      <p>
        Standardization, Geneva, Switzerland, 2018, 16 p.
[22] L. Chernova, A. Zhuravel, L. Chernova, N. Kunanets, O. Artemenko, Application of the
Cognitive Approach for IT Project Management and Implementation.
International Scientific and Technical Conference on Computer Sciences and Information
Technologies, 2022, pp. 426-429.
[23] A. Tryhuba, R. Ratushny, I. Tryhuba, N. Koval, I. Androshchuk, The Model of Projects
Creation of the Fire Extinguishing Systems in Community Territories, in: Acta
universitatis agriculturae et silviculturae mendelianae brunensis. 68(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) (2020). 419-431.
doi:10.11118/actaun202068020419
[24] A. Tryhuba, V. Boyarchuk, I. Tryhuba, V. Tymochko, S. Bondarchuk, Model of Assessment
of the Risk of Investing in the Projects of Production of Biofuel Raw Materials.
International Scientific and Technical Conference on Computer Sciences and Information
Technologies, 2020, 2, pp. 151–154, 9322024.
[38] R. Ratushny, I. Horodetskyy, Y. Molchak, V. Grabovets, The configurations coordination of
the projects products of development of the community fire extinguishing systems with the
project environment. ITPM-2021. In: CEUR Workshop Proceedings, 2021, 2851
[39] R. Ratushny, O. Bashynsky, V. Ptashnyk, Development and Usage of a Computer Model of
Evaluating the Scenarios of Projects for the Creation of Fire Fighting Systems of Rural
Communities, in: 2019 11th International Scientific and Practical Conference on Electronics and
Information Technologies, ELIT 2019 - Proceedings, 2019, pp. 34–39, 8892320.
[40] M. Rudynets, N. Pavlikha, I. Skorokhod, D.Seleznov, Establishing patterns of change in the
indicators of using milk processing shops at a community territory, in: Eastern-European
Journal of Enterprise Technologies, 2019, 6(
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref21 ref22 ref23 ref3 ref4 ref5 ref6 ref7 ref8 ref9">3-102</xref>
        ), pp. 57–65.
[41] K. Kolesnikova, N. Alpysbay, T. Olekh, T. Chinibayeva, Proceedings of the IEEE
International Conference on Intelligent Data Acquisition and Advanced Computing
Systems: Technology and Applications, IDAACS, 2023, pp. 741–746.
[42] L. Chernova, I. Zhuravel, S. Chernov, L. Chernova, N. Kunanets, Management of the IT
project as a complex system. CEUR Workshop Proceedings, 2024, 3709, pp. 114–125.
[43] N. Blackwell, A. Evans, P. Lee, B. McCoy, F.T. Davidson, A Methodology for Risk
Assessment to Improve the Resilience and Sustainability of Critical Infrastructure with
Case Studies from the United States Army. ASME International Mechanical Engineering
Congress and Exposition, Proceedings (IMECE), 2021, 8A, V08AT08A056.
[44] N. Pavlikha, M. Rudynets, N. Khomiuk, V. Fedorchuk-Moroz, Studying the influence of
production conditions on the content of operations in logistic systems of milk collection, in:
Eastern-European Journal of Enterprise Technologies, 2019, 3(
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref21 ref22 ref23 ref3 ref4 ref5 ref6 ref7 ref8 ref9">3-99</xref>
        ), pp. 50–63.
[45] I. Kondysiuk, O. Boiarchuk, A. Tatomyr. Intellectual information system for formation of
portfolio projects of motor transport enterprises. CEUR Workshop Proceedings, 2022, 3109,
pp 44–52.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K.</given-names>
            <surname>Piliuhina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bushuyev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Cirillo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ricotti</surname>
          </string-name>
          , W. Janssens,
          <article-title>Development of the nuclear competencies based on global trends in the nuclear industry</article-title>
          .
          <source>Nuclear Engineering and Design</source>
          ,
          <year>2024</year>
          ,
          <volume>421</volume>
          ,
          <fpage>113046</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tryhuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Boyarchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Koval</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Boiarchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Pavlikha</surname>
          </string-name>
          ,
          <article-title>Risk-Adapted model of the lifecycle of the technologically integrated programs of dairy cattle breeding</article-title>
          .
          <source>International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          ,
          <year>2021</year>
          , 2, pp.
          <fpage>307</fpage>
          -
          <lpage>310</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tryhuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hutsol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kuboń</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hohol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Tomaszewska-Górecka</surname>
          </string-name>
          ,
          <article-title>Taxonomy and Stakeholder Risk Management in Integrated Projects of the European Green Deal</article-title>
          . Energies,
          <year>2022</year>
          ,
          <volume>15</volume>
          (
          <issue>6</issue>
          ),
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>O.</given-names>
            <surname>Bashynsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Garasymchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Vilchinska</surname>
          </string-name>
          , V. Dubik,
          <article-title>Research of the variable natural potential of the wind and energy in the northern strip of the Ukrainian Carpathians</article-title>
          .
          <source>E3S Web of Conferences</source>
          ,
          <year>2020</year>
          ,
          <volume>154</volume>
          ,
          <fpage>06002</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bushuyev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Bushuyeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bushuieva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bushuiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tereikovska</surname>
          </string-name>
          ,
          <article-title>Dynamic principles of integrated intelligence model for managing innovation projects</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          ,
          <year>2023</year>
          ,
          <volume>3453</volume>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.Q.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.P.</given-names>
            <surname>Philbin</surname>
          </string-name>
          ,
          <article-title>Mediating Role of Switch Leadership between Dynamic Work Environment</article-title>
          and
          <string-name>
            <given-names>Project</given-names>
            <surname>Success</surname>
          </string-name>
          .
          <source>International Journal of Information Technology Project Management</source>
          ,
          <year>2022</year>
          ,
          <volume>13</volume>
          (
          <issue>1</issue>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>N.</given-names>
            <surname>Koval</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Kondysiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Tryhuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Boiarchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rudynets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Grabovets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Onyshchuk</surname>
          </string-name>
          ,
          <article-title>Forecasting the Fund of Time for Performance of Works in Hybrid Projects Using Machine Training Technologies</article-title>
          .
          <source>Proceedings of the 3rd International Workshop on Modern Machine Learning Technologies and Data Science (MoMLeT&amp;DS</source>
          <year>2021</year>
          ), Volume I: Main Conference, Lviv-Shatsk, Ukraine, June 5-6,
          <year>2021</year>
          , pp.
          <fpage>196</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tryhuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Bashynsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hutsol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rozkosz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Prokopova</surname>
          </string-name>
          ,
          <article-title>Justification of Parameters of the Energy Supply System of Agricultural Enterprises with Using Wind Power Installations</article-title>
          .
          <source>E3S Web of Conferences</source>
          ,
          <year>2020</year>
          ,
          <volume>154</volume>
          ,
          <fpage>06001</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ratushny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Bashynsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ptashnyk</surname>
          </string-name>
          ,
          <article-title>Planning of Territorial Location of Fire-Rescue Formations in Administrative Territory Development Projects</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          .
          <year>2020</year>
          ,
          <volume>2565</volume>
          , pp.
          <fpage>93</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ratushnyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Khmel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Martyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Prydatko</surname>
          </string-name>
          ,
          <article-title>Substantiating the effectiveness of projects for the construction of dual systems of fire suppression</article-title>
          .
          <source>Eastern-European Journal of</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bushuyev</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Chumachenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Galkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bushuiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Dotsenko</surname>
          </string-name>
          ,
          <source>Sustainable Development Projects Implementing in BANI Environment Based on AI Tools. Sustainability (Switzerland)</source>
          ,
          <year>2025</year>
          ,
          <volume>17</volume>
          (
          <issue>6</issue>
          ),
          <fpage>2607</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>V.</given-names>
            <surname>Piterska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Samoilovska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Adakhovskyi</surname>
          </string-name>
          ,
          <article-title>Assessment of port concession projects quality based on the information and analytical risk management system</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          ,
          <year>2023</year>
          ,
          <volume>3453</volume>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Project</given-names>
            <surname>Management</surname>
          </string-name>
          <article-title>Institute (PMI), A Guide to the Project Management Body of Knowledge (PMBOK® Guide), 7th Edition</article-title>
          . Newtown Square, PA, USA: Project Management Institute,
          <year>2021</year>
          , 370 p.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>[28] ISO</source>
          <volume>22301</volume>
          :
          <year>2019</year>
          ,
          <article-title>Security</article-title>
          and Resilience - Business
          <string-name>
            <surname>Continuity Management</surname>
          </string-name>
          Systems - Requirements. International Organization for Standardization, Geneva, Switzerland,
          <year>2019</year>
          ,
          <year>18p</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tryhuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Tryhuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ftoma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Boyarchuk</surname>
          </string-name>
          ,
          <article-title>Method of quantitative evaluation of the risk of benefits for investors of fodder-producing cooperatives</article-title>
          ,
          <source>in: 14th International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          ,
          <volume>3</volume>
          , pp.
          <fpage>55</fpage>
          -
          <lpage>58</lpage>
          ,
          <year>September 2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [30]
          <string-name>
            <surname>А. Тryhuba</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Boyarchuk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <string-name>
            <surname>Tryhuba</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Boiarchuk</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Pavlikha</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Kovalchuk</surname>
          </string-name>
          ,
          <article-title>Study of the impact of the volume of investments in agrarian projects on the risk of their value (ITPM-2021</article-title>
          ) In: CEUR Workshop Proceedings,
          <year>2021</year>
          ,
          <volume>2851</volume>
          , pp.
          <fpage>303</fpage>
          -
          <lpage>313</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tryhuba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Komarnitskyi</surname>
          </string-name>
          , I. Tryhuba,
          <string-name>
            <given-names>T.</given-names>
            <surname>Muzychenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Horetska</surname>
          </string-name>
          ,
          <article-title>Planning and Risk Analysis in Projects of Procurement of Agricultural Raw Materials for the Production of Environmentally Friendly Fuel</article-title>
          .
          <source>International Journal of Renewable Energy Development</source>
          ,
          <year>2022</year>
          ,
          <volume>11</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>569</fpage>
          -
          <lpage>580</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chernenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Danchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Mysnyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Bielova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Adamov</surname>
          </string-name>
          ,
          <source>Optimizing Housing and Communal Services Management Through Digital Transformation and Integrated Information Systems. Lecture Notes on Data Engineering and Communications Technologies</source>
          ,
          <year>2024</year>
          ,
          <volume>222</volume>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>49</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>N.</given-names>
            <surname>Kunanets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhovnir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Burov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Duda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pasichnyk</surname>
          </string-name>
          ,
          <article-title>Designing the Structure and Architecture of Situation-Aware Security Information Systems for Residential Complexes</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          ,
          <year>2025</year>
          ,
          <volume>1</volume>
          (
          <issue>9</issue>
          (
          <issue>133</issue>
          )), pp.
          <fpage>6</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>I.</given-names>
            <surname>Bondareva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Khanova</surname>
          </string-name>
          <article-title>, Multi-level Management of Organizational Systems on the Basis of Risk Cascading, Logical-Probabilistic Modeling and Simulation</article-title>
          .
          <source>Studies in Systems, Decision and Control</source>
          ,
          <year>2022</year>
          ,
          <volume>416</volume>
          , pp.
          <fpage>157</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [35]
          <article-title>Law of Ukraine “On Critical Infrastructure”</article-title>
          .
          <source>Verkhovna Rada of Ukraine, No. 1882-IX, adopted on November 16</source>
          ,
          <year>2021</year>
          .
          <source>Official Bulletin of the Verkhovna Rada of Ukraine</source>
          ,
          <year>2022</year>
          , No. 3,
          <string-name>
            <surname>Art</surname>
          </string-name>
          .
          <volume>21</volume>
          . [Online]. Available: https://zakon.rada.gov.ua/laws/show/1882-
          <fpage>20</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>O.</given-names>
            <surname>Verenych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sharovara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dorosh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Yehorchenkova</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Golyash.</surname>
          </string-name>
          <article-title>Awareness management of stakeholders during project implementation on the base of the markov chain</article-title>
          .
          <source>Proceedings of the 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          ,
          <string-name>
            <surname>IDAACS</surname>
          </string-name>
          <year>2019</year>
          ,
          <year>2019</year>
          , 1, pp.
          <fpage>259</fpage>
          -
          <lpage>262</lpage>
          ,
          <fpage>8924375</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bushuyev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bushuiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bushuieva</surname>
          </string-name>
          ,
          <article-title>Interaction Multilayer model of Emotional Infection with the Earn Value Method in the Project Management Process</article-title>
          , in: 15th
          <source>International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2020 Proceedings</source>
          ,
          <year>2020</year>
          , 2, pp.
          <fpage>146</fpage>
          -
          <lpage>150</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>