<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>V. Akhramovych);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>The methodology for researching the cybersecurity of social platforms in relation to the number of communities⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Volodymyr Akhramovych</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vadym Akhramovych</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anna Ilyenko</string-name>
          <email>anna.ilienko@npp.kai.edu.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Liliia Halata</string-name>
          <email>liliia.halata@npp.kai.edu.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana Okhrimenko</string-name>
          <email>t.Okhrimenko@npp.kai.edu.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olesia Yakovenko</string-name>
          <email>olesia.yakovenko@npp.kai.edu.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yevheniia Halych</string-name>
        </contrib>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The differential dependencies of the cybersecurity space (CS) in social platforms (SP) have been considered, taking into account the number of communities (P), and its stability has been assessed. An indicator for accounting the conditions of P has been implemented in SP. Modern approaches, technologies, and methodologies based on the principle of non-specificity have been implemented in the CS. The conditions of fixed preconditions in the time system allow for a detailed description of the changes in previous transformations, considering the elapsed time. SP is a set of clients, their methods of interaction, and C. It is asserted that there is a tendency according to which, if two individuals are close to each other in terms of views, they are most likely to take a coordinated position on any third individual, subject, or event. Based on such discoveries, researchers could build models of systematic relationships between communities adhered to by different individuals within a single group. From a mathematical perspective, an example of CS built on differential equations with variable characteristics (DEVC) has been studied, and its mathematical analysis has been performed. The results of the analysis of nonlinear models of CS in SP showed that the influence of characteristics (P) on the CS indicator can reach 100%. The portraits on the phase plane (PPP) of CS, which confirm the stability of CS even under peak levels of impactful factors, have been studied. An analysis of the developed CS structures has been conducted, and numerical dependencies between the capabilities of P and the characteristics of CS have been obtained, reflecting a high scientific level of the research.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;social platforms</kwd>
        <kwd>models</kwd>
        <kwd>cyber space indicator</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The key indicator (KI) is formed according to recommendations when the system's characteristics
align with real conditions [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. In this case, emphasis is placed on the exact class of the system,
and the identified interdependencies provide a complete understanding of the process of transition
from the previous state to the current one [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6">3–6</xref>
        ]. Deviations in the value of Z are recorded using
the prototype of differential equations with variable characteristics (DEVC). The relationship
between the placement of system parameters and its characteristics allows for solving DEVC based
on existing data. In further calculations, the parameters listed in Table 1 are used.
      </p>
      <p>
        The previous studies are presented in [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref7 ref8 ref9">7–12</xref>
        ]. In article [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], a mathematical model (linear
differential dependency scheme) is constructed, and a privacy security model is studied based on
the number of communities in social media (SM). The paper exa mines linear security schemes for
information in social media. When describing the linear model, the object should be at least
approximately linear. This approach significantly simplifies the consideration of mathematical
models. If linearity is not observed, the linearity of the security scheme should be studied. The
research showed that the security scheme in social media is nonlinear.
      </p>
      <p>
        In article [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], a graph model is presented, which is randomly generated with specified
parameters for internal and external connections between vertices, while communities are
considered to be extraordinary. A method for identifying community structures based on the
maximum likelihood method is proposed, and a numerical random search algorithm is described.
Graphs representing real social and communication networks change rapidly. Moreover, random
graphs are an effective tool for studying these networks. An important task is to detect the
structure of communities in networks.
      </p>
      <p>
        Articles [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">9–11</xref>
        ] explore the dynamic mathematical regularity Z in SP, along with characteristics
such as relationships, client interaction, the number of transitions, network expansion, and their
impact on the structure of Z.
      </p>
      <p>
        In articles [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref21 ref22 ref23 ref24 ref25 ref26">12–31</xref>
        ], there was no analysis of the quantitative interdependence between client
characteristics, SP, and Z indicators, which can be considered their main disadvantage.
      </p>
      <p>Justification for the research plan:

</p>
      <p>Study of quantitative interdependencies between parameters P and characteristics Z. This
involves analyzing functional or empirical dependencies to determine their correlation or
consistency.</p>
      <p>Analysis of system stability (CS) in the context of SP using phase diagrams. This focuses on
studying the impact of external or internal factors on the dynamic behavior of the system
using phase analysis methods.</p>
      <p>Providing access to operational and relevant information, as well as implementing practical
measures and methods for analyzing the quantitative impact of P characteristics on Z
characteristics, is an applied advantage for information security professionals within the
framework of SP. The study of the amplitude of fluctuations in Z characteristics and phase
diagrams allows for identifying existing threats and assessing their intensity in real time. This
enables information security professionals to make informed decisions based on current Z
characteristics.</p>
    </sec>
    <sec id="sec-2">
      <title>2. References survey and problem statement</title>
      <p>
        In article [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], a mathematical model (a scheme of linear differential dependencies) is built, and a
privacy security model is studied depending on the number of communities in social media. The
article considers linear security schemes for information in social media. When describing the
linear model, the object must be at least approximately linear. This approach significantly
simplifies the consideration of mathematical models. If linearity is not observed, the linearity of the
security scheme should be investigated. The research showed that the security scheme in social
media is nonlinear.
      </p>
      <p>A drawback of the article is the absence of a study on the dependence of Z on P under nonlinear
changes, as well as the lack of studies on the stability of the CS system.</p>
      <p>
        In article [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], a model of a graph is presented, which is randomly generated with given
parameters for internal and external connections between vertices, and the communities are
considered extraordinary. A method for identifying the community structure based on the
maximum likelihood method is proposed, and a numerical random search algorithm is described.
Graphs representing real social and communication networks change rapidly. Moreover, random
graphs are an effective tool for studying these networks. An important task is to detect the
community structure in networks.
      </p>
      <p>
        In articles [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">9–11</xref>
        ], the dynamic mathematical regularity Z in SP is examined, along with
characteristics such as relationships, client interaction, the number of transitions, network
expansion, and their impact on the structure of Z. Quantitative characteristics of the parameters
are calculated.
      </p>
      <p>
        In article [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], techniques for studying the structure and behavior of groups are presented.
Empirical research on the impact of structure in small groups is conducted. Focusing on
communication structure, laboratory studies, in which structures are experimentally imposed on
groups, are examined to determine their impact on performance.
      </p>
      <p>
        In article [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], the cognition of a person (their thoughts and beliefs) about the situation in which
they exist, as well as their evaluation of what they are capable of (self-assessment of abilities), will
collectively influence their behavior. Adherence to incorrect thoughts and/or inaccurate
evaluations of one’s abilities can be punitive or even fatal in many situations. Abilities manifest
only through performance, which is expected to depend on specific abilities.
      </p>
      <p>
        In research [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], the dynamics of interpersonal relationships leading to stable states in a fully
connected network are discussed. This approach is applied to directed networks with asymmetric
relationships, and it is generalized to include self-assessment of actors according to the “Mirror”
theory. A new self-acceptance index is proposed: an actor’s attitude toward themselves is positive
if the majority of their positive relationships with others are reciprocal. The sets of stable
relationship configurations are obtained under dynamics, where the self-assessment of some actors
is negative. Within each set, all configurations share the same structure.
      </p>
      <p>
        In article [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], a conceptual model of an intelligent network is discussed, which is proposed for
use in synthesizing network control in information transmission systems within intelligent info
communications management systems. It is shown that during the synthesis of intellectual control
systems (ICS), certain features must be taken into account: the processing speed at the upper levels
of the conceptual model decreases as the “intelligence” increases, which, in turn, falls as we move
down to the transport level of the proposed model. The principles include the design and
architecture of ICS, considering current measurement data and information sources.
In article [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], a proposed model differs from well-known computer systems with specialized
information platforms that allow testing of security, enabling the evaluation of the penetration test
execution time within a specified probability interval. The proposed penetration testing process for
computer systems has been further developed (modified). A distinctive feature of the modified
model is the Erlang distribution as the main mathematical formalization for state transition
processes. This has allowed, on one hand, the unification of the mathematical model and the
presentation of the testing process at a higher level in the testing hierarchy, and, on the other hand,
simplified it by 1.7 times. A mathematical model for security testing based on the well-known
approach to the simplification and modification of GERT networks was developed to assess the
accuracy of simulation results.
      </p>
      <p>
        In research [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], a deterministic model for online social networks (OSN) is presented, based on
transitivity and local knowledge in social interactions. In repeated local transitivity (ILT), at each
time step, and for every existing node x, a new node appears and joins the closed neighborhood set
of x. The ILT model has been shown to satisfy a range of local and global properties that have been
observed in OSN and other real-world complex networks, such as the power-law compression,
reduced average distance, and higher clustering than in random graphs with the same average
degree. Experimental studies on social networks demonstrate poor expansion properties as a result
of the existence of communities with few inter-community edges. Boundaries for the proven
spectral gap, both for the adjacency matrix and the normalized Laplacian matrix of graphs arising
from the ILT model, indicate these poor expansion properties. It is shown that the number of police
officers and domination remain the same as in the graph from the initial time step G0, and the
group of automorphisms G0 is a subgroup of the automorphism group of graphs created at all later
time steps. A randomized version of the ILT model is presented, demonstrating a tunable
powerlaw exponent and maintaining several properties of the deterministic model.
      </p>
      <p>
        In article [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], it is noted that the structure of social networks is usually derived from limited
sets of observations through appropriate network sampling schemes. It is well-known in the
literature that using degree constraints generates methodologically undesirable features because it
discards information about network connections. A mathematical model of this sampling
procedure is discussed, and analytical solutions are found to recover some of the lost information
about the underlying network. A closed-form expression is obtained for several network statistics,
including the first and second moments of the degree distribution, network density, number of
triangles, and clustering.
      </p>
      <p>
        In article [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], it is shown that when groups compete for members, the resulting dynamics of
human social activity can be understood using simple mathematical models. Methods of dynamic
systems and perturbation theory are applied to analyze the theoretical basis for the growth and
decline of competing social groups. A new approach to the competition for followers between
religious and non-religious segments of modern secular societies is presented, and a new
international dataset tracking the rise of religious disaffiliation is collected. The data indicate a
specific case of a general growth law that provides clear predictions for possible future trends in
society.
      </p>
      <p>
        In study [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], it is noted that one of the most important and integral components of modern
computer security is access control systems. The task of an access control system (ACS) is often
described in terms of protecting system resources from unauthorized or undesirable user access.
However, the high degree of sharing can hinder the protection of resources, so a sufficiently
detailed policy should allow selective information sharing when, in its absence, sharing might be
considered too risky in general. Incorrect configurations, faulty policies, and software
implementation flaws can lead to global security risks.
      </p>
      <p>
        In the article [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], an analysis of social networks is presented, suggesting it as a tool for linking
micro- and macro-levels of sociological theory. The procedure is illustrated by developing
macroconsequences of one aspect of small-scale interaction: the strength of dyadic ties. It is argued that
the degree of intersection of the friendship networks of two individuals directly changes depending
on the strength of their connection to each other. The influence of this principle on the spread of
influence and information, mobility opportunities, and community organization is explored.
Emphasis is placed on the cohesive power of weak ties. Most network models implicitly deal with
strong ties, thus limiting their applicability to small, well-defined groups. The focus on weak ties
invites discussion of relationships between groups and the analysis of segments of the social
structure that are difficult to define in terms of primary groups.
      </p>
      <p>
        In the article [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], an analysis of social networks is conducted, considering social relationships
from the perspective of network theory, which consists of nodes and links (also called edges,
connections, or ties). In this work, the authors attempt to explore the mathematical explanation of
social networks. The research provides guidelines for researchers on how to optimize the
parameters of social networks.
      </p>
      <p>
        In the article [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], an analysis of the limiting behavior of the degree distribution in the partial
duplication model, a random network growth model in the duplication and divergence family,
which is popular in the study of biological networks, is presented. The probability of selecting a
model is a phase transition for the expected proportion of isolated nodes, which tends toward 1.
Asymptotic bounds on the speed of convergence of the degree distribution are obtained. A
subgraph consisting of all non-isolated nodes contained in networks generated by the partial
duplication model is examined, and it is shown that there is again a phase transition for the
limiting behavior of its degree distribution.
      </p>
      <p>
        The study in [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] investigates the structures of online networks, focusing on the growth
mechanisms by which they develop. Growth models based on preferential attachment—the
tendency of a node to connect to a node with a higher degree—are considered. Using Facebook as a
dataset, a mechanism for modeling the Facebook network in a simple structure is developed.
      </p>
      <p>
        In the article [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], a mathematical model of dynamic networks is developed, which is based on
closed rather than open sets. For social networks, it seems appropriate to use the concept of
adjacency to establish these sets. A concept of continuous change is then defined, which has some
properties related to the continuity of counting. It is demonstrated that continuity has a local
nature, meaning that if a network change is discontinuous, it will occur at a specific point, and the
discontinuity will be apparent near that point. Necessary and sufficient continuity criteria are
provided when the change involves only the addition or removal of individual nodes or
connections (edges). To illustrate large-scale continuous changes, a practical process is chosen that
reduces a complex network to its fundamental cycles, during which most of the triad-closed parts
are removed. Finally, several variants of the adjacency concept are examined, and it is proved that
the notion of fuzzy closure can be defined.
      </p>
      <p>
        In article [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], a mathematical model is extended, representing social networks as tripartite
hypergraphs, defining additional quantities such as edge distribution, vertex similarity,
correlations, and clustering, and empirically measuring these quantities on two real-world
taxonomic systems.
      </p>
      <p>A drawback of these works is the lack of research on the quantitative dependencies of Z on P,
including under conditions of nonlinear changes and the absence of studies on the stability of SP.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Concept and objectives of analysis</title>
      <p>Main directions of research includes:

</p>
      <p>Analysis of the quantitative relationship between the characteristics of P and the
characteristics of Z.</p>
      <p>Study of the impact of potential factors in SP based on P.</p>
      <p>The paper examines the definitions and analysis ofZ in SP, taking into account their characteristics
and parameters of P. To compute Z, an uncertain cognitive simulation approach is applied. The
development and research are based on the conceptual foundations of scientific thought and the
modeling of imprecise dependencies. This has allowed for a deeper understanding and formation of
insights into little-known technological processes. To study KI in SP, DEVC systems were created
that demonstrate Z. Methods for solving DEVC are proposed (including the exclusion method, joint
solutions of homogeneous and non-homogeneous equations, collective search for relevant
dependencies, etc.). The study of the impact on Z was carried out through the analysis of DEVC
and a specially developed module in MATLAB/MULTISIM.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Proposed methodology</title>
      <p>
        The methodology continues and develops the work presented in [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">9–11</xref>
        ], allowing for the creation
of an approach to determine the quantitative indicators of Z in SP under the influence of P and
external factors.
      </p>
      <sec id="sec-4-1">
        <title>4.1. Features of P in SP</title>
        <p>A graphical dependence of the differential of P is presented in Figure 1.</p>
        <p>
          The first step is the application of the system of equations[
          <xref ref-type="bibr" rid="ref10 ref11 ref8 ref9">8–11</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Analysis and modeling of a nonlinear system considering P in SP</title>
        <p>Since the nonlinearity of Z is insignificant, the method of successive approximations was chosen to
solve the dependencies, assuming:</p>
        <p>S = S 1+ S 2 + S 3 .. .,</p>
        <p>Z = Z 1+ Z 2 + Z 3+ .. ..</p>
        <p>Assume that
dS = 0, dS = 0, and dZ = 0, dZ = 0, S = S 0 sin ω t , Z = Z 0 sin ω t.</p>
        <p>dt dt</p>
        <p>
          The analysis of the graphical dependencies of the linear system presented in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] indicates its
nonlinear nature. To account for this feature, nonlinear components are added to the system of
equations (1), as stated in expression (2):
{
dS
dt
        </p>
        <p>= Z p Z +( C v+ С K ) S
dZ = ∑K m −
dt k= 1 k
1 K 2</p>
        <p>∑ nk αi− S ( C d 2 + C d 1 )
2 k= 1
{
dS
dt</p>
        <p>= Z p Z +( C v+ C K ) S − L2 S 20 sin2 ω t− L3 S 30 sin3 ω t — ...
dZ = ∑K m −
dt k= 1 k
1 K 2</p>
        <p>∑ nk αi− S ( C d 2 + C d 1)− K 2 Z20 sin2 ω t− K 3 S 30 sin3 ω t — ...
2 k= 1
Let’s rewrite the system of equations and present it in the proposed format:
{ dt k= 2
dS = αZ + β 1 S − ∑∞ Lk S 0k sink ω t ,
ddZt = β 2 S + γ− ∑k=∞2 K k Z0k sink ω t ,</p>
        <p>K
where: α= Z p , β 1= C v+ C K , β 2= − (C d 2 + C d 1) , γ= ∑ m −
k= 1 k
Graphs based on dependency (3) are shown in Figure 2.
We use the method of elimination:</p>
        <p>{S d=dZt β1=2 (βd2dZSt +−γγ−+∑k∑k=∞=∞22 KKkk ZZ0k0kssiinnkkωω tt ⇒)⇒
dS = 1 ( d2 Z + 1 ∑∞ k K k Z0k sink− 1 ωt (cos ω t ))
dt β 2 d t2 ω k= 2
We substitute the obtained expressions (4) into the first equation of the system (3).</p>
        <p>1β 2 (dd2tZ2 + 1ω ∑k=∞2 (k K k Z0k sink− 1 ω t cos ω t ))=
= αZ + ββ 21 ( ddZt − γ+ ∑k=∞2 K k Z0k sink ω t)− ∑k=∞2 Lk S 0k sink ω t,
(3)
(4)
(5)
− 1 ∞</p>
        <p>∑ ( k K k Z0k− 1 sink ω t cos ω t )
ω k= 2</p>
        <p>Graphs based on dependency (3) are shown in Figure 3.
We determine the general solution of the homogeneous expression:</p>
        <p>Z ″ − β 1 Z ' − α β 2 Z = 0.</p>
        <p>The main equation looks as follows: λ2− β 1 λ− α β 2= 0.</p>
        <p>Let us consider the case with a positive discriminant of the given equation.</p>
        <p>D = β 12 + 4 α β 2 &gt; 0 ⇒ λ1,2=
β 1 ± √β 12 + 4 α β 2</p>
        <p>.
2
{
c '1 ( t ) β 1+ √β 212+ 4 α β 2 e
c '1 ( t ) e
β1+√β12+4 α β2 t</p>
        <p>2
(6)
(7)
(8)
(9)
From the dependencies (9, 10), we will determine:
β1+√β12+4 α β2 t
2
= − c '2 ( t ) e</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Analyzing the behavior of the data protection system in the phase space</title>
        <p>The initial equation:
d2 Z = − 1 ∑∞ (k K k Z0k sink− 1 ω t cos ω t )k ω t -,
d t2 ω k∞= 2 ∞ (17)
− β1 γ+ β1 ∑ K k Z0k sink ω t− β 2 ∑ Lk I 0k sin ¿</p>
        <p>k= 2 k= 2</p>
        <p>The study will be conducted in the MatLab/Multisim environment. We will build a schematic of
the solution search module (Figure 4).</p>
        <p>The results of the module’s work are shown in Figures 5 and 6.</p>
      </sec>
      <sec id="sec-4-4">
        <title>4.4. Creation of the phase diagram of the CPS system considering attacks</title>
        <p>Consider a system that models an attack on the system and its immune response. It is assumed that
the dynamics of the harmful agent are described by the logistic model (18). The growth of the
infection is determined by its initial state, the decay caused by the immune response, and the effect
of density. In turn, the change in the immune response depends on the initial state, natural decay,
stimulation that enhances the response, and the damage caused by the harmful agent, as shown in
Figures 7 and 8. Finally, the condition of the affected organ depends on the density of the harmful
agent and its natural degeneration. Thus, the dynamics of the system can be expressed through the
following system of differential equations:
dP = βP −γIP − β 0 P 2,
dt
dI = μ −αI +bIP −ηγIP
dt
(18)
where: P(t) is the concentration of malicious agents; I(t) is the state of the immune system; β is
the growth rate coefficient of malicious agents; γ is the coefficient of decrease in malicious agents
due to their interaction with the network’s immune system; θ is the parameter of intraspecific
competition between malicious agents; μ is the rate of activation of the immune system; a—natural
decay rate of the immune system; b is the rate of immune system stimulation due to interaction
with malicious agents; η is the decay rate of the immune system due to interaction with malicious
agents; α is the coefficient of increased node damage under the influence of malicious agents.</p>
        <p>For the initial investigation, we will design a block diagram of the system according to the
equations (18). We will set the initial conditions:</p>
        <p>P = 0 , I = β /γ , γ= 0.4 , β = 0.6 , β 0= 0.2 , α= 0.3 , η= 0.2 , b= 0.4 , μ = 0.5.</p>
        <p>The modeling process will include variation of attack parameters and the level of protection to
determine the stability zone of the system in response to threats (Figures 7 and 8).</p>
        <p>The conclusions of the research on the stability of the protection system in social media
highlight its effectiveness at maximum amplitudes of impacts under operational parameters and
various network specifics according to Lyapunov’s theorem. This ensures secure information
protection and minimizes attack risks.</p>
        <p>Solution search module in the Multisim program is shown in Figure 9.</p>
        <p>а
b</p>
      </sec>
      <sec id="sec-4-5">
        <title>4.5. Exchange of expressed considerations from the study of Z in SP taking into account P</title>
        <p>The analysis of Z using probabilistic characteristics and P characteristics allowed for the acquisition
of numerical evidence regarding the crucial isolated characteristics of the CS, which include the
impact of P on Z (1, 2, 16) (Figures 2–4). The evaluation of fundamental approaches, models, and
scientific concepts, assessed through simulation modeling of Z considering the influences,
confirmed the validity of the methodology.</p>
        <p>The study of the stability of Z (17) (Figures 5—8) demonstrates high reliability and stability. The
chosen method allows obtaining quantitative characteristics of Z using SP and P characteristics. At
the same time, there is no alternative method with the same result.</p>
        <p>The positive thing that Z withstands maximum loads, including the influence of P. To provide
information to security personnel in SP with convenient, “at-hand” information, tools, and methods
for analyzing the quantitative impact of P characteristics on Z characteristics is considered a
significant advantage.</p>
        <p>The study of Z oscillation amplitudes and phase diagrams reveals current threats in real-time
along with their intensity. This enables information security personnel to make real-time decisions
based on Z characteristics. The next stage of the scientific work will involve investigating other SP
parameters and their influence on Z.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Numerical expression</title>
      <p>Phase portraits on the phase plane of CS, which confirming its stability even under peak levels of
impact factors, have been studied. This was further validated by subsequent research (Figure 9).</p>
      <p>The values of Z characteristics range from 0 to 1, indicating a strong influence of P
characteristics (see Figures 3, 4). Closed curves without bifurcations (Figure 8) under varying
impact levels confirm the high stability ofZ.</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>Analysis of the model that reproduces Z reveals quantitative results of the impact of the
characteristics of SP and characteristics of P on KP in SP and their awareness. The influence
characteristics of P on Z range from zero to one hundred percent, which enabled further research
into other attacks.</p>
      <p>Research in SP based on different indicators of the impact of harmful elements on Z was
conducted using the solution search module in the Multisim program. The study of Z’s oscillation
graphs and phase diagrams confirms the stability of KP under various impacts of harmful elements.
Based on the analysis, it can be concluded that the study of the impact of P on Z is accurate. The
next research will focus on the study and use of other unique characteristics of SP to determine
their influence on Z. Research into the amplitudes of oscillations of Z and phase diagrams
demonstrates existing threats and their strength in real-time. This allows information security staff
to make decisions based on Z characteristics in real-time.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>O.</given-names>
            <surname>Milov</surname>
          </string-name>
          et al.,
          <article-title>Development of Methodology for Modeling the Interaction of Antagonistic Agents in Cybersecurity Systems</article-title>
          ,
          <string-name>
            <surname>Eastern-European</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <source>Enterp. Technol. 2</source>
          .
          <issue>9</issue>
          (
          <issue>98</issue>
          ) (
          <year>2019</year>
          )
          <fpage>56</fpage>
          -
          <lpage>66</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2019</year>
          .164730
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Dudykevych</surname>
          </string-name>
          , et al.,
          <article-title>Platform for the Security of Cyber-Physical Systems and the IoT in the Intellectualization of Society, in: Cybersecurity Providing in Information and Telecommunication Systems</article-title>
          , CPITS, vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>449</fpage>
          -
          <lpage>457</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Marusenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          , Social Engineering Penetration Testing in Higher Education Institutions, Advances in Computer Science for Engineering and
          <string-name>
            <surname>Education</surname>
            <given-names>VI</given-names>
          </string-name>
          , vol.
          <volume>181</volume>
          (
          <year>2023</year>
          )
          <fpage>1132</fpage>
          -
          <lpage>1147</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buhas</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>AI-Driven</surname>
            <given-names>Sentiment</given-names>
          </string-name>
          <article-title>Analysis in Social Media Content, in: Digital Economy Concepts</article-title>
          and Technologies Workshop, DECaT, vol.
          <volume>3665</volume>
          (
          <year>2024</year>
          )
          <fpage>12</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Marusenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Bogachuk</surname>
          </string-name>
          ,
          <article-title>Method of Obtaining Data from Open Scientific Sources</article-title>
          and Social Engineering Attack Simulation,
          <source>Advances in Artificial Systems for Logistics Engineering</source>
          , vol.
          <volume>135</volume>
          (
          <year>2022</year>
          )
          <fpage>583</fpage>
          -
          <lpage>594</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -04809-8_
          <fpage>53</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Z.</given-names>
             B. 
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Sokolov, Implementation of social engineering attack at institution of higher education</article-title>
          ,
          <source>in: 1st Int. Workshop on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CybHyg)</source>
          , vol.
          <volume>2654</volume>
          (
          <issue>2020</issue>
          ) pp.
          <fpage>155</fpage>
          -
          <lpage>164</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Prydybailo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chuprun</surname>
          </string-name>
          ,
          <source>Method for Information Security Research based on the Number of Communities in Social Media, Measuring Comput. Devices Technol. Processes</source>
          <volume>2</volume>
          (
          <year>2024</year>
          )
          <fpage>96</fpage>
          -
          <lpage>106</lpage>
          . doi:
          <volume>10</volume>
          .31891/
          <fpage>2219</fpage>
          -9365-2024-78-11
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lazarenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Martynyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Balanyuk</surname>
          </string-name>
          ,
          <article-title>Model for Searching Communities in Social Networks, Inform</article-title>
          . Secur.
          <volume>26</volume>
          (
          <issue>1</issue>
          ) (
          <year>2020</year>
          )
          <fpage>35</fpage>
          -
          <lpage>41</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          , G. Shuklin,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Pepa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Muzhanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zozuli</surname>
          </string-name>
          ,
          <article-title>Devising a Procedure to Determine the Level of Informational Space Security in Social Networks Considering Interrelations among Users</article-title>
          ,
          <source>Eastern European J. Adv. Technol. 1/9 (115)</source>
          (
          <year>2022</year>
          )
          <fpage>63</fpage>
          -
          <lpage>74</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2022</year>
          .252135
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Pepa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zahynei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Dzyuba</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Danylov.</surname>
          </string-name>
          <article-title>Method for Calculating the Information Security Indicator in Social Media with Consideration of path Duration between Clients, Informatyka</article-title>
          , Automatyka, Pomiary w Gospodarcei Ochronie Środowiska - IAPGOS
          <volume>14</volume>
          (
          <issue>1</issue>
          ) (
          <year>2024</year>
          )
          <fpage>71</fpage>
          -
          <lpage>77</lpage>
          . doi:
          <volume>10</volume>
          .35784/iapgos.5720.
          <year>2024</year>
          .
          <volume>03</volume>
          .31
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lehominova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Stefurak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chuprun</surname>
          </string-name>
          ,
          <article-title>Methodology for Searching for the Dependence between Data Defensiveness and Volume of Social Network Evolution, Int</article-title>
          .
          <source>J. Comput. Netw. Inf. Secur</source>
          .
          <volume>16</volume>
          (
          <issue>6</issue>
          ) (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijcnis.
          <year>2024</year>
          .
          <volume>06</volume>
          .01
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bavelas</surname>
          </string-name>
          , Communication Patterns in Task-oriented
          <string-name>
            <surname>Groups</surname>
          </string-name>
          ,
          <source>J. Acoustical Soc. America</source>
          <volume>22</volume>
          (
          <year>1950</year>
          )
          <fpage>725</fpage>
          -
          <lpage>730</lpage>
          . doi:
          <volume>10</volume>
          .1121/1.1906679
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L.</given-names>
            <surname>Festinger</surname>
          </string-name>
          ,.
          <article-title>A theory of Social Comparison Processes</article-title>
          ,
          <source>J. Human Relations</source>
          <volume>7</volume>
          (
          <issue>2</issue>
          ) (
          <year>1954</year>
          )
          <fpage>117</fpage>
          -
          <lpage>140</lpage>
          . doi:
          <volume>10</volume>
          .1177/001872675400700202
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>F.</given-names>
            <surname>Heider</surname>
          </string-name>
          , Attitudes and
          <string-name>
            <given-names>Cognitive</given-names>
            <surname>Organization</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Psychol</surname>
          </string-name>
          .
          <volume>21</volume>
          (
          <year>1946</year>
          )
          <fpage>107</fpage>
          -
          <lpage>112</lpage>
          . doi:
          <volume>10</volume>
          .1080/00223980.
          <year>1946</year>
          .9917275
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Berkman</surname>
          </string-name>
          , et al.,
          <article-title>The Intelligent Control System for Infocommunication Networks</article-title>
          ,
          <source>Int. J. Emerging Trends Eng. Res</source>
          .
          <volume>8</volume>
          (
          <issue>5</issue>
          ) (
          <year>2020</year>
          )
          <fpage>1920</fpage>
          -
          <lpage>1925</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Semenov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Weilin</surname>
          </string-name>
          ,
          <source>Testing Process for Penetration into Computer Systems Mathematical Model Modification, Adv. Inf. Syst</source>
          .
          <volume>4</volume>
          (
          <issue>3</issue>
          ) (
          <year>2020</year>
          )
          <fpage>133</fpage>
          -
          <lpage>138</lpage>
          . doi:
          <volume>10</volume>
          .20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2020</year>
          .
          <volume>3</volume>
          .
          <fpage>19</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bonato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Hadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Horn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pralat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          , Models of Online Social Networks, Internet Math.
          <volume>6</volume>
          (
          <issue>3</issue>
          ) (
          <year>2020</year>
          )
          <fpage>285</fpage>
          -
          <lpage>313</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>B.</given-names>
            <surname>Fotouhi</surname>
          </string-name>
          , S. Rytina, Mathematical Modeling and
          <article-title>Inference for Degree-Capped Ego-Centric Network Sampling</article-title>
          . https://scholar.harvard.edu/files/babak_fotouhi/files/main.pdf
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>D. M. Abrams</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Richard</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Haley</surname>
          </string-name>
          ,
          <article-title>A Mathematical Model of Social Group Competition with Application to the Growth of Religious Non-Affiliation</article-title>
          . https://www.arxiv-vanity.
          <source>com/papers/ 1012</source>
          .1375/
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>G.</given-names>
            <surname>Cherneva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Khalimov</surname>
          </string-name>
          ,
          <source>Mutation Testing of Access Control Policies, Adv. Inf. Syst</source>
          .
          <volume>5</volume>
          (
          <issue>1</issue>
          ) (
          <year>2021</year>
          )
          <fpage>118</fpage>
          -
          <lpage>122</lpage>
          . doi:
          <volume>10</volume>
          .20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2021</year>
          .
          <volume>1</volume>
          .
          <issue>1</issue>
          .
          <fpage>7</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Granovetter</surname>
          </string-name>
          , The Strength of Weak Ties, American J.
          <string-name>
            <surname>Sociology</surname>
          </string-name>
          (
          <year>1973</year>
          )
          <fpage>1360</fpage>
          -
          <lpage>1380</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>M. K. Srivastav</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Nath</surname>
          </string-name>
          ,
          <source>Study on Mathematical Modeling of Social Networks, Int. J. Emerging Technol. Adv. Eng</source>
          .
          <volume>5</volume>
          (
          <issue>3</issue>
          ) (
          <year>2015</year>
          )
          <fpage>611</fpage>
          -
          <lpage>618</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. P.</given-names>
            <surname>Choi</surname>
          </string-name>
          , T. Wu,.
          <article-title>Degree Distribution of Large Networks Generated by the Partial Duplication Model</article-title>
          ,
          <source>Theoretical Comput. Sci</source>
          .
          <volume>476</volume>
          (
          <year>2013</year>
          )
          <fpage>94</fpage>
          -
          <lpage>108</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mandelshtam</surname>
          </string-name>
          ,
          <article-title>Growth Models of Social Networks</article-title>
          .
          <source>SURF 2007 Final Report.</source>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Pfaltz</surname>
          </string-name>
          ,
          <source>A Mathematical Model of Dynamic Social Networks, Social Network Analysis and Mining</source>
          <volume>3</volume>
          (
          <issue>4</issue>
          ) (
          <year>2013</year>
          )
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          . doi:
          <volume>10</volume>
          .1007/s13278-013-0109-9
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>V.</given-names>
            <surname>Zlatić</surname>
          </string-name>
          , G. Ghoshal, G. Caldarelli,
          <article-title>Hypergraph Topological Quantities for Tagged Social Networks</article-title>
          .
          <source>Physical Review E</source>
          <volume>80</volume>
          (
          <year>2009</year>
          ). doi:
          <volume>10</volume>
          .1103/PhysRevE.80.036118
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>