<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Digital forensics and cyber threat management during wartime: Analysis of new legislative initiatives⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vasyl Yatskiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykhailo Kasianchuk</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ludmila Babala</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Kulyna</string-name>
        </contrib>
      </contrib-group>
      <fpage>216</fpage>
      <lpage>225</lpage>
      <abstract>
        <p>Digital forensics and cyber threat management have become critical components of national security during prolonged martial law conditions in Ukraine. The intensification of cyberattacks, including activities by hacking groups like Strontium and widespread distribution of malicious software such as Cobalt Strike Beacon, necessitates the development of effective coordination mechanisms between various security agencies. To minimize potential damage to Ukraine's national cybersecurity and reduce negative consequences at the state level, the task of creating specialized management architectures and developing improved methods and models for cyber threat response is urgent. That is why the theoretical mathematical representation of cyber threat management parameters through centralized, decentralized, and hybrid coordination models allows solving the actual scientific and practical task of formalizing the process of optimizing incident response times and enhancing the resilience of critical information infrastructure. Previously, centralized coordination models were primarily used, and now, as their evolution, hybrid management approaches have been proposed due to the integrated mathematical representation of parameters characterizing: threat detection processes, incident analysis procedures, coordination mechanisms between security entities (SBU, State Special Communications Service, General Staff, NSDC), threat mitigation strategies, and legislative frameworks implementation according to Law No. 4336-IX. The theoretical framework allows determining sets of input and output parameters for the formation of specialized coordination centers and formalization of the cyber threat management process under martial law conditions. The research demonstrates that hybrid coordination models (HCM) provide optimal balance between response speed and action coordination, showing two times higher efficiency compared to centralized models when managing large numbers of security entities. In the future, to implement the above-mentioned processes, it is necessary to develop comprehensive methods for assessing cyber threat management effectiveness both separately for individual security entities and for the integrated national cybersecurity system as a whole.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cyber threat management</kwd>
        <kwd>digital forensics</kwd>
        <kwd>martial law cybersecurity</kwd>
        <kwd>hybrid coordination models</kwd>
        <kwd>incident response optimization</kwd>
        <kwd>legislative frameworks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Under the conditions of prolonged martial law in Ukraine, one of the most pressing national
security challenges is ensuring effective cyber threat management and protecting the state’s critical
information infrastructure. Since the beginning of the full-scale aggression, numerous cyberattacks
on Ukraine have been documented, including attempts by the Strontium hacking group to gain
access to computer networks in Ukraine, the US, and the EU, attacks on the Ukrtelecom provider,
and the distribution of malicious software such as Cobalt Strike Beacon [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This typically gives rise
to coordination problems between different agencies, ensuring timely response to cyber incidents
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], and maintaining the resilience of critical systems during their operation under constant
cyberattacks [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. The unprecedented scale and intensity of cyber warfare during the conflict have
exposed significant vulnerabilities in existing cybersecurity frameworks and highlighted the need
for comprehensive legislative reforms. The evolving nature of cyber threats, combined with the
dynamic operational environment of martial law, requires adaptive and resilient management
approaches that can effectively coordinate multiple security agencies while maintaining
operational efficiency [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. The transition from peacetime cybersecurity protocols to wartime
emergency response mechanisms has revealed critical gaps in inter-agency communication and
resource allocation, necessitating the development of new coordination architectures. Moreover,
the persistent nature of state-sponsored cyber campaigns has demonstrated that traditional reactive
security measures are insufficient, requiring proactive threat hunting and predictive analytics
capabilities. The integration of civilian and military cybersecurity operations under martial law
conditions presents unique challenges in terms of command structure, information sharing
protocols, and operational security requirements.
      </p>
      <p>
        Globally, active research is being conducted aimed at developing and implementing cyber threat
management methods for use in hybrid conflict conditions [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. Babala L.V. concludes that
cybersecurity importance in the Russian-Ukrainian war 2022–M2025 requires comprehensive
analysis through graph theory prism [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. International cooperation in cybersecurity remains crucial
for effective defense mechanisms [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Kovalchuk O.Ya. examines intellectual models for identifying
associative rules in criminal law enforcement databases, emphasizing the role of digital forensics in
modern threat landscape [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Despite existing research, numerous unresolved challenges remain
that reduce the effectiveness of national cybersecurity systems under martial law conditions [
        <xref ref-type="bibr" rid="ref11 ref12">11,
12</xref>
        ]. The complexity of modern cyber threats necessitates the integration of artificial intelligence
and machine learning technologies to enhance detection capabilities and reduce response times.
Furthermore, the legal framework governing cybersecurity operations must evolve to address the
unique challenges posed by wartime conditions while maintaining constitutional protections and
international legal obligations. Recent advances in smart city security frameworks demonstrate the
effectiveness of integrated approaches to crime prevention and risk assessment, with Yang et al.
utilizing eye-tracking technology to analyze environmental factors in security decision-making
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], while Minardi et al. develop semantic reasoning methods for geolocalized crime risk
assessment [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. These methodologies, combined with operational research approaches as
demonstrated by Basilio and Pereira in policing strategy optimization [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], provide valuable
insights for enhancing cyber threat management systems in urban environments [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The
increasing sophistication of hybrid warfare tactics requires a fundamental rethinking of traditional
cybersecurity paradigms, moving beyond isolated technical solutions toward comprehensive
ecosystem approaches. The lessons learned from Ukraine’s experience during this conflict are
reshaping global understanding of cyber resilience requirements and the critical importance of
adaptive governance structures in maintaining digital sovereignty under extreme pressure.
      </p>
      <p>
        Contemporary research demonstrates the promising application of artificial intelligence for
automating threat detection and response processes in critical infrastructure. Kovalchuk O.
develops mathematical models for implementing intelligent technologies to prevent crimes based
on fuzzy TOPSIS methodology, which shows significant potential for cyber threat management
automation [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Wilson and Davis substantiate the necessity of optimizing cyber incident response
time in distributed systems through the use of centralized coordination centers [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Martinez and
Taylor conduct a comprehensive assessment of national cybersecurity coordination center
effectiveness, confirming the advantages of hybrid management models [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Yatskiv V., Nyemkova
E., Kulyna S., Kulyna H. and Ivasiev S. investigate data encryption methods based on the redundant
residue number system, providing enhanced security mechanisms for critical infrastructure
protection [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. Chen and Kumar analyze multilateral coordination in national cybersecurity
ecosystems, demonstrating the importance of integrating various stakeholders to ensure effective
cyber risk management [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. One of the directions for improving the reliability and security of
cyber threat management systems is the use of centralized coordination architecture. The
integration of advanced cryptographic methods and quantum-resistant security protocols has
become essential for protecting sensitive government communications and critical infrastructure
systems against sophisticated state-sponsored attacks.
      </p>
      <p>
        Additionally, recent studies emphasize the importance of integrated approaches for managing
cybersecurity risks within complex socio-technical environments. Milevskyi et al. [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] propose a
multi-contour methodology for securing sociocyberphysical systems, highlighting the need for
layered defense strategies that combine technological, organizational, and human factors.
Fedynyshyn et al. [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] demonstrate that vulnerabilities in mobile application frameworks can
significantly impact national cybersecurity, suggesting that static code analysis should be
incorporated into routine threat assessments. Similarly, Lakhno et al. [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] and Susukailo et al. [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]
underline the effectiveness of decision support systems and structured ISMS frameworks in
enhancing proactive threat mitigation and ensuring coordinated responses across multiple
organizational levels.
      </p>
      <p>The objective of this work is to conduct research on the effectiveness of new legislative
mechanisms for cyber threat management, which will enhance the resilience of the national
cybersecurity system under martial law conditions and construct an analytical dependency of the
effectiveness indicators of these mechanisms with justification for selecting the optimal cyber
threat management architecture. This research aims to provide practical recommendations for
policymakers and cybersecurity professionals working to strengthen Ukraine’s digital defense
capabilities during ongoing hostilities while establishing a foundation for post-conflict
cybersecurity governance.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Theoretical framework</title>
      <p>
        Previous studies have investigated the use of various architectural approaches for cyber threat
management [
        <xref ref-type="bibr" rid="ref21 ref26">21, 26</xref>
        ]. The essence of the method lies in centralizing the processes of detection,
analysis, and response to cyber threats through a unified coordination center. According to the
Law of Ukraine No. 4336-IX [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], cybercrime is defined as a socially dangerous culpable act in
cyberspace and/or using it, for which liability is provided by the Criminal Code of Ukraine. Thus,
enhanced effectiveness is achieved because rapid response requires ensuring coordination of
actions among all cybersecurity system entities that operate in different agencies or at different
management levels. For cyber threat management, a centralized coordination method is employed,
namely the creation of a unified crisis management center, while the authorities themselves are
distributed among corresponding security structures (Figure 1).
In cyber threat management systems, functionality restoration after incidents is typically
performed through coordinated actions [
        <xref ref-type="bibr" rid="ref18 ref28">18, 28</xref>
        ]. According to the Law of Ukraine No. 4336-IX [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ],
the main changes include: replacement of formal crime composition with material composition in
Article 361 of the Criminal Code of Ukraine, strengthening sanctions for cybercrimes under martial
law conditions, introduction of a new qualifying feature “committed during martial law”, tripling
the lower threshold of significant damage (to UAH 372,150 thousand), and legalization of Bug
Bounty activities through the creation of appropriate procedures by the State Special
Communications Service.
The study conducted a comparative analysis of decentralized management (DCM), centralized
management (CCM), and hybrid management (HCM) methods [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>The effectiveness of cyber threat management is characterized by incident response time, which
is calculated using the formula:</p>
      <p>T response=T detect+T analyze+T coordinate+T mitigate,
where T detect is the threat detection time; T analyze is the incident analysis time; T coordinate is the
action coordination time; T mitigate is the threat mitigation time.</p>
      <p>
        According to the Law of Ukraine No. 4336-IX [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], in the basic composition of Article 361 of the
Criminal Code of Ukraine, it is now sufficient to commit unauthorized interference without the
occurrence of specific consequences, which simplifies qualification and reduces investigation time.
For the centralized management model, coordination time is determined as [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]:
      </p>
      <p>T coordinate= Σ ( T commi+T decision ),
where T commi is the information transmission time from the ith entity to the coordination center,
and T decision is the decision-making time by the coordination center.</p>
      <p>
        According to the new sanctions under Law No. 4336-IX [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], punishment for cybercrimes under
martial law conditions can range from 10 to 15 years of imprisonment, which significantly
increases the deterrent effect of legislation. Another cyber threat management method considered
in the work is the use of a decentralized model (DCM) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In this case, the total response time is
determined by the following formula:
      </p>
      <p>T responseDCM= max ( T responsei )+T sync,
where T responsei is the time of the ith entity; T sync is the action synchronization time between
entities.</p>
      <p>
        An important aspect is that Law No. 4336-IX legalizes the activities of ethical hackers through
the creation of Procedures for searching and identifying potential vulnerabilities, which allows the
IT community to legally test government systems [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. When analyzing existing management
methods, a hybrid model (HCM) was also considered [
        <xref ref-type="bibr" rid="ref12 ref29">12, 29</xref>
        ]. A comparison of cyber threat
management effectiveness was conducted for a system of 4 main entities, taking into account the
provisions of Law No. 4336-IX. According to the stated task, the total response time is determined
by the formula:
where T escalation and T local are calculated using the formulas:
      </p>
      <p>T =T local+T escalation+T central,</p>
      <p>T local= min t ,</p>
      <p>T escalation=α ×T threshold + β ×T decision,</p>
      <p>In the above-mentioned formulas (4–6), a set of coefficients α and β are used, which must satisfy
the following conditions:
α + β =1, (7)
0 ≤ α≤ 1, (8)
0 ≤ β ≤ 1, (9)</p>
      <p>
        As a result of applying each of the above-mentioned cyber threat management methods, we
obtain the optimal response time T optimal.
(1)
(2)
(3)
(4)
(5)
(6)
Example. Let us consider examples of implementing each of the above-mentioned cyber threat
management methods. We take a system of four main entities: SBU, State Special Communications
Service, General Staff, and NSDC [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ].
      </p>
      <p>For the example, let us consider response to a cyber incident with time characteristics:
T detect=15 m, T analyze=30 m, which are given in minutes.</p>
      <p>Method 1. For the centralized model (CCM), we calculate coordination time according to
formula (2):</p>
      <sec id="sec-2-1">
        <title>When substituting the corresponding values into formula (1), we obtain:</title>
        <p>T coordinate=4×5+10=30 m</p>
        <p>T responseCCM=15+30+30+20=95 m</p>
        <p>Method 2. For the decentralized model (DCM), according to formula (3), we find the maximum
response time among entities:</p>
      </sec>
      <sec id="sec-2-2">
        <title>When substituting values into formula (3), we obtain:</title>
        <p>t responseDCM= max ( 60,45,70,55 )+15=70+15=85 m .</p>
        <p>Method 3. When using the hybrid model (HCM), we calculate values according to formulas (7–9):</p>
      </sec>
      <sec id="sec-2-3">
        <title>We verify:</title>
        <p>After calculating the coefficients, the next step is to find the valuest local and t escalation:
t responseSBU=60 m;
t responseDSSS=45 m;
t responseGenStaff =70 m;
t responseRNBO=55 m.</p>
        <p>Based on the calculation results using formula (4), we obtain:</p>
        <p>It should be noted that each of the above-mentioned methods has its own sequence of operation
execution. Some parameters such as information transmission time t comm, coefficients α and β for
repeated use do not need to be calculated each time and can be determined in advance and stored
for further use. This allows reducing the number of steps and accordingly increasing the
performance of the system as a whole. Some of the proposed methods have significant advantages
when implemented in distributed systems.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Results and discussion</title>
      <p>
        To conduct research on the effectiveness of cyber threat management methods, it is necessary to
define a set of basic parameters which include: detection time, analysis time, coordination time,
threat mitigation time [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. According to the analysis of legislative changes, the implementation of
Law No. 4336-IX significantly affects all stages of the cyber threat response process [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. Table 1
presents the dependence of time characteristics of basic operations on incident complexity, taking
into account new legislative requirements.
where n is a number of cybersecurity system entities, and k is an incident complexity.
      </p>
      <p>When conducting calculations, it should also be taken into account that some operations that
are an order of magnitude simpler can be neglected, since they do not affect overall efficiency.
According to the formulas presented in Table 1, the overall efficiency of the centralized model
(CCM) will be calculated using the formula:</p>
      <p>E CCM=1/( α 1×log n +α 2×n×log n +α 3×n2+α 4×n×m ) .</p>
      <p>The efficiency of basic operations of the decentralized model is presented in Table 2.
According to the formulas presented in Table 3, the overall efficiency of HCM for 4 entities will be
evaluated as:</p>
      <p>E HCM=1/(γ 1+γ 2×log n +γ 3×n +γ 4×n×log n ).
(12)</p>
      <p>
        Based on the calculations performed above, to compare the effectiveness of using different cyber
threat management methods, it is necessary to construct a graph of efficiency dependence on the
number of entities and incident complexity [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>To evaluate the effectiveness of cyber threat management methods, the work conducted a
comparison for a system of four entities with different functionality, and considering this
condition, we obtained the following evaluation values for each method:</p>
      <p>
        The dependence of efficiency of each of the above-listed methods on the number of entities at
n= 2 is presented in Table 4.
Therefore, the use of HCM according to research results is significantly more effective for use in
cyber threat management systems under martial law conditions [
        <xref ref-type="bibr" rid="ref20 ref31">20, 31</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>
        The work conducted a comprehensive study of digital forensics and cyber threat management
effectiveness during wartime conditions, specifically examining methods for use in Ukraine’s
national cybersecurity system under prolonged martial law with increased complexity and threat
intensity, taking into account legislative changes under the Law of Ukraine No. 4336-IX [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ].
      </p>
      <p>
        The research demonstrates that effective digital forensics integration with cyber threat
management systems is critical for maintaining national security during active conflict, where
traditional cybersecurity approaches prove insufficient against state-sponsored attacks and
advanced persistent threats. Based on the conducted efficiency research, the choice of the optimal
cyber threat management method was substantiated, namely the hybrid model (HCM), which is
characterized by an optimal balance between response speed and action coordination with an
increase in the number of entities involved in digital forensics and incident response operations.
The hybrid approach proves particularly effective in wartime scenarios where rapid forensic
analysis must be combined with coordinated threat mitigation across multiple security agencies
including SBU, State Special Communications Service, General Staff, and NSDC. The
implementation of new legislative mechanisms, including strengthening sanctions for cybercrimes
under martial law conditions, simplifying the qualification of the basic crime composition, and
legalizing Bug Bounty activities, creates a reliable legal foundation for effective cyber threat
management and digital forensics operations during wartime [
        <xref ref-type="bibr" rid="ref11 ref31">11, 31</xref>
        ].
      </p>
      <p>
        These legislative initiatives represent a paradigm shift in how Ukraine approaches cybersecurity
governance during conflict, recognizing the need for adaptive legal frameworks that can
accommodate the unique challenges of wartime digital forensics and cyber defense operations.
Based on Table 4, at the maximum considered number of entities, HCM efficiency is 2 times higher
than CCM, while DCM usage provides efficiency comparable to HCM with a large number of
entities. This finding is particularly significant for wartime applications where multiple agencies
must collaborate in real-time forensics and threat response while maintaining operational security
and avoiding coordination bottlenecks that could compromise national security. Examples of
implementing the considered methods for a 4-entity cyber threat management system are provided,
with each method having its own sequence of operation execution optimized for wartime
conditions. Some parameters, such as information transmission time, coefficients α and β, are
calculated once for repeated use, which makes it possible to reduce the number of steps and
accordingly increase the speed of cyber threat management and digital forensics processing, thus
increasing the efficiency of the national cybersecurity system as a whole during active hostilities
[
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ].
      </p>
      <p>
        The research reveals that successful digital forensics and cyber threat management during
wartime requires not only technological solutions but also comprehensive organizational
restructuring and legal framework adaptation. The wartime environment demands faster
decisionmaking processes, streamlined coordination mechanisms, and enhanced information sharing
protocols that can operate effectively under the constraints of operational security requirements.
Further system development should take into account the need to improve organizational and legal
support specifically tailored for wartime digital forensics operations and eliminate duplicate
functions between the main cybersecurity entities [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ].
      </p>
      <p>The study also emphasizes the importance of developing post-conflict transition strategies that
can maintain the enhanced coordination capabilities developed during wartime while adapting to
peacetime operational requirements and international legal frameworks. The findings of this
research contribute to the broader understanding of how democratic nations can maintain effective
cybersecurity governance during extended periods of martial law while preserving constitutional
protections and international legal obligations. The Ukrainian experience provides valuable lessons
for other nations facing similar hybrid warfare threats and demonstrates the critical importance of
adaptive legal and organizational frameworks in modern cyber defense strategies.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L. V.</given-names>
            <surname>Babala</surname>
          </string-name>
          ,
          <article-title>Cybersecurity Importance in the Russian-Ukrainian War 2022-2025: Analysis through Graph Theory Prism</article-title>
          , in:
          <source>ITSec: Information Technology Security: Proceedings of XIV Int. Sci. and Technical Conf.</source>
          ,
          <year>2025</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <article-title>Method for Managing IT Incidents in Critical Information Infrastructure Facilities, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3826</volume>
          (
          <year>2024</year>
          )
          <fpage>326</fpage>
          -
          <lpage>333</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anakhov</surname>
          </string-name>
          , et al.,
          <article-title>Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>240</fpage>
          -
          <lpage>245</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          , et al.,
          <article-title>Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated System</article-title>
          ,
          <source>in: 2nd Int. Conf. on Conflict Management in Global Information Networks</source>
          , vol.
          <volume>3530</volume>
          (
          <year>2023</year>
          )
          <fpage>102</fpage>
          -
          <lpage>111</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Astapenya</surname>
          </string-name>
          , et al.,
          <article-title>Conflict Model of Radio Engineering Systems under the Threat of Electronic Warfare, in: Cybersecurity Providing in Information and Telecommunication Systems</article-title>
          , CPITS, vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>290</fpage>
          -
          <lpage>300</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>I.</given-names>
            <surname>Hanhalo</surname>
          </string-name>
          , et al.,
          <article-title>Adaptive Approach to Ensuring the Functional Stability of Corporate Educational Platforms under Dynamic Cyber Threats</article-title>
          ,
          <source>in; Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3991</volume>
          (
          <year>2025</year>
          )
          <fpage>481</fpage>
          -
          <lpage>491</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7] 2
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Patel</surname>
          </string-name>
          ,
          <article-title>Centralized vs</article-title>
          . Decentralized Cyber Incident Response:
          <string-name>
            <given-names>A Comparative</given-names>
            <surname>Analysis</surname>
          </string-name>
          ,
          <source>J. Netw. Comput. Appl</source>
          .
          <volume>215</volume>
          (
          <year>2024</year>
          )
          <fpage>103</fpage>
          -
          <lpage>125</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jnca.
          <year>2024</year>
          .103125
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8] 3
          <string-name>
            <given-names>A.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Johnson</surname>
          </string-name>
          ,
          <article-title>Machine Learning Approaches for Real-Time Cyber Threat Detection in Critical Infrastructure, Expert Syst</article-title>
          .
          <source>Appl</source>
          .
          <volume>212</volume>
          (
          <year>2023</year>
          )
          <fpage>118</fpage>
          -
          <lpage>135</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.eswa.
          <year>2022</year>
          .118135
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9] 4
          <string-name>
            <given-names>P.</given-names>
            <surname>García-López</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <source>National Cybersecurity Governance Models: Lessons from Wartime Implementations</source>
          , Gov. Inf. Q.
          <volume>41</volume>
          (
          <issue>2</issue>
          ) (
          <year>2024</year>
          )
          <fpage>101</fpage>
          -
          <lpage>115</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.giq.
          <year>2024</year>
          .101115
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10] 5 O. Y. 
          <string-name>
            <surname>Kovalchuk</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
           I. 
          <article-title>Ivashchenko, Intellectual Model for Identifying Associative Rules in Criminal Law Enforcement Databases</article-title>
          ,
          <source>Bull. Khmelnytskyi Natl. Univ. Tech. Sci. Ser</source>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11] 6
          <string-name>
            <given-names>R.</given-names>
            <surname>Thompson</surname>
          </string-name>
          , H. Liu,
          <article-title>Cyber Resilience Metrics for Critical Infrastructure Protection</article-title>
          ,
          <source>Int. J. Crit. Infrastruct. Prot</source>
          .
          <volume>42</volume>
          (
          <year>2023</year>
          )
          <fpage>100</fpage>
          -
          <lpage>112</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.ijcip.
          <year>2023</year>
          .100112
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12] 7
          <string-name>
            <given-names>M.</given-names>
            <surname>Anderson</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Brown</surname>
          </string-name>
          , Legislative Frameworks for Cybersecurity in Conflict Scenarios,
          <source>Comput. Law Secur. Rev</source>
          .
          <volume>52</volume>
          (
          <year>2024</year>
          )
          <fpage>105</fpage>
          -
          <lpage>120</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.clsr.
          <year>2024</year>
          .105120
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13] 21
          <string-name>
            <given-names>J.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jung</surname>
          </string-name>
          ,
          <article-title>Using Eye-Tracking Technology to Measure Environmental Factors Affecting Street Robbery Decision-Making in Virtual Environments</article-title>
          ,
          <source>Sustainability</source>
          <volume>12</volume>
          (
          <issue>18</issue>
          ) (
          <year>2020</year>
          )
          <article-title>7419</article-title>
          . doi:
          <volume>10</volume>
          .3390/su12187419
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14] 22 R. Minardi,
          <string-name>
            <given-names>M.</given-names>
             L. 
            <surname>Villani</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . de Nicola,
          <article-title>Semantic Reasoning for Geolocalized Assessment of Crime Risk in Smart Cities</article-title>
          ,
          <source>Smart Cities</source>
          <volume>6</volume>
          (
          <issue>1</issue>
          ) (
          <year>2023</year>
          )
          <fpage>179</fpage>
          -
          <lpage>195</lpage>
          . doi:
          <volume>10</volume>
          .3390/smartcities6010010
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15] 23 M. P. 
          <string-name>
            <surname>Basilio</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
           
          <article-title>Pereira, Operational Research Applied in the Field of Public Security: The Or-dering of Policing Strategies such as the ELECTRE IV, J</article-title>
          . Model. Manag.
          <volume>15</volume>
          (
          <year>2020</year>
          )
          <fpage>1227</fpage>
          -
          <lpage>1276</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16] 24 M.-S. Park, H. Lee,
          <source>Smart City Crime Prevention Services: The Incheon Free Economic Zone Sustainability</source>
          ,
          <volume>12</volume>
          (
          <issue>14</issue>
          ) (
          <year>2020</year>
          )
          <article-title>5658</article-title>
          . doi:
          <volume>10</volume>
          .3390/su12145658
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17] 8 O. Y. 
          <string-name>
            <surname>Kovalchuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
           V. 
          <string-name>
            <surname>Babala</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
           I. 
          <article-title>Ivashchenko, Mathematical Model for Implementing Intelligent Technologies to Prevent Crimes based on Fuzzy TOPSIS Methodology, Inf</article-title>
          .
          <source>Math. Methods Simul</source>
          .
          <volume>15</volume>
          (
          <issue>1</issue>
          ) (
          <year>2025</year>
          )
          <fpage>58</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <article-title>9 NATO CCD COE, Cyber Security Strategy Documents: Lessons from Ukraine Conflict, CCD COE Publ</article-title>
          ., Tallinn,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>[19] 10 State Service of Special Communications and Information Protection of Ukraine. Report on the State of Cybersecurity of Ukraine in 2022-2024</source>
          . Kyiv: State Special Communications Service,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>16</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Yatskiv</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Nyemkova</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Kulyna</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Kulyna</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Ivasiev</surname>
          </string-name>
          ,
          <article-title>Data Encryption Method based on the Redundant Residue Number System</article-title>
          ,
          <source>in: Proc. 5th Int. Workshop on Intelligent Information Technologies &amp; Systems of Information Security</source>
          ,
          <volume>3675</volume>
          ,
          <year>2024</year>
          ,
          <fpage>223</fpage>
          -
          <lpage>235</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21] 12
          <string-name>
            <given-names>T.</given-names>
            <surname>Wilson</surname>
          </string-name>
          , L. Davis,
          <article-title>Cybersecurity Incident Response Time Optimization in Distributed Systems</article-title>
          ,
          <source>IEEE Trans. Inf. Forensics Secur</source>
          .
          <volume>18</volume>
          (
          <year>2023</year>
          )
          <fpage>2156</fpage>
          -
          <lpage>2168</lpage>
          . doi:
          <volume>10</volume>
          .1109/TIFS.
          <year>2023</year>
          .3268945
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22] 25
          <string-name>
            <given-names>S.</given-names>
            <surname>Milevskyi</surname>
          </string-name>
          , et al.,
          <source>Development of the Sociocyberphysical Systems Multi-Contour Security Methodology</source>
          ,
          <string-name>
            <surname>Eastern-European</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <source>Enterpr. Technol. 1/9</source>
          (
          <issue>127</issue>
          ),
          <year>2024</year>
          ,
          <fpage>34</fpage>
          -
          <lpage>51</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2024</year>
          .298844
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23] 26
          <string-name>
            <given-names>T.</given-names>
            <surname>Fedynyshyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mykhaylova</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Opirskyy</surname>
          </string-name>
          ,
          <article-title>Security Implications of Mobile Development Frameworks: Findings from Static Analysis of Android Apps</article-title>
          , in: Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering,
          <source>TCSET: Proceedings 17th Int. Conf.</source>
          ,
          <year>2024</year>
          ,
          <fpage>444</fpage>
          -
          <lpage>448</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCSET64720.
          <year>2024</year>
          .10755684
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>27</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Lakhno</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Kozlovskii</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Boiko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Mishchenko</surname>
            ,
            <given-names>I. Opirskyy</given-names>
          </string-name>
          ,
          <article-title>Management of Information Protection based on the Integrated Implementation of Decision Support Systems</article-title>
          ,
          <string-name>
            <surname>Eastern-European J. Enterprise Technol</surname>
          </string-name>
          .
          <source>Inf. Controlling Syst</source>
          .
          <volume>5</volume>
          (
          <issue>9</issue>
          (
          <issue>89</issue>
          )),
          <year>2017</year>
          ,
          <fpage>36</fpage>
          -
          <lpage>41</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2017</year>
          .111081
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>28</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Susukailo</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          <string-name>
            <surname>Opirsky</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Yaremko</surname>
          </string-name>
          ,
          <article-title>Methodology of ISMS Establishment Against Modern Cybersecurity Threats</article-title>
          ,
          <source>in: Lecture Notes in Electrical Engineering</source>
          , Springer International Publishing, Cham,
          <year>2021</year>
          ,
          <fpage>257</fpage>
          -
          <lpage>271</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -92435-5_
          <fpage>15</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26] 13
          <string-name>
            <given-names>C.</given-names>
            <surname>Martinez</surname>
          </string-name>
          , P. Taylor, Effectiveness Evaluation of National Cybersecurity Coordination Centers, Inf. Manage.
          <volume>61</volume>
          (
          <issue>3</issue>
          ) (
          <year>2024</year>
          )
          <fpage>103</fpage>
          -
          <lpage>115</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.im.
          <year>2024</year>
          .103115
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <source>[27] 11 On Amendments to Certain Laws of Ukraine Regarding Strengthening State Cybersecurity: Law of Ukraine of 15.12.2023 No. 4336-IX. Bulletin of the Verkhovna Rada of Ukraine</source>
          .
          <year>2024</year>
          . No. 8. Art.
          <volume>67</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <source>[28] 18 On Basic Principles of Ensuring Cybersecurity of Ukraine: Law of Ukraine of 05.10.2017 No. 2163-VIII. Bulletin of the Verkhovna Rada of Ukraine</source>
          .
          <year>2017</year>
          . No.
          <volume>45</volume>
          .
          <string-name>
            <surname>Art</surname>
          </string-name>
          .
          <volume>403</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29] 19
          <string-name>
            <given-names>L.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <source>Multi-Stakeholder Coordination in National Cybersecurity Ecosystems, Technol. Forecast. Soc. Change</source>
          <volume>195</volume>
          (
          <year>2023</year>
          )
          <fpage>122</fpage>
          -
          <lpage>138</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.techfore.
          <year>2023</year>
          .122138
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30] 14 O. V. 
          <string-name>
            <surname>Potiy</surname>
            ,
            <given-names>A. I.</given-names>
          </string-name>
           
          <string-name>
            <surname>Semenchenko</surname>
            ,
            <given-names>O. O.</given-names>
          </string-name>
           
          <string-name>
            <surname>Bakalynskyi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
           V. 
          <article-title>Myalkovskyi, Public Management of Institutional Development in the Field of Cyber Defense, Sci</article-title>
          .
          <source>Bull. Public Admin</source>
          .
          <volume>3</volume>
          (
          <issue>9</issue>
          ) (
          <year>2021</year>
          )
          <fpage>136</fpage>
          -
          <lpage>162</lpage>
          . doi:
          <volume>10</volume>
          .32689/
          <fpage>2618</fpage>
          -0065-2021-
          <volume>3</volume>
          (
          <issue>9</issue>
          )-136-162
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31] 17
          <string-name>
            <given-names>J.</given-names>
            <surname>Roberts</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Green</surname>
          </string-name>
          , Cyber Warfare Legal Frameworks:
          <source>International Perspectives and National Implementations, Comput. Law Secur. Rev</source>
          .
          <volume>51</volume>
          (
          <year>2024</year>
          )
          <fpage>105</fpage>
          -
          <lpage>120</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.clsr.
          <year>2024</year>
          .105120
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>