<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>O. Nehodenko);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Model of an intelligent decision support system to ensure cyber resilience of military information systems⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Olena Nehodenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svitlana Shevchenko</string-name>
          <email>s.shevchenko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitalii Nehodenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuliia Zhdanova</string-name>
          <email>y.zhdanova@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., 04053 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The article presents a comprehensive model of an intelligent decision support system to ensure cyber resilience of military information systems in dynamic conditions of cyber threats. An analysis of scientific sources on methods and models for increasing the efficiency of detecting and predicting cyber threats in information systems, as well as possible methods for ensuring the cyber resilience of these systems, was conducted. The advantages and disadvantages of existing solutions were identified, and a comparative analysis of three main approaches was conducted, which include classical decision support systems (DSS), intelligent decision support systems (AI+DSS) and autonomous agent systems for ensuring cyber resilience (MAS, Autonomous Cyber Defense Agents). The proposed architecture is based on the mathematical catastrophe theory to describe the nonlinear dynamics of system stability and predict critical transitions in the data flows of the SIEM module, the cluster analysis method, namely the k-Means algorithm for classifying the operating modes of security states from stable to critical, which allows identifying anomalies that can cause catastrophic changes in the system. Statistical and temporal methods are used to predict bifurcation points as indicators of instability in the SIEM module. A multi-objective optimization method is also used, which reflects the DSS component of the system and is responsible for making decisions based on indicators of minimizing risks, time and costs. The system architecture is presented using an activity diagram, a state diagram and a sequence diagram.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Intelligent Information Security Management System (ISIM)</kwd>
        <kwd>Incident Detection System (IDS)</kwd>
        <kwd>SIEMsystem</kwd>
        <kwd>bifurcation points</kwd>
        <kwd>system stability</kwd>
        <kwd>Catastrophe Theory</kwd>
        <kwd>k-means</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The protection of military systems is becoming increasingly relevant during a real war, which
changes its rules of the game in the arena of information and communication systems security and
requires new technical solutions to increase this security. In modern cyberspace, there are a large
number of various cyberattacks that negatively affect military information and communication
systems and disrupt their ability to adapt and recover from each attack as a whole [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. But what is
significant in this context is the ability of the system to proceed to operate continuously due to the
reliability of communication channels and stable information flows [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        All modern military operations depend on modern cyber defense developments that can
counteract real threats and guarantee the resilience of information and communication systems to
intense cyberattacks [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The use of an information security management system allows you to
maintain data confidentiality, ensures continuity of operations and supports overall operational
efficiency at all stages of military operations. Information security management systems are also a
control unit for detecting, preventing and blocking all possible threats and failures during the
planning and implementation of combat missions [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], a mathematical catastrophe theory is proposed to ensure the stability of the information
security management system. It is found that different types of cyber incidents have their own
impact on the stability and equilibrium of the system as a whole. The presence of risk zones on the
plane of the system’s equilibrium points, which are critically important during sharp changes in
the system states under the influence of cyber incidents, is established [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. These results allow us to
apply the mathematical catastrophe theory to increase the stability of the information security
management system, which allows us to predict destabilization processes in the system.
      </p>
      <p>
        Also important are the results of article [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], which presents the advantages and disadvantages of
using a SIEM system using mathematical catastrophe theory to predict, detect, and prevent cyber
incidents in integrated military training systems.
      </p>
      <p>
        An important block for the information security management system is the decision-making
stage regarding the identified threats. In article [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], a cluster analysis method was proposed to
reduce the subjectivity of expert assessments in the process of identifying cyber threats.
      </p>
      <p>
        Unfortunately, traditional methods used in information security management systems do not
always quickly and accurately make decisions in critical situations in real time, therefore, there is a
pressing task of creating an intelligent decision support system (IDSS) to ensure the cyber
resilience of military information systems. These intelligent systems are aimed at improving the
quality and speed of forecasting, detecting and preventing dynamic and complex cyber threats
using modern artificial intelligence technologies [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8–10</xref>
        ]. Artificial intelligence and machine
learning technologies use automated analysis of large amounts of data and predict threats based on
real-time anomaly detection [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ]. The integration of human-machine interaction should also
not be rejected, since military information and communication system operators should participate
in making critical decisions, which will reduce the risk of errors that arise during the automated
operation of IDSS [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review</title>
      <p>
        A review of modern scientific sources has shown a growing interest in the use of artificial
intelligence in information security management systems, which allows analyzing large amounts of
data, identifying vulnerabilities, and predicting possible cyber threats [15]. In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], much attention is
paid to deep learning models to increase the reliability of systems and the efficiency of processing
multi-level data from various sources. However, the main requirement is systematic training based
on the received data in real time, which contributes to the constant improvement of the quality of
decision support and response to new cyber threats. In [16], semantic technologies and big data
technologies in cyber security are investigated, which allow to increase the security indicators of
information systems. Also, one should not forget about the combination of cloud technologies and
the operability of peripheral systems, which allows the creation of hybrid architectures that ensure
the transition to the creation of scalable, reliable and intelligent systems that are important for
performing complex operations [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>For rapid response to cyberattacks, risk assessment and creation of countermeasures in real
time, [17] proposed to combine an ontological knowledge model, cognitive architecture and data
analysis. An important component of an intelligent information security management system is a
decision-making system, which often does not perceive the coordinated action of several cyber
agents which use different ways of penetrating the system. In order for this system to respond to
complex attacks in real time, [18] proposed to base the system on hierarchical modeling and
Bayesian analysis for dynamically updating models and generating recommendations to ensure
efficiency and resilience in real cyberthreat scenarios.</p>
      <p>
        Researchers at the Netherlands Aerospace Center [19] propose a combined approach that
combines the integration of artificial intelligence and modeling with simulation (M&amp;S) to create an
intelligent decision support system for military systems. This combination allows to increase the
accuracy of predictions and the quality of decisions due to the previous results of actions, which
are important for commanders during the planning of operations. This method also allows to
reduce the cognitive load on military analysts and rapid response to changes in combat situations
by creating new scenarios in real time.
The approaches to build intelligent decision-making systems to ensure cyber resilience of military
information systems, which are proposed in the works [
        <xref ref-type="bibr" rid="ref8">8, 15–19</xref>
        ], of course, have advantages, but
in turn also have a number of negative indicators, such as excessive complexity of modeling
cognitive processes and scaling in real time, complexity of agent interaction and risks of incorrect
autonomous response without taking into account a single context, high dependence on data
quality, as well as high complexity of calculations when expanding the functioning of the system,
as well as limited realism of simulation in combination with high resource costs and dependence
on the accuracy of the models used. All of these approaches (cognitive, Bayesian, stimulation,
multi-agent) provide analysis and response to cyberattacks, but do not take into account the
dynamic processes that lead to the loss of system stability. This article proposes the use of
catastrophe theory and cluster analysis as an analytical center for DSS, which will ensure the
transition from reactive to preventive management of cyber resilience of military information
systems.
      </p>
      <p>It is advisable to provide a comparative table of the use of different approaches for building an
intelligent decision-making system to ensure the cyber resilience of military information systems
(Table 1).</p>
    </sec>
    <sec id="sec-3">
      <title>3. Research methods</title>
      <p>The development of an intelligent decision support system model to ensure cyber resilience of
military information systems includes the catastrophe theory method to describe the nonlinear
dynamics of system resilience and predict critical transitions in the SIEM module data streams, the
cluster analysis method, namely the k-Means algorithm and DBSCAN to classify the operating
modes of security states from stable to critical, which allows identifying anomalies that can cause
catastrophic changes in the system. Statistical and temporal methods were used to predict
bifurcation points as indicators of instability in the SIEM module. A multi-criteria optimization
method was also used, which reflects the DSS component of the system and is responsible for
decision-making based on indicators of minimizing risks, time and costs. Additionally, machine
learning algorithms were used to detect anomalies and build adaptive models of the behavior of the
entire system. The architecture and processes of the intelligent decision-making support system for
ensuring cyber resilience of military information systems are presented using an activity diagram,
a state diagram and a sequence diagram. The latter shows the logic of the analyst’s interaction with
the intelligent modules of the system.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Main material</title>
      <p>
        This article presents the development of an intelligent decision support system (IDSS) model to
ensure cyber resilience of military information systems using classical and intelligent approaches
to ensure rapid response and decision-making regarding detected cyberattacks. The proposed
approach, which is based on the detection of dynamic changes in system states and differs from
traditional ones that record events and reactions to already detected cyberincidents, is based on the
principles of catastrophe theory. Catastrophe theory is appropriate to use to describe the behavior
of complex systems at bifurcation points that occur when parameters change and lead to a sharp
loss of stability. This approach involves not only detecting cyber incidents, but also allows
predicting their consequences by analyzing state changes in the system [
        <xref ref-type="bibr" rid="ref4 ref6">4, 6, 19</xref>
        ]. To build a holistic
analytical architecture, where all modules interact in real time, a phased approach was used, which
consists of data collection and normalization, modeling, clustering, decision synthesis and, finally,
quality control of decision-making, in the contour of which a person remains (Human in the loop).
      </p>
      <p>To construct this model, the system is formally represented as a hybrid dynamic system with
continuous and discrete blocks that model the state of stability, regime transitions, and
decisionmaking.</p>
      <p>
        The results of scientific research in [
        <xref ref-type="bibr" rid="ref4 ref6">4, 6, 19</xref>
        ] showed the feasibility of using nonlinear dynamics
and mathematical catastrophe theory to build a model of an intelligent decision support system
(IDSS) to ensure the cyber resilience of military information systems. This approach provides
mathematical prediction of critical transitions under the influence of increasing cyberattacks, load
or conflict of systems.
      </p>
      <p>Nonlinear systems depend on initial conditions, as well as on the influence of external factors,
which lead to sharp jumps or catastrophes in the stability of the system [20].</p>
      <p>The state of nonlinear systems is given by the formula:
d x = f ( x ; a , b )+ξ ( t ) ,
d t
(1)
where x ( t ) is an integral variable that shows the state of the system (level of cyberstability); a
and b are system parameters responsible for the intensity of events, the level of cyber incidents;
ξ ( t )shows noise or fluctuations in the data.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], various types of catastrophes and the feasibility of using the “Butterfly” catastrophe type,
which shows the transition from a stable to a variable state under the influence of five parameters,
are proposed.
      </p>
      <p>The general equation for the “Butterfly” catastrophe has the form</p>
      <p>V ( x )=x 6+a x 4+b x 3+c x 2+dx ,
(2)
correspond to equilibrium states and depend on the values of the parameters a , b , c , and d . In
turn, when changing these parameters, the system can enter a state of “catastrophe,” that is, reach
bifurcation points. This state is possible when modeling a situation when the number of cyber
incidents jumps to critical values, which will lead to system failures.</p>
      <p>The critical state of the system can also be indicated using the metric:</p>
      <p>∆t = ∇2 V ( x t ; at , bt , c t , d t ) ∨→ 0 ,
which shows that the system is losing its equilibrium, the stage of activation of the response
subsystem begins.</p>
      <p>Mathematical catastrophe theory provides an opportunity to identify complex
interdependencies between various cyber incidents and timely detect catastrophic changes in the
state of the system. In turn, the gradient descent method, namely the analysis of the potential
V x 1=x 2−η ∇ f ( x 2 ) ,
d x =0 ,
d t</p>
      <p>V ( x t ; at , bt , c t , d t )
allows to identify risk areas in time and prevent changes in the system state.</p>
      <p>In real conditions, the process of changing states in military information systems is carried out
discretely, therefore, to model these transitions, a clustering method based on features of system
behavior was used.</p>
      <p>
        To describe the behavioral profile of the system at a point in timet , a multidimensional vector
is used, which describes all the features that implement the corresponding collected data of the
SIEM system, event logs, and telemetry of military subsystems, and is given by the formula:
where x is a variable that determines the state of the system; a , b , c , and d are management
parameters that correspond to cyber incident categories [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>To determine the differential equation describing the change in the state of the system, the
gradient descent method was used, which is used to find the minimum value of the function,
namely, to reduce the potential and achieve a stable state of the system. The formula for the
gradient descent step has the form:</p>
      <p>where x 1 is the new variable value x ; η is the step variable; ∇ f ( x 2 ) is the gradient of a
function f ( x ) at the point x 2.</p>
      <p>Points, where</p>
      <p>ϕ ( t )=[ λt , σ t2 , ρ 1 ,t , Sw t , Kt t , H t , δ t , pt , qt ],
where λt is the number of cyberattacks per unit of time; σ t2 is the variance of events in a sliding
window; ρ 1 ,t is the autocorrelation; S w tis the distribution asymmetry; Kt t is the kurtosis of the
distribution; H t is the entropy of the state of the system; δ t is the distance to catastrophic state; pt
is the normalized risk; qt is the trust level.</p>
      <p>
        A set of vectors { ϕ 1 , ϕ 2 , ... , ϕ t } forms a set that describes the dynamic behavior of the system at
a certain point in time. Using the k-means method [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the set of vectors is divided into classes with
common properties, i.e. clusters
(3)
(4)
(5)
(6)
(7)
S = { Stable , Degraded , Critical }.
      </p>
      <p>D = ∑K ∑ ‖ ϕ i − μk ‖2 ,</p>
      <p>k =1 ϕi∈Ck</p>
      <p>Next, the distances between elements of one cluster are minimized and the distances between
elements of different clusters are maximized, that is, the functional of the mean square distances is
minimized
(8)
(9)
where K is the number of clusters, С k is the set of points in a cluster k , μk is the cluster center.
Thus, all vectors of the set { ϕ 1 , ϕ 2 , ... , ϕ t } will receive a cluster label after training the algorithm,
which determines the state of the system s t ∈S with corresponding features, namely the Stable
state includes low variance, low autocorrelation, and small entropy; state describes the average
value of autocorrelation, increasing variability and increasing normalized risk; the Critical state
describes high H t , σ t2 , pt and decreasing trust qt . Figure 1 presents an Activity Diagram that
describes the state clustering process, namely how the system learns to determine the states of the
system [21].
It is also necessary to take into account that the system may be affected by new cyber incidents
that affect the change in the state of the system. Let the system be in a state at some point in time
s t ∈S , then the probability of the system transitioning to the state s t +1 is determined by the
formula:
pi j =</p>
      <p>N i j ,
∑ N i j
Where the elements pi j are estimated statistically taking into account historical data:
where N i j is the amount observations during state transitions s i → s j .</p>
      <p>Figure 2 shows a State Diagram that describes the states of the system depending on the
elements pi j, that determine the rapid response of the subsystem to detected cyberattacks.</p>
      <p>The clustering performed using the k-means method divides all available SIEM system data into
behavioral characteristics, each of which plays its own role in the information system. As noted
earlier, each cluster has its own center μk, which shows the state of the system and the distance
‖ ϕ t − μk ‖, which is a measure of the change in the state of the system [22].</p>
      <p>There is a direct connection between clusters and the indicators used in the “Butterfly” type
catastrophe. Thus, the Stable state can be obtained at a local minimum of the potential V ( x ) , i.e.
at a point x s at</p>
      <p>d Vd x(x ) =0 , d 2dVx(2x ) &gt;0.</p>
      <p>With these indicators, the system is in a stable state, where the parameters of the butterfly
catastrophe a , b , c , and d are subject to minor fluctuations, which does not affect the loss of
equilibrium of the system as a whole.</p>
      <p>When the Degraded state is detected, the system is exposed to cyberattacks and its stability is
compromised, but it still functions within its capabilities. In this region, the potential gradient is
weak, which provokes the system to slow down to return to the equilibrium state after the
cyberattack is detected. These changes are accompanied by changes in the parameters a , b , c , and
d by the transition to a new minimum or the appearance of bifurcation points, i.e. the system
becomes sensitive to random fluctuations.</p>
      <p>The third state Critical determines the transition of the system into a catastrophic region, which
will lead to a catastrophic state, namely a violation of the stability of the cyber system,
characterized by a failure or loss of control by the control system. This state is mathematically
(11)
(12)
shown by a change in the sign of the second derivative V ' ' ( x ) and the instability of the energy
potential
d 2dVx(2x ) → 0.
(13)</p>
      <p>At this point, the system is at a bifurcation point, which prevents the system from changing its
current state. The combination of cluster analysis and catastrophe theory allows us to assess the
stability of the system at a given point in time, as well as by calculating the distances to the
detected bifurcation points, which make it possible to predict potential transition points between
the system states.</p>
      <p>The proposed model of an intelligent decision support system combines the interaction of an
analyst and automated modules for responding to cyber incidents. Figure 3 presents a Sequence
diagram, which shows the response logic of the entire system [22].</p>
      <p>The proposed interaction between humans and artificial intelligence allows us to bring existing
systems to a new intellectual level, as well as increase the detection and prediction of cyberattacks,
which in turn will increase the accuracy and stability of the system when making decisions in
complex operations.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>The mathematical model of the intelligent decision-making system, which is presented in this
work, is expedient to use to increase the cyber resilience of military information systems. This
model combines nonlinear dynamic modeling, mathematical catastrophe theory, cluster analysis
and elements of artificial intelligence into a single decision-making system. Each of the above
approaches played an essential role at its stage. Thus, the “Butterfly” type catastrophe allows you
to detect transitions between the states of the information system from Stable to Critical, which
allows you to detect at early positions the approach of the system to critical or catastrophic states
during the impact on the information system of various types of cyber incident</p>
      <p>The use of cluster analysis, namely the k-means method, makes it possible to restore the state of
the system based on real SIEM data at a certain point in time. To predict the probability of
transitions between the states of stability, change and recovery, this model uses a mathematical
model of the Markov chain, which allows assessing risks. There are also SOAR-responder and audit
modules to regulate all actions, as well as a training block that allows for constant updating of
models based on previous data.</p>
      <p>The proposed model of an intelligent decision-making system combines mathematical modeling,
learning, and human control, which provides robustness and transparency compared to traditional
decision-making systems to ensure the cyber resilience of military information systems.</p>
      <p>Further research will be aimed at integrating this model with real simulation systems, as well as
addressing the issue of optimizing multi-criteria control parameters to increase the efficiency of
decision-making in information security management systems.</p>
      <p>Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.
[15] M. Adamantis, V. Sokolov, P. Skladannyi, Evaluation of State-of-the-Art Machine Learning
Smart Contract Vulnerability Detection Method, Advances in Computer Science for
Engineering and Education VII, vol. 242 (2025) 53–65. doi:10.1007/978-3-031-84228-3_5
[16] S. Shevchenko, Y. Zhdanova, O. Kryvytska, H. Shevchenko, Fuzzy Cognitive Mapping as a
Scenario Approach for Information Security Risk Analysis, in: Cybersecurity Providing in
Information and Telecommunication Systems II, vol. 3826 (2024) 356–362.
[17] P. Theron, A Kott. Towards an Active, Autonomous and Intelligent Cyber Defense of Military
Systems: the NATO AICA Reference Architecture, in: Int. Conf. on Military Communications
and Information Systems. 2018. doi:10.1109/ICMCIS.2018.8398730
[18] S. Huang, C. M. Poskitt, L. K. Shar. Bayesian and Multi-Objective Decision Support for
Real</p>
      <p>Time Cyber-Physical Incident Mitigation, 2025. doi:10.48550/arXiv.2509.00770
[19] R. Uetz, et al, You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise</p>
      <p>Networks, in: 33rd USENIX Conference on Security Symposium, 290, 2024, 5179–5196.
[20] P. Skladannyi, et al., Modified Delta Maintainability Model of Object-oriented Software. in:
Cybersecurity Providing in Information and Telecommunication Systems, vol. 3288 (2022)
117–124.
[21] G. González-Granadillo, et al., Security Information and Event Management (SIEM):
Analysis,Trends, and Usage in Critical Infrastructures, Sensors 21 (2021) 4759.
doi:10.3390/s211447592
[22] B. D. Bryant, H. Saiedian, Improving SIEM Alert Metadata Aggregation with a Novel Kill
Chainbased Classification Model. Comput. Secur. 94(2) (2020).doi:10.1016/j.cose.2020.101817</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Ormrod</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Turnbull</surname>
          </string-name>
          ,
          <article-title>Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success</article-title>
          ,
          <source>Int. J. Cyber Warfare and Terrorism</source>
          ,
          <year>2017</year>
          . doi:
          <volume>10</volume>
          .4018/IJCWT.2017100101
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hrozdov</surname>
          </string-name>
          , et al.,
          <article-title>The Method of Assessing the Sustainability of the Functioning System based on the Combat Capabilities of the Armies</article-title>
          , None,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .58254/viti.5.
          <year>2024</year>
          .
          <volume>05</volume>
          .64
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.S.</given-names>
            <surname>Savant</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <article-title>The Role of Internet of Battlefield Things in Modern Warfare: A Cybersecurity Perspective</article-title>
          , None,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .36676/jrps.v15.
          <year>i3</year>
          .
          <fpage>1534</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
            <surname>Nehodenko</surname>
          </string-name>
          ,
          <article-title>Application of Mathematical Theory of Catastrophes to Ensure the stability of the Information Security Management System</article-title>
          ,
          <source>Cybersecur.: Educ. Sci. Technol</source>
          .
          <volume>2</volume>
          (
          <issue>26</issue>
          ) (
          <year>2024</year>
          )
          <fpage>212</fpage>
          -
          <lpage>222</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2024</year>
          .
          <volume>26</volume>
          .692
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <article-title>Method for Managing IT Incidents in Critical Information Infrastructure Facilities, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3826</volume>
          (
          <year>2024</year>
          )
          <fpage>326</fpage>
          -
          <lpage>333</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Nehodenko</surname>
          </string-name>
          ,
          <article-title>Modeling Critical States in a SIEM System based on Catastrophe Theory, Telecommun</article-title>
          . Inf. Technol.
          <volume>2</volume>
          (
          <year>2025</year>
          )
          <fpage>118</fpage>
          -
          <lpage>125</lpage>
          . doi:
          <volume>10</volume>
          .31673/
          <fpage>2412</fpage>
          -
          <lpage>4338</lpage>
          .
          <year>2025</year>
          .028289
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <source>Mathematical Methods in Cybersecurity: Cluster Analysis and its Application in Information and Cyber Security, Cybersecur. Educ. Sci. Technol</source>
          .
          <volume>3</volume>
          (
          <issue>23</issue>
          ),
          <year>2024</year>
          ,
          <fpage>258</fpage>
          -
          <lpage>273</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2024</year>
          .
          <volume>23</volume>
          .258273
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Nabiyeva,
          <source>Integration of Artificial Intelligence into Communication Systems: Enhancing Performance</source>
          , Adaptability, and Security, in: Intellectual Resource of Today: Scientific Tasks,
          <source>Development and Questions</source>
          ,
          <year>2025</year>
          . doi:
          <volume>10</volume>
          .62731/mcnd-
          <volume>29</volume>
          .
          <fpage>08</fpage>
          .
          <year>2025</year>
          .011
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Rachapalli</surname>
          </string-name>
          ,
          <article-title>Hybrid AI-Edge Architectures for Mission-Critical Decision Systems, Int</article-title>
          .
          <source>J. Sci. Technol</source>
          .
          <volume>14</volume>
          (
          <issue>4</issue>
          ),
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .71097/ijsat.v14.
          <year>i4</year>
          .
          <fpage>5505</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Models and Technologies of Cognitive Agents for Decision-making with Integration of Artificial Intelligence</article-title>
          ,
          <source>in: Modern Data Science Technologies Doctoral Consortium (MoDaST)</source>
          , vol.
          <volume>4005</volume>
          (
          <year>2025</year>
          )
          <fpage>82</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Virovets</surname>
          </string-name>
          , et al.,
          <source>Integration of Smart Contracts and Artificial Intelligence using Cryptographic Oracles</source>
          , in: Classic, Quantum, and
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          , vol.
          <volume>3829</volume>
          (
          <year>2024</year>
          )
          <fpage>39</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>J. Scholtz</surname>
          </string-name>
          ,
          <article-title>Theory and Evaluation of Human Robot Interactions</article-title>
          ,
          <source>in: 36th Annual Hawaii International Conference on System Sciences</source>
          ,
          <year>2003</year>
          . doi:
          <volume>10</volume>
          .1109/hicss.
          <year>2003</year>
          .1174284
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Magdenko</surname>
          </string-name>
          , et al,
          <year>2024</year>
          . Artificial Intelligence:
          <article-title>A New Weapon in the Hands of Cebercriminals and Fraudsters</article-title>
          . https://ir.lib.vntu.edu.//handle/123456789/42455
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>L.</given-names>
             
            <surname>Leenen</surname>
          </string-name>
          , T. Meyer, Semantic Technologies and
          <article-title>Big Data Analytics for Cyber Defence</article-title>
          ,
          <source>Int. J. Cyber Warfare and Terrorism</source>
          ,
          <volume>6</volume>
          (
          <issue>3</issue>
          ) (
          <year>2016</year>
          )
          <fpage>53</fpage>
          -
          <lpage>64</lpage>
          . doi:
          <volume>10</volume>
          .4018/IJCWT.2016070105
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>