CONFLICT SITUATIONS AND INTERACTIONS OF THE PARTIES

ავტორი: Volodymyr Khoroshko, Serhii Zybin, Nikolay Brailovskyi, Yuliia Khokhlachova
ორგანიზაცია: National Aviation University, Doctor in Technical Sciences, Professor, Kyiv, Ukraine, Taras Shevchenko National University of Kyiv, PhD in Engineering Science, Associate Professor, Kyiv, Ukraine, National Aviation University, PhD in Engineering Science, Associate Professor, Kyiv, Ukraine

კატეგორია:

საკვანძო სიტყვები: game theory, payoff function, cyberspace, sustainable strategy, cyberwar, hybrid war, counteraction, neutralize, a moment in time, attack on information, conflict management
აბსტრაქტი. The article reveals the application of game theory in the analysis of information warfare. It can significantly reduce the errors and omissions that occur in information security management. That, in turn, minimizes the negative and undesirable political, social and financial consequences for the subjects of information confrontation. The solution of the problems of information confrontation is impossible without the development of new theoretical and methodological principles for the analysis of confrontation processes. The authors studied the scheme of finding sustainable strategies, which ensure neutralization of the enemy. The scheme for finding sustainable strategies always turns out to be useful in many problems and, in particular, in the game theory with a choice of a moment in time.

ბიბლიოგრაფია

1.Pirchalava L.G., Khoroshko V.A., Khohlachjova Ju.E., Shelest M.E. Informacionnoe protivoborstvo v sovremennyh uslovijah. K: CP "Komprint", 2019. – 226 s. [in Russian].
2.Avinash K. Dixit, Susan Skeath, David McAdams. Games of Strategy. (Fifth Edition). W.W. Norton, 2020. – 768 p.
3.Kempe D., Kleinberg J., Tardos E. Maximizing the spread of influence through a social network. Proceeding KDD '03 Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, 2003, ACM New York, NY, USA, pp. 137‒146.
4.Kempe D., Kleinberg J., Tardos E. Maximizing the spread of influence through a social network. Proceeding KDD '03 Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, 2003, ACM New York, NY, USA, pp. 137 ‒ 146.
5.Domingos P., Richardson M. Mining the Network Value of Customers. Proceedings of the Seventh International Conference on Knowledge Discovery and Data Mining, 2002. Zhang D., Gatica-perez D., Bengio S., Roy D. Learning influence among interacting Markov chains. Advances in Neural Information Processing Systems, 2005, 18.
6.Leskovec J. Cost-effective outbreak detection in networks. Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2007, pp. 420 ‒ 429.
7.Goyal A., Lu W., Lakshmanan L.V.S. CELF++: Optimizing the greedy algorithm for influence maximization in social networks, 2011.
8.Chen W., Yuan Y., Zhang L. Scalable influence maximization in social networks under the linear threshold model. ICDM, 2010.
9.Goyal A. SIMPATH: An Efficient Algorithm for Influence Maximization un-der the Linear Threshold Model. Proceeding ICDM '11 Proceedings of the 2011 IEEE 11th International Conference on Data Mining, 2011.
10.Mathioudakis M., Bonchi F., Castillo C., Gionis A., Ukkonen A. Sparsification of influence networks. KDD, 2011, pp. 529 ‒ 537.
11.Jiang Q. Song G., Cong G., Wang Y., Si W., Xie K. Simulated Annealing Based Influence Maximization in Social Networks, AAAI, 2011.
12.He X., Song G., Chen W., Jiang Q. Influence blocking maximization in social networks under the competitive linear threshold model. Proceedings of the 12th SIAM International Conference on Data Mining (SDM'2012), 2012.
13.Chen W., Lu W., Zhang N. Time-critical influence maximization in social networks with time-delayed diffusion process. Proceedings of the 26th Conference on Artificial Intelligence (AAAI'2012), 2012.
14.Tang J. Social influence analysis in large-scale networks, KDD, 2009.
15.Jain M., Korzhyk D., Vanek O., Conitzer V., Pechoucek M., Tambe M. A double oracle algorithm for zero-sum security games on graphs. Proceeding AAMAS '11 The 10th International Conference on Autonomous Agents and Multiagent Systems, 2011, vol. 1.
16.Tsai J., Nguyen T. H., Tambe M. Security Games for Controlling Contagion, AAAI, 2012.
17.Lenkov S.V. Metody i sredstva zashhity informacii: v 2-h t / Lenkov S.V., Peregudov D.A., Khoroshko V.A. – K.: Arij, 2008. – 464 s. [In Russian].
18.Kobozeva A.A. Analiz informacionnoj bezopasnosti / Kobozeva A.A., KhoroshkoV.A.–K.: izd. GUIKT, 2009. – 251 s. [In Russian].
19.Differential Games: A Mathematical Theory with Applications to Warfare and Pursuit, Control and Optimization. Rufus Isaacs. Courier Corporation. – 1999 – p. 384.
20.Differential Games. Avner Friedman. Courier Corporation. 2013 – p. 368
21.Smol'jakov E.R.Teorija antagonizmov i differencial'nye igry / Smol'jakov E.R. – M.: Jeditorial URSS, 2000. – 160 s. [In Russian].
22.Vasylev V.V. Modelyrovanye zadach optymyzatsyy i dyfferentsyalnykh yhr / V.V. Vasylev, V.L. Baranov. – K.: Naukova dumka, 1989. – 286 s. [In Ukraininan].
23.Differential Games: A Mathematical Theory with Applications to Warfare and Pursuit, Control and Optimization. Rufus Isaacs. Courier Corporation. – 1999 – p. 384.
24.Petrosjan L.A. Teorija igr. / Petrosjan L.A., Zenkevich N.A., Shevkopljas E.V. SPb.: BXB-Peterburg, 2012 – 432 s. [In Russian].
25.A. V. Krushevskij. Teorija igr / A. V. Krushevskij – M.: Kniga po Trebovaniju, 2013. – 216 s. [In Russian].
26.M. Dresher. Games of Strategy: Theory and Applications. Prentice Hall. – 1961. – 186 p.
27.Karlin S. Matematicheskie metody v teorii igr, programmirovanii i jekonomike. / S. Karlin. – M.: Mir, 1964. – 835 s. [In Russian].
28.Wolfersdorf L. Eine Bemerkung zur Theorie der symmetrischen Zeltspide. "Elektron. Juf. – verarb und Kybernet", 1999, v.3, N5. – pp. 54 – 68.
29.Hryshchuk R.V. Teoretychni osnovy modeliuvannia protsesiv napadu na informatsiiu metodamy teorii dyferentsialnykh ihor ta dyferentsialnykh peretvoren. / R.V. Hryshchuk. – Zhytomyr. Ruta, 2010. - 280 s. [In Ukrainian].
30.Khoroshko V. The use of Game Theory to Study Processes in the Informational Confrontation / V. Khoroshko, R. Hryshchuk, N. Brailovsky, T. Shcherbak // Scientific and Practical Cyber Security Journal (SPCSJ) 4(3). – pp. 45 – 51.