<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dmytro Lande</style></author><author><style face="normal" font="default" size="100%">Oleh Dmytrenko</style></author><author><style face="normal" font="default" size="100%">Oleh Andriichuk</style></author><author><style face="normal" font="default" size="100%">Vitaliy Tsyganok</style></author><author><style face="normal" font="default" size="100%">Yaroslava Porplenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Building of Directed Weighted Networks of Terms for Decision-Making Support During Information Operations Recognition</style></title><secondary-title><style face="normal" font="default" size="100%">MODS 2020: Mathematical Modeling and Simulation of Systems (MODS'2020) </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nikita Savchenko</style></author><author><style face="normal" font="default" size="100%">Vitaliy Tsyganok</style></author><author><style face="normal" font="default" size="100%">Oleh Andriichuk</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Cost-Effective Approach to Securing Systems through Partial Decentralization</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">data platforms</style></keyword><keyword><style  face="normal" font="default" size="100%">decentralized data platforms</style></keyword><keyword><style  face="normal" font="default" size="100%">delegated transactions</style></keyword><keyword><style  face="normal" font="default" size="100%">distributed ledger technology</style></keyword><keyword><style  face="normal" font="default" size="100%">Ethereum</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">109-121</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">A study has been conducted on the methods of secure computation and storage decentralization, based on expert and decision support systems’ needs. It identified the common disadvantages of modern, Distributed Ledger Technology-based (DLT-based) decentralized systems and suggested a solution to it – the universal transaction delegation method. This method eliminates the complexity of a decentralized system from end-users’ point of view, which during the study was identified as the main disadvantage of DLT-based systems. This article provides a brief overview of existing approaches to solve the usage complexity problem, based on data from well-known projects built with Ethereum, the leading DLT-based smart contract platform. As a result of the research, we implemented the universal transaction delegation method which does not depend on the signature standard used in the decentralized program. In addition, we present results of an experimental economic analysis of the solution based on real network tests and data as of 2020.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">109</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aleksandr Dodonov</style></author><author><style face="normal" font="default" size="100%">Dmitry Lande</style></author><author><style face="normal" font="default" size="100%">Vitaliy Tsyganok</style></author><author><style face="normal" font="default" size="100%">Oleh Andriichuk</style></author><author><style face="normal" font="default" size="100%">Sergii Kadenko</style></author><author><style face="normal" font="default" size="100%">Anastasia Graivoronskaya</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information Operations Recognition: From Nonlinear Analysis to Decision-Making</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.morebooks.shop/store/gb/book/information-operations-recognition/isbn/978-620-0-27697-1</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">LAP Lambert Academic Publishing</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oleh Andriichuk</style></author><author><style face="normal" font="default" size="100%">Vitaliy Tsyganok</style></author><author><style face="normal" font="default" size="100%">Dmitry Lande</style></author><author><style face="normal" font="default" size="100%">Oleg Chertov</style></author><author><style face="normal" font="default" size="100%">Yaroslava Porplenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Usage of Decision Support Systems for Conflicts Modelling during Information Operations Recognition</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">conflict modeling</style></keyword><keyword><style  face="normal" font="default" size="100%">content monitoring system</style></keyword><keyword><style  face="normal" font="default" size="100%">decision support system</style></keyword><keyword><style  face="normal" font="default" size="100%">information operation recognition</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge base</style></keyword><keyword><style  face="normal" font="default" size="100%">reflexive model</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;We describe the application of decision support systems to conflict modeling for identification of information operations. An information operation is treated as a complex weakly structured system. The paper presents a model of conflict between two subjects, based on the second-order reflexive model and a method for construction of the design pattern for knowledge bases of decision support systems. The authors suggest also a methodology allowing to use decision support systems for modeling of conflicts during information operations recognition. The methodology combines the use of expert knowledge and content monitoring data.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mykyta Savchenko</style></author><author><style face="normal" font="default" size="100%">Vitaliy Tsyganok</style></author><author><style face="normal" font="default" size="100%">Oleh Andriichuk</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Decision Support Systems' Security Model Based on Decentralized Data Platforms</style></title><secondary-title><style face="normal" font="default" size="100%">Selected Papers of the XVIII International Scientific and Practical Conference &quot;Information Technologies and Security&quot; (ITS 2018)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><pages><style face="normal" font="default" size="100%">199–208</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vitaliy Tsyganok</style></author><author><style face="normal" font="default" size="100%">Sergii V. Kadenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">On sufficiency of the consistency level of group ordinal estimates</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Automation and Information Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><volume><style face="normal" font="default" size="100%">42</style></volume><pages><style face="normal" font="default" size="100%">42-47</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">8</style></issue></record></records></xml>