{"id":1399,"date":"2021-01-15T23:39:42","date_gmt":"2021-01-15T21:39:42","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=1399"},"modified":"2021-03-04T13:14:38","modified_gmt":"2021-03-04T11:14:38","slug":"%d0%bc%d0%b5%d1%82%d0%be%d0%b4-%d1%96%d0%b4%d0%b5%d0%bd%d1%82%d0%b8%d1%84%d1%96%d0%ba%d0%b0%d1%86%d1%96%d1%97-%d1%88%d0%bf%d0%b8%d0%b3%d1%83%d0%bd%d1%81%d1%8c%d0%ba%d0%be%d0%b3%d0%be-%d0%bf%d1%80","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=1399","title":{"rendered":"\u041c\u0435\u0442\u043e\u0434 \u0456\u0434\u0435\u043d\u0442\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u0448\u043f\u0438\u0433\u0443\u043d\u0441\u044c\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445"},"content":{"rendered":"<p style=\"text-align: center;\">\u041c\u0415\u0422\u041e\u0414 \u0406\u0414\u0415\u041d\u0422\u0418\u0424\u0406\u041a\u0410\u0426\u0406\u0407 \u0428\u041f\u0418\u0413\u0423\u041d\u0421\u042c\u041a\u041e\u0413\u041e \u041f\u0420\u041e\u0413\u0420\u0410\u041c\u041d\u041e\u0413\u041e \u0417\u0410\u0411\u0415\u0417\u041f\u0415\u0427\u0415\u041d\u041d\u042f \u0412 \u041a\u041e\u041c\u041f\u2019\u042e\u0422\u0415\u0420\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425<\/p>\n<p style=\"text-align: center;\">METHOD FOR THE SPYWARE IDENTIFICATION IN THE COMPUTER SYSTEMS<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/9-5.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 43-49. \u041d\u043e\u043c\u0435\u0440: \u21163, 2020 (285)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0421. \u041c. \u041b\u0418\u0421\u0415\u041d\u041a\u041e, \u0412. \u042e. \u041e\u041c\u0415\u041b\u042c\u042f\u041d\u0415\u041d\u041a\u041e, \u0420. \u0412. \u0429\u0423\u041a\u0410<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nS. LYSENKO, V. OMELIANENKO, R. SHCHUKA<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-285-3-7\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-285-3-7<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 04.05.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 01.06.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043e \u043f\u043e\u0434\u0430\u043b\u044c\u0448\u0438\u0439 \u0440\u043e\u0437\u0432\u0438\u0442\u043e\u043a \u043c\u0435\u0442\u043e\u0434\u0443 \u0456\u0434\u0435\u043d\u0442\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u0448\u043f\u0438\u0433\u0443\u043d\u0441\u044c\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445, \u044f\u043a\u0438\u0439 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u0432\u0438\u044f\u0432\u043b\u044f\u0442\u0438 \u0443\u0441\u0456 \u0442\u0438\u043f\u0438, \u0456 \u0432\u0456\u0434\u0440\u0456\u0437\u043d\u044f\u0454\u0442\u044c\u0441\u044f \u0432\u0456\u0434 \u0432\u0456\u0434\u043e\u043c\u0438\u0445 \u0442\u0438\u043c, \u0449\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454 \u043f\u0440\u0438\u043d\u0446\u0438\u043f \u043f\u0440\u043e\u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0442\u0430 \u0431\u0430\u0437\u0443\u0454\u0442\u044c\u0441\u044f \u043d\u0430 \u043c\u0435\u0445\u0430\u043d\u0456\u0437\u043c\u0430\u0445 \u043c\u0430\u0448\u0438\u043d\u043d\u043e\u0433\u043e \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f \u0437 \u043f\u0456\u0434\u043a\u0456\u043f\u043b\u0435\u043d\u043d\u044f\u043c. \u0417\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 \u0456\u0434\u0435\u043d\u0442\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u0448\u043f\u0438\u0433\u0443\u043d\u0441\u044c\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0454 \u0430\u043d\u0430\u043b\u0456\u0437 \u043f\u043e\u0432\u0435\u0434\u0456\u043d\u043a\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445. \u041c\u0435\u0442\u043e\u0434 \u0491\u0440\u0443\u043d\u0442\u0443\u0454\u0442\u044c\u0441\u044f \u0442\u0430\u043a\u043e\u0436 \u043d\u0430 \u0430\u043d\u0430\u043b\u0456\u0437\u0456 \u0434\u0430\u043d\u0438\u0445 \u0456\u0437 \u0437\u0430\u043b\u0443\u0447\u0435\u043d\u043d\u044f \u0430\u043f\u0430\u0440\u0430\u0442\u0443 \u043c\u0430\u0448\u0438\u043d\u043d\u043e\u0433\u043e \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f, \u0437\u043e\u043a\u0440\u0435\u043c\u0430 \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f \u0437 \u043f\u0456\u0434\u043a\u0440\u0456\u043f\u043b\u0435\u043d\u043d\u044f\u043c, \u044f\u043a\u0438\u0439 \u043e\u043f\u0435\u0440\u0443\u0454 \u0437 \u043f\u043e\u043d\u044f\u0442\u0442\u044f\u043c\u0438 \u0437\u043d\u0430\u0447\u0435\u043d\u044c \u0441\u0442\u0430\u0431\u0456\u043b\u044c\u043d\u043e\u0441\u0442\u0456 \u0434\u043b\u044f \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0428\u041f\u0417. \u0417\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0454 \u0440\u0456\u0432\u043d\u044f\u043d\u043d\u044f \u043e\u0442\u0440\u0438\u043c\u0430\u043d\u043d\u044f \u043d\u043e\u0432\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454 \u043e\u0431\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044f \u0432\u0435\u043b\u0438\u0447\u0438\u043d\u0438 \u0432\u043f\u043b\u0438\u0432\u0443 \u043a\u043e\u0436\u043d\u043e\u0457 \u0437 \u0432\u043b\u0430\u0441\u0442\u0438\u0432\u043e\u0441\u0442\u0435\u0439 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0433\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0432 \u043f\u043e\u0442\u0440\u0456\u0431\u043d\u0456\u0439 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0456\u0457, \u0430 \u0437\u0430\u0432\u0434\u044f\u043a\u0438 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0441\u0442\u0430\u0431\u0456\u043b\u044c\u043d\u043e\u0441\u0442\u0456 EAX, \u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044f \u043f\u0440\u0438\u0441\u0432\u043e\u044e\u0454\u0442\u044c\u0441\u044f \u0434\u043e \u043d\u044c\u043e\u0433\u043e \u0432 \u044f\u043a\u043e\u0441\u0442\u0456 \u043d\u0430\u0433\u043e\u0440\u043e\u0434\u0438.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0435 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u0448\u043f\u0438\u0433\u0443\u043d\u0441\u044c\u043a\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0435 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f, \u0456\u0434\u0435\u043d\u0442\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u044f, \u043c\u0430\u0448\u0438\u043d\u043d\u0435 \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f, \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f \u0437 \u043f\u0456\u0434\u043a\u0440\u0456\u043f\u043b\u0435\u043d\u043d\u044f\u043c, \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The paper presents a method of identification of spyware identification software in computer systems, which allows detection of all types, and differs from the known ones, which provides the principle of proactivity and is based on mechanisms of machine learning. For the proposed method of identifying spyware, it uses an analysis of the behaviour of the software on computer systems. The method is also based on a downstream analysis of the involvement of machine learning apparatus, in particular reinforcement learning, which operates with concepts of stability values for the malware detection. The proposed method, using the equation for obtaining new information, calculates the value of the impact of each of the properties of the software in the desired category, and due to the efficiency of EAX stability, the value is assigned to it as a reward. Here are some basic steps in the method of identifying spyware on computer systems: tracking the behaviour of executable files on a computer system; calculation of stability values; selection of features that may indicate the presence of spyware on computer systems by equating the retrieval of new information; calculating the reward value based on the EAX stability value; building a spyware identification template; software instance analysis; calculating the stability value of the software instance under study; adaptation of a file of a file with the obtained stability values for comparison with malicious and useful instances of files based on the stability values of known spyware. Method for the spyware identification in the computer systems enables the detection of the URL logger, Keyloggers, Screen Recorders, Chat loggers, Email logger, Password logger, Password hijackers, Keyloggers and password loggers, logger, Advertising Programs (Web Errors), Browser Hijacking, Modem abduction, PC abduction, Information thefts (Infostealers) and Banking Trojans. Proposed method demonstrated the possibility of spyware detection with high reliability up to 97.55%.<br \/>\n<strong>Keywords:<\/strong> malware, spyware, machine learning, identification, reinforcement learning, computer system.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Check Point Research. The 2020 Cyber Security Report. Available at: https:\/\/research.checkpoint.com\/2020\/the-2020-cyber-security-report\/ (\u0430ccessed 25.03.2020).<\/li>\n<li>Kharchenko, V., Illiashenko, O., Brezhnev, E., Boyarchuk, A., Golovanevskiy, V.A. (2014). Security Informed Safety Assessment of Industrial FPGA-Based Systems.<\/li>\n<li>FBI. Cyber Crime. Available at: https:\/\/www.fbi.gov\/investigate\/cyber (\u0430ccessed 25.03.2020).<\/li>\n<li>\u041b\u0438\u0441\u0435\u043d\u043a\u043e \u0421.\u041c. \u041c\u0435\u0442\u043e\u0434\u0438 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0431\u043e\u0442-\u043c\u0435\u0440\u0435\u0436 \u0432 \u043a\u043e\u043c\u043f&#8217;\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \/ \u0421.\u041c. \u041b\u0438\u0441\u0435\u043d\u043a\u043e, \u041a.\u042e.\u00a0\u0411\u043e\u0431\u0440\u043e\u0432\u043d\u0456\u043a\u043e\u0432\u0430, \u0412.\u0421. \u0425\u0430\u0440\u0447\u0435\u043d\u043a\u043e \/\/ \u0421\u0443\u0447\u0430\u0441\u043d\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438. \u2013 2019. \u2013 \u0422. 3. \u2116 4. \u2013 \u0421. 87\u201395.<\/li>\n<li>Rai A. D., Ward S., Roy S. Warnick, Vulnerable links and secure architectures in the stabilization of networks of controlled dynamical systems. In: Proceedings of the 2012 American Control Conference, Montreal, QC (Canada, 2012). 2012. P. 27\u201329.<\/li>\n<li>Naval S., Laxmi V., Rajarajan M., et al. Employing program semantics for malware detection. IEEE Trans Inform Forens Secur. 2015. Vol.10. No.12. P. 2591\u20132604. https:\/\/doi.org\/10.1109\/TIFS.2015.2469253<\/li>\n<li>Wang S.W., Wang B.S., Yong T., et al. Malware clustering based on SNN density using system calls. Proc 1st Int Conf on Cloud Computing and Security, 2015. P. 181\u2013191. https:\/\/doi.org\/10.1007\/978-3-319-27051-7_16<\/li>\n<li>Wang Z., Fei M., Du D., Zheng M. Decentralized event-triggered average consensus for multi-agent systems in CPSs with communication constraints, IEEE\/CAA J. Autom. Sin. 2015. Vol. 2. No. 3. P. 248\u2013257.<\/li>\n<li>Liu L., Wang B.S., Yu B., et al. A novel selective ensemble learning based on K-means and negative correlation. Proc 2nd Int Conf on Cloud Computing and Security, 2016. P. 578\u2013588. https:\/\/doi.org\/10.1007\/978-3-319-48674-1_51.<\/li>\n<li>Liu L., Esmalifalak M., Ding Q., Emesih V.A., Han Z. Detecting false data injection attacks on power grid by sparse optimization, IEEE Trans. Smart Grid. 2014. Vol. 5. No. 2. P. 612\u2013621.<\/li>\n<li>Liu Y., Xin H., Qu Z., Gan D. An attack-resilient cooperative control strategy of multiple distributed generators\u00a0 in distribution networks, IEEE Trans. Smart Grid. 2016. Vol. 7. No. 6. P. 2923\u20132932.<\/li>\n<li>Zhao Z.Q., Wang J.F., Bai J.R. Malware detection method based on the control-flow construct feature of software. IET Inform Secur. 2014. Vol. 8. No. 1. P. 18\u201324. https:\/\/doi.org\/10.1049\/iet-ifs.2012.0289.<\/li>\n<li>Ding D.G., Wei S., Zhang Y., Liu F.E. Alsaadi, On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors, Neurocomputing. 2017. Vol.\u00a0 219.\u00a0 P. 99\u2013106.<\/li>\n<li>Ding D., Shen Y., Song Y., Wang Y., Gen J. Recursive state estimation for discrete time-varying stochastic nonlinear systems with randomly occurring deception attacks, Int. Syst. 2016. Vol. 45. No. 5. P. 548\u2013560.<\/li>\n<li>Ding D., Wang Z., Ho D.W.C., Wei G., Observer-based event-triggering con- sensus control for multi-agent systems with lossy sensors and cyber attacks, IEEE Trans. Cybern. 2017. Vol. 47. No. 8. P. 1936\u20131947.<\/li>\n<li>Cen L., Gates C. S., Si L., et al., A probabilistic discriminative model for Android malware detection with decompiled source code. IEEE Trans Depend Sec Comput. 2015. Vol.12. No.4. P. 400\u2013412. https:\/\/doi.org\/10.1109\/TDSC.2014.2355839.<\/li>\n<li>Zhang H., Yao D.F., Ramakrishnan N., et al. Causality reasoning about network events for detecting stealthy malware activities. Comput Secur. 2016. Vol. 58. P. 180\u2013198. https:\/\/doi.org\/10.1016\/j.cose.2016.01.002<\/li>\n<li>Zhang H., Cheng P., Shi L., Chen J. Optimal denial-of-service attack scheduling in cyber-physical systems, Technical Report, Zhejiang University, 2015. (On-line). http:\/\/www.sensornet.cn\/heng\/Hengestimation Full.pdf.<\/li>\n<li>Zhang H., Shu Y., Cheng P., Chen J. Privacy and performance trade-off in cyber-physical systems, IEEE Netw. 2016. Vol. 30. No. 2. P. 62\u201366.<\/li>\n<li>Maruthupandi, J., Vimala Devi, K. Multi-label text classification using optimized feature sets. Int. J. of Data Mining, Modelling and Management, 2017. Vol. 9, No. 3, . 237\u2013248.<\/li>\n<li>Buffet, O., Dutech, A., Charpillet, F. Shaping multi-agent systems with gradient reinforcement learning, Autonomous Agents and Multi-Agent Systems, 2007, Vol. 15, No. 2, p. 197\u2013220.<\/li>\n<li>Azhagusundari, B., Thanamani, A.S. Feature selection based on information gain, International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2013,Vol. 2, No. 2, p. 2278\u20133075.<\/li>\n<li>Morales, E.F. and Zaragoza, J.H. An introduction to reinforcement learning\u2019, in Sucar, L.E., Morales, E.F. and Hoey, J. (Eds.): Chapter in Decision Theory Models for Applications in Artificial Intelligence: Concepts and Solutions, 2012, Vol. 19, No. 4, p. 639\u2013668, IGI Global.<\/li>\n<\/ol>\n<p>24.\u00a0Canadian Institute for Cybersecurity. Malware dataset, https:\/\/www.unb.ca\/cic\/datasets\/botnet.html (April 7, 2020).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u041c\u0415\u0422\u041e\u0414 \u0406\u0414\u0415\u041d\u0422\u0418\u0424\u0406\u041a\u0410\u0426\u0406\u0407 \u0428\u041f\u0418\u0413\u0423\u041d\u0421\u042c\u041a\u041e\u0413\u041e \u041f\u0420\u041e\u0413\u0420\u0410\u041c\u041d\u041e\u0413\u041e \u0417\u0410\u0411\u0415\u0417\u041f\u0415\u0427\u0415\u041d\u041d\u042f \u0412 \u041a\u041e\u041c\u041f\u2019\u042e\u0422\u0415\u0420\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425 METHOD FOR THE SPYWARE IDENTIFICATION IN THE COMPUTER SYSTEMS \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 43-49. \u041d\u043e\u043c\u0435\u0440: \u21163, 2020 (285) \u0410\u0432\u0442\u043e\u0440\u0438: \u0421. \u041c. \u041b\u0418\u0421\u0415\u041d\u041a\u041e, \u0412. \u042e. \u041e\u041c\u0415\u041b\u042c\u042f\u041d\u0415\u041d\u041a\u041e, \u0420. \u0412. \u0429\u0423\u041a\u0410 \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 S. LYSENKO, V. OMELIANENKO, R. SHCHUKA Khmelnytskyi National University DOI: https:\/\/www.doi.org\/10.31891\/2307-5732-2020-285-3-7 \u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : 04.05.2020 \u0440. \u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed : 01.06.2020 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[16],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1399"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1399"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1399\/revisions"}],"predecessor-version":[{"id":4098,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1399\/revisions\/4098"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}