Conceptual Approaches to the Assessment of the Effectiveness of Cyber Warfare in Military Information and Communication Systems
Abstract
Purpose. To analyze, generalize, systematize, and compare conceptual approaches to assessing the effectiveness of conducting cyber warfare in military information and communication systems, including relevant information technologies and mathematical models.
Method. General scientific theoretical research methods were employed, including analysis, generalization, systematization, and comparison, which enable a comprehensive examination of the key features and differences among conceptual approaches to assessing the effectiveness of conducting cyber warfare in military information and communication systems.
Practical implications: It is determined by the possibility of applying the research results in the development and improvement of decision support systems, mathematical models of specific cyber warfare processes, the planning of cyber defense measures, and the assessment of the effectiveness of actions within the framework of contemporary hybrid military conflicts.
Future research. Consist in the implementation of the obtained results into the practice of modeling and assessing the effectiveness of the course and outcomes of conducting cyber warfare by military command authorities at all levels of command.
Paper type. Theoretical.
Downloads
References
Semenenko, O., Kirsanov, S., Movchan, A., Sliusarenko, M., & Horhulenko, V., (2025). Addressing the Legal Gaps in AI Regulation for National Security: The Case of Ukraine’s Defense Sector. Law, State and Telecommunications Review, 17(2), 56–85. https://doi.org/10.26512/lstr.v17i2.56351.
Liu M., Shore M., Yeoh W., Jiang F., Zeadally S., (2025). Toward effective cybersecurity management: a hierarchical process model with performance assessment, Journal of Cybersecurity, Vol. 11 (1). https://doi.org/10.1093/cybsec/tyaf020.
S. Kumar, G. Nagar. Threat Modeling for Cyber Warfare Against Less Cyber-Dependent Adversaries. Vol. 23 No. 1 (2024): Proceedings of the 23rd European Conference on Cyber Warfare and Security, 27–28 June 2024, p. 257–264. https://doi.org/10.34190/eccws.23.1.2462.
Kalaida Yu. P., (2025) Hybrid cyberattacks in the conditions of the ukrainian-russian cyberwar. Informatsiia i pravo, vol. 55 (4), p. 206–214. https://doi.org/10.37750/2616-6798.2025.4(55).346481.
Hryschuk, R. V., Danyk, Yu. H., (2016). Fundamentals of cyber security: a monograph. Zhytomyr: ZhNAEU.
Semenenko O., Palamarchuk S., Poberezhets T., Palamarchuk N., Mytchenko S., (2025). Cybersecurity in Modern Armed Conflicts: Threats and Responses. International Journal of Advances in Soft Computing and its Applications. 2025. № 17(1). P. 32. https://doi.org/10.15849/IJASCA.250330.03.
Hrabar, I. H., Hryshchuk, R. V., & Molodetska, K. V. (2019). Bezpekova synerhetyka: kibernetychnyi ta informatsiinyi aspekty. Hryshchuk, R. V. (Ed.). Zhytomyr: ZhNAEU.
Khoroshko V., Shelest M., Tkach Yu., (2021). Multialternative detection of cyberattacks in information networks. Ukrainian Scientific Journal of Information Security, vol. 27 (3), p. 136–140. https://doi.org/10.18372/2225-5036.27.16515.
Mazulevskyi, O. Ye., Zholobovych, N. V., (2024). Assessment of the current state of cyber resilience, taking into account the situation in cyberspace. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony. 3(51), 34–40. https://doi.org/10.33099/2311-7249/2024-51-3-34-40.
Park J., Kim D., Shin D. Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE (Measure of Cyber Effectiveness)., (2019). Journal of the Korea Institute of Information Security & Cryptology. Vol. 2 (29). P. 465–472. https://doi.org/10.13089/JKIISC.2019.29.2.465.
Murasov R., Pharaon S., Huk O., (2025) Critical infrastructure cybersecurity: assessment and management of cyberattack risks. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony, vol. 54 (3), p. 75–83. https://doi.org/10.33099/2311-7249/2025-54-3-75-83.
Danyk Y., Shestakov V., Labunets V., (2025). Analysis, assessment, and forecasting of the development of robotics in contemporary and future military conflicts. Zbirnyk naukovykh prats Kharkivskoho natsionalnoho universytetu Povitrianykh Syl, vol. 83 (1), p. 89–97. https://doi.org/10.30748/zhups.2025.83.11.
Snitsarenko, P. M., Sarychev, Yu. O., Hordiichuk, V. V., (2024). On the essence of cyber space and its relationship with cybernetic space. Suchasni informatsiini tekhnolohii u sferi bezpeky ta oborony. 50 (2). 5–10. https://doi.org/10.33099/2311-7249/2024-50-2-5-10.
Vdovenko, S. H, Danyk, Yu. H, Faraon, S. I., (2019). Definitive problems of the Terms of the Sphere of Cyber security and Cyber Defense and the Ways of their solution. Kompiuterni nauky ta kiberbezpeka. 13 (1). 17–29. https://doi.org/10.26565/2519-2310-2019-1-02.
Abstract views: 126 PDF Downloads: 124
Copyright (c) 2026 Оleksіі Solomitskyі, Yaroslav Yankovyi, Yuzef Dobrovolskyi, Artem Semenenko, Alevtyna Hetman, Volodimir Musienko

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).












