<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Protection of Information from Leakage by Technical Channels for Sources with Non Range Distribution of Probability</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Warsaw University of Technology</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Institute of Automatic Control</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Robotics</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Warsaw</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Poland i.korobiichuk@mchtr.pw.edu.pl</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National scientific research institute of special communications and information protection of Ukraine</institution>
          ,
          <addr-line>Kyiv, 03142</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National technical university of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Institute of special communication and information protection</institution>
          ,
          <addr-line>Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Sergey Korolyov Zhytomyr Military Institute, Cybersecurity Department of the Research Center</institution>
          ,
          <addr-line>Zhytomyr, 10004</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1850</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Made reasoning of the information protection from leakage through technical channels for uneven distribution of source probabilities and set the negative sequences in case of its non-consideration. Shown relations of probability information security risk conditions with power at the input of intercept receiver and given requires analytical values, which allow to assess the risk relative to the current signal/noise ratio and for the given probability of the safety risk of the required values of the maximum allowable indicators, namely the throughput of the technical channel of leakage, the probability of correct reception with possible interception and the signal/noise ratio. These ratios differ from previously known by those that take into account the uneven distribution of the signs probability on output of the source of leakage. Ratios allow automated analysis of information security risk in real time with the use of modern information systems and technologies.</p>
      </abstract>
      <kwd-group>
        <kwd>information</kwd>
        <kwd>security</kwd>
        <kwd>protection</kwd>
        <kwd>risk</kwd>
        <kwd>information leak</kwd>
        <kwd>technical channel of leakage</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>As is well known, functioning of almost modern technical means and systems of
information processing and transfer related with quantized electromagnetic energy
which circulating by its circuit implementations using electromagnetic fields, electric
currents, optical energy, etc. Its – energy, which is the carrier of discrete data or
information in a continuous environment and, actually, within its own properties as
energy conservation law, almost always accompanied by a list of adverse effects [1-7].
These effects are: unwanted radiation of electromagnetic fields to the environment,
which can spread over long distances from hardware of information processing; the
impact of these fields to technical means, which have galvanic and other connections
with the world; leakage of information to conductive conductors of electric currents:
power supply network, grounding system, connecting lines or subscriber network of
free access [8].</p>
      <p>During processing of information with restricted access by technical means
mentioned above is a certain class of threats, which is implemented by using of special
means of interception. These special means may have different degrees of complexity
and efficiency depending on the value of the information and the interest in outsiders
knowing. The value of information is a determining factor for possible efficiency
involved in interception technical means and the degree of protection of information
from leakage.</p>
      <p>The balance of protection and threats determine the security of information, and a
measure of balance – its safety guarantee, which as a result of the natural factors
influence may be characterized by a probability of safety risk [9-11]. This probability is
an integral part, which is used by the Bayesian criterion for direct risk assessment
[1215]. A separate case of this criterion is the Kotelnikov criterion, which uses the
construction of an optimal receiver and the mathematical justification of its decisive
scheme as the best of all possible receiver circuits [16-19]. The decisive scheme
provides an opportunity to substantiate the relationship of probabilistic indicators of the
channel with the energy indices of carriers (the signal/noise ratio) at the input of the
idealized receiver. Accordingly, the application of this approach to protecting
information from leakage through technical channels may allow the justification of
signal/noise ratio limitations that are permissible in places of possible interception and
provide the desired probability of a security risk.</p>
      <p>However, the existing assessments of receivers quality, as rule, have orientation
on communication channels. It is hypothetically considered, that the best channels and
channel sources are the sources and channels that respectively produce and transmit
the largest amount of information [16, 17]. It is obvious that under these
circumstances, the assumption concerning the equivalence of source symbols, which uses the
existing substantiation of the solving schemes, is quite feasible and permissible.</p>
      <p>For receivers that can be considered as means of interception, such an assumption
is inadmissible, since for information leakage channels in comparison with
communication channels is set the opposite task, namely, the impossibility of leakage of
information [16, 17]. The real sources may have a different probability distribution.
Therefore, the security of information should be based not only on the equivalence of
source symbols, but also on uneven distribution.</p>
      <p>So, the actual task is analyzing the protection of information from leakage by
technical channels for uneven distribution of source probabilities, which should
provide reliable protection of modern technical means and systems of information
processing and transmission.
2.</p>
    </sec>
    <sec id="sec-2">
      <title>Materials and methods of research</title>
      <p>Let the technical channel of leakage be given as a discrete-continuous one (Fig. 1).
Let for simplicity as a source of information leakage is used a binary discrete source
X, which produces signs xr, where r = 1 and 2. Each of the signs in the technical
processing means is represented by the intermediation of some continuous-time signals
implementation s1(t) and s2(t). The implementation of each other is different in that,
so that the technical means can distinguish them and, accordingly, identify them with
signs x1 and x2. On the channel scheme on Fig.1 an element of this identification
appears by "modulator".
Let the implementation s1(t) та s2(t) are finite in spectrum and have the same
duration T. In the environment of the spreading a dangerous signal, forming a technical
channel of leakage, there is a noise that distorts it and prevents interception of
information. Noises can have a variety of characters of origin and influence and different
degrees of chance and the associated masking properties. The analysis of the literature
shows that most distorting effect has additive noise with normal distribution of
probabilities [1, 2, 6-8, 14-17]. Unlike the others, this type of noises is quite common in
natural environments of signal propagation, has a mathematical description of the
density of probability distribution and allows the justification of the security with a
proven guarantee of reliability [6, 7, 16, 17].</p>
      <p>Other noises also can distort signals, revealing masking property. However, the
effect of masking by them is still determined by the proximity with normal distribution
law. Otherwise, their presence is defined as a protection margin. Including this, the
masking efficiency of these noises is not taken in calculations.</p>
      <p>
        Let the normally distributed noise has additive action to a dangerous signal in the
channel, in ideally – white noise n(t). At the output of the channel is formed a mixture
which enters the receiver input:
u t    sr t    n t   cr t   n t  ,
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
where cr t    sr t   is attenuated signal with time delay;  is channel
transmission ratio;  is signal delay time in the channel.
      </p>
      <p>The task of the receiver of interception is to analyze u(t) and making a decision
yr about the sign xr at the output of the leakage source. Obviously, that the more
true this solution, then interception will be more effective and the source of
information leakage will be less protected.</p>
      <p>Probability of security risk prisk. can match the fate of information, that, without
violating of information security, is permissible can flow through by technical
channels. In accordance, this part can be providing by bandwidth - the ability of the
technical channel of leakage, expressed in relative units:
prisk. </p>
      <p>CTCL ,</p>
      <p>CTCLmax
where for a discrete symmetric channel with transmission reliability q bandwidth is
equal to [16, 17, 20, 21]:</p>
      <p>СTCL  1 q log2 q  (1 q) log2 (1 q) [bit] ,</p>
      <p>
        At that, the maximum bandwidth per expression (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) is achieved on condition q = 1
or q = 0 and equals, minimum, which is desirable for the technical channel of leakage,
provided that the probability of the false and correct character transfer is equal 1 –
q = q (Fig. 2).
      </p>
      <p>Compliance with minimum transmission reliability q = 0 and the maximum of
bandwidth can be explained by the fact that on the receiving side can be used inverter.
It will result in the redistribution of arrows on Fig. 2 and will cause compliance x1 
y2 and x2  y1. At that q must be replaced 1 – q and become equal to 1. Equality same
p = q makes the output of the channel completely uncertain, similar to the random
character generator.</p>
      <p>
        As follows, having the maximum permissible probability of information security
risk, it is possible to determine the maximum allowable bandwidth СTCL max.per. the
technical channel of leakage and by solving the equation (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) – the maximum allowed
probability of correct interception qmax. per. of one binary sign xr , r = 1 and 2.
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
Relative to the decisive scheme of the ideal receiver, by the theory of potential noise
immunity for a discrete-continuous channel, the probability of an error, which is
determined by the formula:
      </p>
      <p> 1
p  F  
 2</p>
      <p>P T 
  ,
N0 
where F(…) – Laplace integral:</p>
      <p>F   
1    2 </p>
      <p> exp  d ,
2   2 
Р is the power of the difference signal c (t )  c1 (t)  c2 (t) :</p>
      <p>P 
1 T</p>
      <p> c2 (t)dt ,
T 0</p>
      <p> 1
q  1  p  F 
 2</p>
      <p>
        P T 
  ,
N0 
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
where N0 – spectral density of noise in the technical channel of leakage.
      </p>
      <p>In accordance, the authenticity of receiving a binary sign will be based on the
formula:</p>
      <p>
        But the formula of estimation of probability of error (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) predicts the equivalence
of source symbols p(x1) = p(x2). As already noted above, for the modern means of
information processing and transmission, such an assumption can not always be
performed, and therefore founded by the formula (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) probability is not always correct.
      </p>
      <p>Provided p(x1)  p(x2) the decisive scheme must be built by implementing
inequality:</p>
      <p>p ( xl ) l / 0 (u )  p ( xr ) r / 0 (u ) ,
where k r/0 (u)  r/0 (u1, u2 ,..., uk ) – k-dimensional relation of plausibility:
k r/0 (u)  k (u / xr ) ,</p>
      <p>k (u / x0 )
where l is the index of the correct decision, х0 is mark of no sign on the output of the
source, k(u/xr) = k(u1, u2, u3,…, uk,/xr) is conditional k-dimensional density of
distribution of counts receiver reading.</p>
      <p>If the frequency spectrum of signs realizations is finite in time and is completely
concentrated in the band of frequencies F, then by the Kotelnikov theorem, the
number of readings counts can be limited to the number k = 2FT, therefore:
 r /0 (u1, u2 , ..., u2 FT ) 
 (u1 , u2 , ..., u2 FT / xr ) .</p>
      <p> (u1 , u2 , ..., u2 FT / x0 )
For r-th implementation using additivity properties of noise in the channel:
(u1,u2,...,u2FT / xr ) (u1  cr1,u2  cr2,...,u2FT cr2FT / x0) 
</p>
      <p>
        1
(
2 )2FT
 1 2FT 
 2 2  (ui  cri )2  .
exp 
i1 
Substituting ratio (
        <xref ref-type="bibr" rid="ref12">12</xref>
        ) and (
        <xref ref-type="bibr" rid="ref13">13</xref>
        ) into the formula (
        <xref ref-type="bibr" rid="ref10">10</xref>
        ), we will get:
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
(
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
(
        <xref ref-type="bibr" rid="ref13">13</xref>
        )
      </p>
      <p>
        If in the "modulator" for sign х0 is associated with so-called zero implementation
c0(t), for example, input channel gets nothing, in accordance with the formula (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) at
the output there will be only a noise process:
      </p>
      <p>u (t )  c0 (t )  n(t )  n(t ) .</p>
      <p>
        Due to the properties of white noise on the statistical independence of its
conditional density of its reading counts, the denominator of the ratio (
        <xref ref-type="bibr" rid="ref10">10</xref>
        ) can be expressed
in the form of a product of one-dimensional densities of the normal distribution law:
2FT 1
 (u1, u2,..., u2FT / x0 )  
i1 σ 2
      </p>
      <p> ui2
e 2 2 </p>
      <p>
        1
(σ 2 )2FT
 1 2FT 
 2σ2 i1 ui2  , (
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
exp 
      </p>
      <p>
 1 2FT   1 2FT 
r/0 (u1, u2 ,..., u2FT )  exp   2 2  (ui  cri )2  .
 2 2  ui2  exp 
i1  i1 </p>
      <p>Taking advantage of the property the noise ergodicity, its dispersion can be
replaced by the power expressed in terms of spectral density N0 in the bandwidth F:
 2  Pz  N0 F .</p>
      <p>
        After inclusion in the ratio (
        <xref ref-type="bibr" rid="ref14">14</xref>
        ) replacement (
        <xref ref-type="bibr" rid="ref15">15</xref>
        ) and direction t  0 the
plausibility ratio will look:
(
        <xref ref-type="bibr" rid="ref15">15</xref>
        )
(
        <xref ref-type="bibr" rid="ref16">16</xref>
        )
 1 2FT  
λr/0 (u)  lim exp   ui2t  exp 
t0  N0 i1  
1 2FT 
      </p>
      <p> (ui  сri )2 t  </p>
      <p>N0 i1 
 1 T T 
 exp   u2 (t)dt   (u(t)  cr (t))2dt  .</p>
      <p> N0  0 0 </p>
      <p>
        Substituting (
        <xref ref-type="bibr" rid="ref16">16</xref>
        ) into inequality (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) and applying a logarithm for the right and left
parts of the inequality by a natural logarithm, we get:
      </p>
      <p> 1 T T   1 T T 
p(xl )exp u2(t)dt (u(t)cl (t))2dt p(xr)exp u2(t)dt (u(t)cr(t))2dt
N0 0 0  N0 0 0 
or
1 T P</p>
      <p> u(t)cl (t)dt  l 
T 0 2</p>
      <p>N</p>
      <p>0 ln p( xl ) 
2T
1 T P</p>
      <p> u(t)cr (t)dt  r 
T 0 2</p>
      <p>N</p>
      <p>
        0 ln p( xr ) .
2T
(
        <xref ref-type="bibr" rid="ref17">17</xref>
        )
      </p>
      <p>
        In accordance with the inequality (
        <xref ref-type="bibr" rid="ref17">17</xref>
        ) the decisive scheme of an ideal receiver for
all r must calculate and compare the right and left parts and for the maximum of
found result make a decision yl about the sign xl produced by the source. Since the
right and left sides of the inequality contain random components, there are
probabilities of the existence of this and the opposite inequalities. Obviously, the probability of
inequality (
        <xref ref-type="bibr" rid="ref17">17</xref>
        ) is the probability of a correct solution, and the probability of the
opposite inequality is the probability of error.
      </p>
      <p>The probability of a correct solution on average can be found as a expected value
for all realizations r:
q  p  x1  p  y1 x1   p  x2  p  y2 x2  .</p>
      <p>
        For a binary source, if the correct solution is x1 , inequality (
        <xref ref-type="bibr" rid="ref17">17</xref>
        ) can be converted
to the form:
or
where
 
1 T P
      </p>
      <p> c (t)n(t)dt    
T 0 2</p>
      <p>N0 ln p(x1)
2T p(x2 )
 P
p( y1 / x1)  p     
 2</p>
      <p>N0 ln p( x1)  ,
2T
p(x2 ) 
T 0
1 T c (t)n(t)dt is a normally distributed random variable with expected
value М [ ]  0 and dispersion D[ ] 
3.</p>
    </sec>
    <sec id="sec-3">
      <title>The results of research</title>
      <p>Let's analyze the nature of throughput for the general case and justify communication
of maximum throughput and needed for ensure probability of errors. In this case will
suppose, that data, which simultaneously can be processed by technical means and
flow by technical channels, can have very different origins, that is generated from Q
different information sources with a different syntax and different semantics (Fig. 2).</p>
      <p>
        Expressed with the help of Laplace integrals [19, 20]:
(
        <xref ref-type="bibr" rid="ref19">19</xref>
        )
(
        <xref ref-type="bibr" rid="ref20">20</xref>
        )
(
        <xref ref-type="bibr" rid="ref21">21</xref>
        )
and
      </p>
      <p> 1
p( y1 / x1)  F 
 2</p>
      <p>PT  1
N0 2</p>
      <p>PN T0 ln pp((xx12)) 
 1
p( y2 / x2 )  F 
 2</p>
      <p>P T
 
N0
1
2</p>
      <p>PN T0 ln pp((xx12))  .</p>
      <p>
        It should be noted that if p  x1   p  x2  the formula (
        <xref ref-type="bibr" rid="ref18">18</xref>
        ) in conjunction with
(
        <xref ref-type="bibr" rid="ref20">20</xref>
        ) and (
        <xref ref-type="bibr" rid="ref21">21</xref>
        ) will match the formula (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ).
      </p>
      <p>In the case of p  x1   p  x2  were obtained the quantitative values of the
probability of correct reception for multiply-polar, orthogonal signals and signals with
zero realization. The character of the probability dependence of the correct receiving
from the attitude p( x1) presented on Fig. 3.</p>
      <p>p( x2 )
As can be seen from the graphs, with the same energy conditions on the channel
input, provided equal probability symbols on the source output p( x1)  1 the security
p( x2 )
of the multipolar signals is less (the probability of correct receiving is greater) than
for orthogonal signals and signals with zero realization. Provided unequal
probabilities of signs p( x1)  1 there is a tendency to decrease security (increases of
probabilp( x2 )
ity of correct receiving). At that a large variation of the signs probability, for example
p(x1)  20 for signals with zero realization, leads to increased probability of correct
p( x2 )
reception compared to orthogonal and different polar signals. Probabilities is
receiving for the last two with this distortion are same.</p>
      <p>
        It should also be noted, that with an increase in the distortion of probabilities of
signs of the probability of correct receiving approaching the greater probability of
signs. This is not difficult to explain using the formula (
        <xref ref-type="bibr" rid="ref18">18</xref>
        ), taking p  y1 x1   1
and p  y2 x2   0 . So, according to the formula (
        <xref ref-type="bibr" rid="ref18">18</xref>
        ):
      </p>
      <p>q  p  x1  1  p  x2   0  p  x1  .</p>
      <p>An analysis of the dependence of the probability of a correct reception on the
signal/noise ratio under the condition of strong distortion of the signs probabilities (Fig.
4).
It is shown that with increasing the level of noise in relation to the signal under the
ability of correct receiving usually decreases. In the case of strong distortion of signs
probabilities, for example, when p(x1)  20 , under the same conditions with an
inp( x2 )
crease in the level of noise in relation to the signal there is an opposite effect –
increasing of correct receiving probability. That is, with a strong distortion of the signs
probability increasing the noise over the signal does not improve the masking of a
dangerous signal, but on the contrary - improves the conditions for interception.</p>
      <p>Thus, made reasoning of the information protection from leakage through
technical channels for uneven distribution of source probabilities and set the negative
sequences in case of its non-consideration. Shown relations of probability information
security risk conditions with power at the input of intercept receiver and given
requires analytical values. These resulting formulas provide for the use of intermediate
indicators: the throughput of the technical channel of information leakage and the
probability of correct reception of messages relative to the ideal receiver.</p>
      <p>The resulting ratios allow estimating the information security risk related on the
current signal/noise ratio for the given probability of risk the required values of the
maximum allowable indicators, for example, the throughput of the technical channel
of leakage, the probability of correct receiving with possible interception and the
signal/noise ratio. These ratios differ from previously known by those that take into
account the uneven distribution of the signs probability on output of the source of
leakage. This unequal signs probability can take place in practice, and therefore should be
taken into account in the calculation of the protection of real hardware, information
processing and transmission systems.</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>Ratios allow automated analysis of information security risk in real time with the
use of modern information systems and technologies. Their use has obtained practical
results that show the dependence of the probability of true interception from ratio of
probabilities of signs at the source output and the signal/noise ratio at the input of the
ideal receiver. It is shown that in the case of a strong distortion of the signs
probabilities, the masking influence of the noises changes to the opposite than for the equal
probabilities of these signs. That is, increasing the level of noise does not increase, but
reduces security.</p>
      <p>The above is advisable to take into account in the calculation of security
information from its leaks.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Buzov</surname>
            ,
            <given-names>G.А.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinin</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratev</surname>
          </string-name>
          , А.V.:
          <article-title>Protection of information from leaks through technical channels</article-title>
          . Goryachaya liniya, Telecom: Moskva (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Parshutkin</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levin</surname>
            ,
            <given-names>D.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaytsev</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Egin</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          :
          <article-title>Application of structural interference for data protection from information Leakage in the stray electromagnetic radiations channel</article-title>
          .
          <source>SPIIRAS Proceedings</source>
          ,
          <volume>3</volume>
          (
          <issue>58</issue>
          ), pp.
          <fpage>160</fpage>
          -
          <lpage>181</lpage>
          (
          <year>2018</year>
          ) doi: 10.15622/sp.58.7
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Kuhn</surname>
            <given-names>G</given-names>
          </string-name>
          .
          <article-title>Compromising emanations: eavesdropping risks of computer displays</article-title>
          .
          <source>This technical report is based on a dissertation</source>
          submitted
          <article-title>June 2002 by the author for the degree of Doctor of Philosophy to</article-title>
          the University of Cambridge, Wolfson College, (
          <year>2002</year>
          ) http://www.cl.cam.ас.uk/techreports.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Kuhn</surname>
            ,
            <given-names>M.G.</given-names>
          </string-name>
          :
          <article-title>Electromagnetic eavesdropping risks of flat-panel displays</article-title>
          .
          <source>Lecture Notes in Computer Science</source>
          ,
          <volume>3424</volume>
          , pp.
          <fpage>88</fpage>
          -
          <lpage>107</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Kuhn</surname>
            ,
            <given-names>M.G.</given-names>
          </string-name>
          :
          <article-title>Optical time-domain eavesdropping risks of CRT displays</article-title>
          .
          <source>Proceedings - IEEE Symposium on Security and Privacy</source>
          , 2002-January, art. no.
          <issue>1004358</issue>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>18</lpage>
          (
          <year>2002</year>
          ) doi: 10.1109/SECPRI.
          <year>2002</year>
          .1004358
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Lenkov</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peregudov</surname>
            ,
            <given-names>D.А.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horoshko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>А</surname>
          </string-name>
          .:
          <article-title>Methods and means of information protection</article-title>
          .
          <source>Tom І. Unauthorized receipt of information. Ariy: Kyiv</source>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Qiu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication</article-title>
          .
          <source>Computers and Security</source>
          ,
          <volume>82</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          (
          <year>2019</year>
          ) doi: 10.1016/j.cose.
          <year>2018</year>
          .
          <volume>12</volume>
          .003
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Korobiichuk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dobrzhansky</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kachniarz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Remote control of nonlinear motion for mechatronic machine by means of CoDeSys compatible industrial controller</article-title>
          .
          <source>Tehnički vjesnik/Technical Gazette</source>
          , Vol.
          <volume>24</volume>
          /No. 6, pp.
          <fpage>1661</fpage>
          -
          <lpage>1667</lpage>
          (
          <year>2017</year>
          ) doi: 10.17559/TV20151110164217
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. Information technology.
          <source>Security techniques. Information security management systems. Requirements [ISO/IEC</source>
          <volume>27001</volume>
          :
          <year>2013</year>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Korobiichuk</surname>
            <given-names>I.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hryshchuk</surname>
            <given-names>R.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horoshko</surname>
            <given-names>V.O.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Hokhlacheva</given-names>
            <surname>Yu</surname>
          </string-name>
          .E.
          <article-title>Self-diagnostics of complex systems with a software-configurable structure</article-title>
          .
          <source>Informatics and Mathematical Methods in Simulation</source>
          , vol
          <volume>8</volume>
          ,
          <source>No. 1</source>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>47</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Korobiichuk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hryshchuk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mamarev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Okhrimchuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kachniarz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Cyberattack Classificator Verification.
          <source>International Conference on Diagnostics of Processes and Systems DPS</source>
          <year>2017</year>
          :
          <article-title>Advanced Solutions in Diagnostics and Fault Tolerant Control</article-title>
          , pp.
          <fpage>402</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2018</year>
          ) doi: 10.1007/978-3-
          <fpage>319</fpage>
          -64474-5_
          <fpage>34</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Ivanovsky</surname>
            ,
            <given-names>R.I.</given-names>
          </string-name>
          :
          <article-title>Theory of probability and mathematical statistics</article-title>
          . BHV:
          <string-name>
            <surname>Petersburg</surname>
          </string-name>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Niyato</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hossain</surname>
          </string-name>
          , E.:
          <article-title>A queuing-theoretic and optimization-based model for radio resource management in IEEE 802.16 broadband wireless networks</article-title>
          .
          <source>IEEE Transactions on Computers</source>
          ,
          <volume>55</volume>
          (
          <issue>11</issue>
          ), pp.
          <fpage>1473</fpage>
          -
          <lpage>1488</lpage>
          (
          <year>2006</year>
          ) doi: 10.1109/TC.
          <year>2006</year>
          .172
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Isakov</surname>
            ,
            <given-names>V.N.</given-names>
          </string-name>
          :
          <article-title>Statistical theory of radio engineering systems</article-title>
          . ARI:
          <string-name>
            <surname>Moskva</surname>
          </string-name>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Couillet</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Debbah</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Random matrix methods for wireless communications</article-title>
          .
          <source>Random Matrix Methods for Wireless Communications</source>
          ,
          <volume>9781107011632</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>539</lpage>
          (
          <year>2011</year>
          ) doi: 10.4324/CBO9780511994746
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Burachenko</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zavaryn</surname>
            ,
            <given-names>H.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kliuev</surname>
            ,
            <given-names>N.Y.</given-names>
          </string-name>
          , et. al.:
          <article-title>General Theory of communication</article-title>
          .
          <source>VАS: Leningrad</source>
          (
          <year>1970</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neifeld</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ashok</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Capacity of electromagnetic communication modes in a noise-limited optical system</article-title>
          .
          <source>Applied Optics</source>
          ,
          <volume>55</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>1333</fpage>
          -
          <lpage>1342</lpage>
          (
          <year>2016</year>
          ) doi: 10.1364/AO.55.001333
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Ivanchenko</surname>
            ,
            <given-names>S.О.</given-names>
          </string-name>
          :
          <article-title>Justification safety risk information about its security from leaking by technical channels. Scientific and technical digest "Legal, regulatory and metrological support of information security in Ukraine", NTUU "KPI" SRC "Tezis"</article-title>
          : Kyiv, №
          <volume>1</volume>
          (
          <issue>31</issue>
          ), pp.
          <fpage>9</fpage>
          -
          <lpage>13</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Duc</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faust</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Standaert</surname>
            ,
            <given-names>F.-X.</given-names>
          </string-name>
          :
          <article-title>Making masking security proofs concrete: Or how to evaluate the security of any leaking device</article-title>
          .
          <source>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          , 9056, pp.
          <fpage>401</fpage>
          -
          <lpage>429</lpage>
          (
          <year>2015</year>
          ) doi: 10.1007/978-3-
          <fpage>662</fpage>
          -46800-5_
          <fpage>16</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Fink</surname>
            ,
            <given-names>L. М.</given-names>
          </string-name>
          :
          <article-title>The theory of transfer of discrete messages</article-title>
          . [2-d edition],
          <source>Sov. Radio: Moskva</source>
          (
          <year>1970</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Kulkarni</surname>
            ,
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bukate</surname>
            ,
            <given-names>R.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nanaware</surname>
          </string-name>
          , S.D.:
          <article-title>Study of Various Attacks and Routing Protocols in MANETS</article-title>
          . 2018 International Conference on Information, Communication, Engineering and Technology,
          <string-name>
            <surname>ICICET</surname>
          </string-name>
          <year>2018</year>
          ,
          <article-title>art</article-title>
          . no.
          <issue>8533696</issue>
          (
          <year>2018</year>
          ) doi: 10.1109/ICICET.
          <year>2018</year>
          .8533696
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Bronshtein</surname>
            ,
            <given-names>Y.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semendiaev</surname>
            ,
            <given-names>K.A.:</given-names>
          </string-name>
          <article-title>Handbook on mathematics for engineers and students of high schools</article-title>
          .
          <source>Nauka: Moskva</source>
          , Ch. ed.
          <source>Phys-Math. Lit</source>
          . (
          <year>1986</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Ram</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davim</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          : Mathematics applied to engineering. Mathematics Applied to Engineering, pp.
          <fpage>1</fpage>
          -
          <lpage>210</lpage>
          (
          <year>2017</year>
          ) doi: 10.1016/C2015-0-06715-6
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>