<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Development  Of  A  Method  For  Detecting  Deviations  In  The  Nature  Of  Traffic  From  The  Elements  Of  The  Communication  Network </article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Laptiev</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Lukova-Chuiko</string-name>
          <email>lukova@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Laptiev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana Laptieva</string-name>
          <email>tetiana1986@ukr.net</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitaliy Savchenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Yevseiev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Simon Kuznets Kharkiv National University of Economics</institution>
          ,
          <addr-line>9-А Nauky ave., Kharkiv, 61166</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Telecommunications</institution>
          ,
          <addr-line>7 Solomenska str., Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>24 Bogdana Gavrilishina str., Kyiv, 04116</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>   The article presents an analysis that showed the lack of scientific and methodological apparatus, universal devices or automated software packages to ensure the prompt implementation of traffic analysis and information transfer to automated systems or relevant specialists. A new developed method is proposed to ensure the prompt implementation of traffic analysis and information about situations that are suspicious and require further detailed analysis by automated systems or relevant specialists. The developed method allows to carry out operative (real-time) informing of responsible specialists, or transfer of necessary data to the automated complex, about deviation of character of traffic from network elements (separate telephone numbers, number capacities, trunk groups, etc.) which is fixed in primary data. Deviations, the nature of traffic from the elements of network parameters are measured from the usual traffic of the telephone network relative to these elements. This method has a methodology that takes into account practical recommendations for constant coefficients, calculations. These coefficients are selected by calculation and empirical. This reduces the response of the system using the developed technique to the deviation of the communication parameters.</p>
      </abstract>
      <kwd-group>
        <kwd> 1  traffic deviation</kwd>
        <kwd>coefficient</kwd>
        <kwd>communication</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction </title>
      <p>
        According to the latest research by the World
Association for the Control of Telecommunication
Network Violations (CFCA), in 2017 the losses
from violations in the telecommunications industry
amounted to 74.4-90 billion. This is approximately
model, telecommunication
networks,
primary
data,
57% more than the figure obtained in CFCA
studies three years ago [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Violations on
telecommunications networks are actions of
subscribers, telecommunications operators or third
parties that are aimed at obtaining
telecommunications services at a lower rate or
without payment. CFCA experts count about 200
types of violations on telecommunications
networks. The most common violations by
subscribers are third-party connection to the
subscriber line in order to receive free telematics
services «900», the implementation of long-term
international calls, the organization of
unauthorized negotiation points [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. It is a
violation on the part of third parties to use
hardware and software to obtain international
traffic from the Internet and complete it on a public
telecommunications network under the guise of.
      </p>
      <p>local, which leads to interference in the work of
communications, substitution of call information.
On the part of operators, the most common is the
unauthorized, without relevant agreements,
termination of incoming long-distance and
international traffic to the public network under the
guise of local. Abuses lead to loss of revenue,
subscriber complaints and disruption of
telecommunications networks.</p>
      <p>
        The fight against abuse on telecommunications
networks is largely based on the analysis of data on
services and data contained in payment systems
with subscribers and operators [
        <xref ref-type="bibr" rid="ref4 ref5 ref6 ref7">4, 5-7</xref>
        ]. Detection
of suspicious actions of subscribers and their
analysis is the main principle of modern systems of
protection against violations (Fraud Management
System, FMS). The key criteria for FMS efficiency
are speed of operation, flexibility of debugging
algorithms that provide incident detection and
analysis, and the availability of standardized
interfaces for integration with billing platforms and
the Customer Relationship Management System
(CRM).
      </p>
    </sec>
    <sec id="sec-2">
      <title>1.1 Literature analysis and problem  statement   </title>
      <p>A significant number of publications are
devoted to the task of ensuring the prompt
implementation of the analysis of communication
traffic.</p>
      <p>
        Thus, in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] considers the analysis of
communication traffic with different technical
parameters, which unites only one thing - they can
only show and (at best) store panoramas of signals
in the communication network. They do not solve
the problem of communication traffic analysis at
all.
      </p>
      <p>
        The article [
        <xref ref-type="bibr" rid="ref10 ref9">9,10</xref>
        ] presents the results of the
study of SS7 network security. The Signaling
System 7 standard is used to exchange service
information between network devices in
telecommunications networks. At the time this
standard was being developed, only fixed line
operators had access to the SS7 network, so
security was not a priority. Today, the signaling
network is no longer as isolated, so an attacker,
who in one way or another gained access to it, has
the opportunity to exploit security vulnerabilities
in order to listen to voice calls, read SMS, steal
money from accounts, bypass billing systems or
affect the operation of the mobile network.
However, no real protection is offered.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14">11-14</xref>
        ] the development of mobile
communication over the last decade is considered.
It is noted that there has been huge progress in the
field of wireless communications and especially in
the field of 4G cellular networks. However, it will
take several years to fully switch to 4G systems,
and work has already begun on 5G technologies
and their problems. Network security issues are not
addressed.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref15 ref16">15,16</xref>
        ] it is said that the effective work of
employees is one of the main conditions for the
company's success. Uncontrolled access of
employees to the Internet can be a serious obstacle
to this. Without proper control, an average of up to
a third of working time can be spent visiting
nonwork-related resources. That is why it is important
to set up Internet traffic control and use a traffic
counter. Protection and proper control over mobile
telephone communication has not been properly
considered and described [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>Thus, the most critical for the operator are:
violation of the routing of long-distance and
international calls, detection of subscriber numbers
on outgoing local traffic, activity of operators on
incoming local traffic, similar to the operation of
gateways to complete incoming long-distance and
international traffic, detection of changes in
activity of subscriber numbers, which may be
evidence of third-party connection to the
subscriber line or actions of the subscriber that
potentially lead to complaints, non-payment for
services and debt write-off. Automated analysis of
data on services must be operational.</p>
      <p>From the analysis of modern literature it can be
concluded that there are almost no universal
devices or automated software to ensure the rapid
implementation of traffic analysis and information
transmission by automated systems or relevant
specialists. Therefore, the topic of developing a
method designed to ensure the rapid
implementation of traffic analysis and information
about situations that are suspicious and require
further detailed analysis by automated systems or
relevant specialists, the method of informing
responsible professionals is relevant and very
important.</p>
      <p>Thus, the development of a method designed to
ensure the prompt implementation of traffic
analysis and information about situations that are
suspicious and require further detailed analysis by
automated systems or relevant specialists, the
method of informing responsible professionals is
very relevant.</p>
    </sec>
    <sec id="sec-3">
      <title>2. The material and methods </title>
      <p>The operation of violation detection
mechanisms is based on the processing of records
of network-registered CDR events (Call Detail
Record). The anti-fraud system looks for
noncompliance with certain conditions or
noncompliance with a given pattern, the characteristics
of the subscriber's behavior. When the detection
module finds one of the anomalies, it generates a
warning message.</p>
      <p>Typical conditional checks for FMS systems
include:</p>
      <p>1. Non-existent numbering (calling party
number «A»)</p>
      <p>2. Verification of authorization, temporary
blocking of number «A»
3. Correspondence to the set template
4. Checking the «black and white lists»
5. Frequently repeated subscriber numbers «A»
or «B»
6. Check the connection duration
7. Verification of suspicious calls from «A»
subscribers for inclusion in the list of «B»
subscribers who most often receive calls from
abroad.</p>
      <p>8. Changes in the intensity of signal and
information load.</p>
      <p>The search for a given template is based on
traffic patterns that are created for each
telecommunications operator. The difference
between the existing signal and information traffic
and the template indicates a possible violation. An
additional use of templates is to compile a profile
of the subscriber (telecommunications operator) of
the attacker and search for compliance with such a
profile among existing subscribers
(telecommunications operators). Profiles can
contain such characteristics as:
• activity during the day;
• activity in the evening;
• activity at night;
• volumes of outgoing traffic to mobile phones;
• volumes of outgoing traffic to fixed local
numbers (including frequently used numbers);
• volumes of outgoing traffic to fixed numbers
in other cities (including frequently used numbers);
• volumes of outgoing traffic to fixed numbers
in other countries (including frequently used
numbers);
• number range of the operator;
• average number of connections over time;
• average amount of traffic over time;
• average connection duration;
• number of unique numbers;
• characteristic directions.</p>
      <p>The most critical for the Customer in terms of
reducing revenue loss are: violation of the routing
of long-distance and international calls, detection
of subscriber numbers on outgoing local traffic,
activity of operators on incoming local traffic,
similar to the operation of gateways to complete
incoming long-distance and international traffic in
the activity of subscriber numbers, which may be
evidence of third-party connection to the
subscriber line or actions of the subscriber that
potentially lead to complaints, non-payment for
services and debt write-off. Automated analysis of
data on services must be operational. Thus, at this
stage it is important to develop a method designed
to analyze traffic and inform about situations that
are suspicious and require further detailed analysis
by automated systems or relevant specialists.</p>
      <p>The main tasks in developing the method will
be:</p>
      <p>1. Debugging the elements of the
telecommunications network. Automatic or with
the participation of the operator</p>
      <p>2. Providing automatic analysis, data
classification, search for deviations of behavior of
elements of a telecommunication network from a
usual profile.</p>
      <p>3. Creation of an detection algorithm based on
the features of violations that create a dynamic
over time impact on the network, causing
anomalous phenomena.</p>
      <p>4. Development of a graphical display of
changes in quantitative characteristics over a
period of time.</p>
      <p>5. Estimation of conformity of parameters of
anomalies (non-existent number, big duration of a
call, etc.) to the values characteristic of this type.</p>
      <p>6. Assessment of anomalies on the degree of
probability of violation to determine the priority of
response.</p>
      <p>7. Development of information on the detection
of deviations and events.</p>
      <p>8. Development of a user-friendly operator
interface.</p>
      <p>Block detection scheme, which is based on the
characteristics of violations, it is possible to
present in Figure 1.
practical results, these values can be changed by
the operator. In addition, the use of some profile
parameters and anomaly calculations may be
impossible or impractical, and others may need to
be added.</p>
      <p>Traffic will be estimated as the average daily
number of seconds of connections:
Figure 1: Block diagram of detection of estimates 
of profile anomalies for detection of violations </p>
      <p>To assess the quantitative characteristics of the
object and the dynamics of changes over time, it is
proposed to use the method of exponential
averages with different smoothing coefficients:
1
, 
(1) 
where:</p>
      <p>Q is the exponential average value;
q - new dimension;
k is the smoothing coefficient;
Δt - interval between measurements;</p>
      <p>The formula uses a constant interval of
measurements. The profile correction for each call
is complex, because in this case the smoothing
factor is a complex exponential function of the
measurement interval. However, the features of the
parameters allow the use of simpler formulas.</p>
      <p>The optimal number of average values and
values of smoothing coefficients for each
parameter can be obtained experimentally. To
begin with, it is assumed to use for each parameter
three values with coefficients k = 0.3; 0.05 and
0.005 with a focus on the daily interval of
measurements.</p>
      <p>For all the parameters and coefficients used
below, the values that can be used in the
development are presented, but when obtaining
And
1
And</p>
      <p>Qt  (1  k</p>
      <p>)Qtt  kT ,
t
where:</p>
      <p>T is the duration of connections in seconds;
Δt - time between the ends (beginnings) of the
previous and new call in seconds.</p>
      <p>The following types of traffic are provided for
analysis:
- local outgoing
- long distance outgoing
- international outgoing
- input</p>
      <p>We suggest estimating the intensity of the call
flow as the average daily number of connection
attempts:
t  86400   (4) 
,
86400</p>
      <p>t
Qt  (1  k)Qtt  kT
, if t  86400
(5) 
where:</p>
      <p>T is the duration of connections in seconds;
Δt - time by the ends (beginnings) of the
previous and new call in seconds.</p>
      <p>It is estimated the intensity of the flow of calls:
- incoming
- outgoing
- effective.</p>
      <p>The distribution of traffic by time type is
estimated as the average daily number of seconds
of connections for working time.</p>
      <p>- working hours - 1st-5th day of the week from
8-30 to 17-30;
- non-working hours - 1st-5th day of the week
from 0-00 to 8-30 and from 17-30 to 24-00;
- 6th-7th day of the week from 0-00 to 24-00.</p>
      <p>The distribution of traffic by time of day will be
estimated as the average daily number of seconds
of connections during the day.</p>
      <p>- daytime from 7-00 to 24-00;
- night time from 0-00 to 7-00.</p>
      <p>Signal traffic is estimated as the average
number of bytes of signal information per call:
Qt  (1  k )Qtt  kB,
(6) 
where:</p>
      <p>B is the number of bytes of signal information
in the call.</p>
      <p>The instability of stable network parameters of
the object is estimated by their change from call to
call. One characteristic can be used for all
parameters.</p>
      <p>For each call:</p>
      <p>Qt  LQn1   hi ,
(7) 
where:
hi - increment levels for parameters whose
values differ in previous and subsequent calls;</p>
      <p>L is a factor that takes into account outdated
information L = 0.9.</p>
      <p>Other parameter values (if present in the CDR):
- access (ISDN, non ISDN) h = 10;
- category of the subscriber calling h = 5;
- the presence or absence of signaling
interaction when establishing a connection h = 8;
- invalid localization of the calling subscriber
(correspondence of the address to the admissible
template) h = 200;</p>
      <p>- invalid subscriber category that causes h =
100.</p>
      <p>It is necessary to provide for the possibility of
expanding and changing similar parameters in the
future, as well as the use of different characteristics
for different groups of parameters.</p>
      <p>Additional coefficients:
- is a constant additional factor that allows you
to reduce or increase the sensitivity to anomalies in
the assessment. Can only be changed by the
operator;</p>
      <p>- is a temporary additional factor that reduces
or increases the sensitivity to anomalies in the
assessment. It can be changed only by the operator,
but then automatically strive for a normal value.</p>
      <p>After each call, a temporary additional factor is
determined by:
K 2t  (1  k )K 2t t  kK 2norm
(8) 
where:
Δt - time between the ends (beginnings) of the
previous and next calls in seconds;</p>
      <p>K2norm is the normal value;
k is the smoothing coefficient, k = 0,05.</p>
      <p>Normal values for additional coefficients:
K1norm = 100, K2norm = 100.</p>
      <p>We will evaluate the anomalous behavior of the
object by the following method:</p>
      <p>The anomaly in the behavior of the object is
assessed by the overall rating, as the average of the
identified anomaly, taking into account additional
coefficients.</p>
      <p>Apr </p>
      <p>( A) * K1* K 2
( C) * K1norm * K 2norm
.</p>
      <p>(9) 
K1 - constant additional coefficient;
K2 - temporary additional coefficient.</p>
      <p>When creating an object, the field T starts the
time of the beginning of the observation, in the
field K2 - a reduced value to stabilize the
characteristics, in other fields - the default values.</p>
      <p>To determine the anomalies, use the following
method:</p>
      <p>When determining anomalies, the coefficients
and parameters common to all objects are used:</p>
      <p>C - weighting factor, taking into account the
impact of each anomaly on the overall rating;
m is a parameter that compensates for the high
uncertainty in the profiles of low-traffic objects.</p>
      <p>Traffic (A1, A2, A3, A4):
A(0.3)  C(0.3) *
A(0.05)  C(0.05)
| Q(0.3)  Q(0.05)</p>
      <p>Q(0.05)  m
Q(0.05)  Q(0.005)</p>
      <p>Q(0.05)  m
.</p>
      <p> 
(10) </p>
      <p>To determine the anomalies you need to set the
traffic parameters, set the common for all objects
coefficients and parameters of table 1 and table 2:
Table 1 
Given the weights of anomalies 
С1(0.3)  С1(0.05)  С2(0.3) </p>
      <p>1  3  20 
Table 2.  
С2(0.05) 
60 
The  specified  parameters  for  determining 
anomalies 
Where C7 (0.3) = 3 and C10 (0.05) = 10</p>
      <p>The section by time type will be performed as
follows:</p>
      <p>Total traffic:</p>
      <p> QTal (0.3)  k1(d,h)*Q8(0.3)  QTal (0.05)  k2(d)*Q8(0.05)  (18)
A8(0.3)  C8(0.3)*  QTal (0.3)  mTal QTal (0.05)  mTal 
k1(d, h), k2(d) - coefficients that take into
account the error of exponential averaging (d - day
of the week, h - hour);</p>
      <p>The coefficients that take into account the error
of exponential averaging are given in table 4 and
table 5.</p>
      <p>Table 4 
 Error  coefficients  of  exponential  averaging 
d=1,2,3 
h k1(d,h) h k 1 ( d , h ) h k1(d,h)
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15</p>
      <p>Not all objects can be further processed, but
only objects with the highest overall anomaly
rating. It is enough to process about 1% of the total.</p>
      <p>The assessment of the probability of violation,
in contrast to existing methods, will be determined
taking into account additional factors. In addition
to the high level of anomaly of the object profile,
additional factors that increase the possibility of
detecting fraud in the assessment are:
- correlation of events of anomalous objects
coincidence of unique addresses in records of calls
of objects for the last time (2-3 days);</p>
      <p>- compliance of the profile of the object of the
known case of violation, the coincidence of
specific for this known case information about the
call (direction, addressing) recently;</p>
      <p>- inconsistency of the object profile with the
typical subscriber accounting profile. (It is possible
only if there is access to the subscriber accounting
database, not necessarily in the early stages of
development, but it is necessary to provide for such
a possibility in the future).</p>
      <p>Determining the probability of violation</p>
      <p>A</p>
      <p>A  a
P  MAX (</p>
      <p>MAX (Pknown )Psubbase )
where:</p>
      <p>A - the probability of violation, determined
A  a
by the anomaly of behavior;</p>
      <p>a - anomaly at 50% probability. The value of a
can be obtained experimentally.</p>
      <p>First you can use: a = 20;</p>
      <p>A  Apr   Acor. pr.
where:</p>
      <p>Acor.pr - anomaly of the object, which has a
correlation in the calls (when checking it is
necessary to exclude coincidence at popular
addresses: special services, serial modem pools,
etc.), if the correlation is not defined - Acor.pr=0;</p>
      <p>Psubbase - the probability of fraud, which is
estimated by the inconsistency of the object profile
to the typical profile in accordance with the
subscriber accounting.</p>
      <p>Pknown - the probability of a known type of
violation (determined for each known type). The
method of determining the probability of a known
type of violation can also be based on the
correspondence of characteristic anomalies in the
profile of the observed object and the profile of the
violating object at the time of detection, as well as
correlations in calls by addresses</p>
      <p>or prefixes. More precisely, the method can be
determined only after the accumulation of a
sufficient number of experimental results.</p>
      <p>The assessment of the degree of risk of fraud
according to the developed methodology will be
calculated as follows.</p>
      <p>Assessment of the degree of danger is necessary
for cases that require priority intervention. They
(25) 
(26) 
can be considered as the effect of the probability of
violation on loss or unearned income:
implementation of traffic analysis for further
detailed analysis of automated systems.</p>
      <p>Q(0.3) | Q(0.3)  Q(0.05) |
Q(0.05) | Q(0.05)  Q(0.005) |
(27)
(28)
account the average difference in tariffs;
They will take the values k2 = 15, k3 =250, L =3.</p>
      <p>Recommendations for the practical application
of the developed methodology.</p>
      <p>The peculiarity of the operation and the
distinction of the developed methodology will be
the following:
1. Feature when creating profiles of objects:
- For each group of connecting lines and for
each direction of the channel, describes the list of
valid addresses of the source party, the list of
uncontrolled addresses of the source party, lists of
objects that have more than one address in the
corresponding list of addresses.</p>
      <p>- If a record of object profile information is not
found during call processing, it must be generated
automatically.</p>
      <p>2. Specific profile formation:</p>
      <p>If there is a loss in the System of call
information for any period, to prevent failures in
the formation of information about the profiles of
objects, you must check all objects again, using
zero values of traffic at the beginning of the period
and restore information in profiles at the end.</p>
      <p>For ease of use, the user interfaces and methods
of working with them must be identical to the
System as a whole. But in addition you need to
consider the following:</p>
      <p>1. The subsystem must contain means of
actively informing users about events that need
attention, by generating screen messages in the
client part of the system, including at the start of
the client part, if the event occurred and was not
covered before.</p>
      <p>2. Provide the ability to graphically display the
characteristics of the profile of objects.</p>
      <p>3. Provide for the possibility of organizing
additional checks, with a slight change in the rules
used in the analysis using the rule editor.</p>
      <p>Areas of further research.</p>
      <p>Further research should be aimed at improving
the software for automated software, in order to
enable automated recognition and operational</p>
    </sec>
    <sec id="sec-4">
      <title>3. Conclusions   </title>
      <p>The analysis showed the absence of scientific
and methodological apparatus, universal devices or
automated software packages to ensure the rapid
implementation of traffic analysis and information
transfer to automated systems or relevant
specialists. Therefore, a method has been
developed to ensure the prompt implementation of
traffic analysis and information about situations
that are suspicious and require further detailed
analysis by automated systems or relevant
specialists.</p>
      <p>The developed method allows to carry out
operative (real-time) informing of responsible
specialists, or transfer of necessary data to the
automated complex, about deviation of character
of traffic from network elements (separate
telephone numbers, number capacities, trunk
groups, etc.) which is fixed in primary data.
Deviations, the nature of traffic from the elements
of network parameters are measured from the usual
traffic of the telephone network relative to these
elements.</p>
      <p>The given technique takes into account
practical recommendations concerning constant
coefficients, calculations. These coefficients are
selected by calculation and empirical. This reduces
the response of the System using the developed
method to the deviation of the communication
parameters by 9% compared to existing methods.
This is a perfectly acceptable result.</p>
    </sec>
    <sec id="sec-5">
      <title>4. References </title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Serhii</given-names>
            <surname>Yevseiev</surname>
          </string-name>
          , Roman Korolyov, Andrii Tkachov, Oleksandr Laptiev, Ivan Opirskyy,
          <string-name>
            <given-names>Olha</given-names>
            <surname>Soloviova</surname>
          </string-name>
          .
          <article-title>Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period</article-title>
          .
          <source>International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE)</source>
          Volume
          <volume>9</volume>
          . No.
          <issue>5</issue>
          ,
          <string-name>
            <surname>SeptemberOktober</surname>
          </string-name>
          <year>2020</year>
          , pp
          <fpage>8725</fpage>
          -
          <lpage>8729</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Valentyn</given-names>
            <surname>Sobchuk</surname>
          </string-name>
          , Volodymyr Pichkur, Oleg Barabash, Oleksandr Laptiev, Kovalchuk Igor,
          <string-name>
            <given-names>Amina</given-names>
            <surname>Zidan</surname>
          </string-name>
          .
          <article-title>Algorithm of control of functionally stable manufacturing processes of enterprises</article-title>
          .
          <source>2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25-27</source>
          . pp.
          <fpage>206</fpage>
          -
          <lpage>211</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Vitalii</given-names>
            <surname>Savchenko</surname>
          </string-name>
          , Oleksandr Laptiev, Oleksandr Kolos, Rostyslav Lisnevskyi, Viktoriia Ivannikova,
          <string-name>
            <given-names>Ivan</given-names>
            <surname>Ablazov</surname>
          </string-name>
          .
          <source>Hidden Transmitter Localization Accuracy Model Based on Multi-Position Range Measurement</source>
          .
          <source>2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25-27</source>
          . pp.
          <fpage>246</fpage>
          -
          <lpage>251</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Serhii</given-names>
            <surname>Yevseiev</surname>
          </string-name>
          , Oleksandr Laptiev, Sergii Lazarenko, Anna Korchenko,
          <string-name>
            <given-names>Іryna</given-names>
            <surname>Manzhul</surname>
          </string-name>
          .
          <article-title>Modeling the protection of personal data from trust and the amount of information on social networks</article-title>
          .
          <source>Number</source>
          <volume>1</volume>
          (
          <year>2021</year>
          ), «EUREKA: Physics and Engineering» pp.
          <fpage>24</fpage>
          -
          <lpage>31</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Milov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseiev</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Milevskyi S. Ivanchenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nesterov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Puchkov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yarovyi</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salii</surname>
            <given-names>A.</given-names>
          </string-name>
          , ,
          <string-name>
            <surname>Tiurin</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Timochko</surname>
            <given-names>O. Development</given-names>
          </string-name>
          <article-title>the model of the antagonistic agent's behavior under a cyber-conflict</article-title>
          .
          <source>Eastern European Journal of Advanced Technologies. Kharkiv</source>
          .
          <year>2019</year>
          . 4/9 (
          <issue>100</issue>
          ). pp.
          <fpage>6</fpage>
          -
          <lpage>19</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Korotin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kravchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Starkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Herasymenko</surname>
          </string-name>
          , R. Mykolaichuk, “
          <article-title>Analytical determination of the parameters of the selftuning circuit of the traffic control system on the limit of vibrational stability”</article-title>
          ,
          <source>International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S&amp;T`2019 - Proceedings</source>
          , pp.
          <fpage>471</fpage>
          -
          <lpage>476</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kravchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Leshchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Dakhno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Trush</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
          <article-title>Makhovych “Evaluating the effectiveness of cloud services”</article-title>
          ,
          <source>IEEE International Conference on Advanced Trends in Information Theory</source>
          , ATIT`
          <fpage>2019</fpage>
          - Proceedings, pp.
          <fpage>120</fpage>
          -
          <lpage>124</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.M.</given-names>
            <surname>Samoilenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.G.</given-names>
            <surname>Samoilenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Sobchuk</surname>
          </string-name>
          .
          <article-title>On periodic solutions of the equation of a nonlinear oscillator with pulse influence</article-title>
          <source>Ukrainian Mathematical Journal</source>
          ,
          <year>1999</year>
          (
          <volume>51</volume>
          ), 6 Springer New York - Р.
          <fpage>926</fpage>
          -
          <lpage>933</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sobchuk</surname>
          </string-name>
          et al .
          <article-title>Approximate Homogenized Synthesis for Distributed Optimal Control Problem with Superposition Type Cost Functional</article-title>
          .
          <source>Statistics Opt. Inform. Comput.</source>
          , Vol.
          <volume>6</volume>
          , June 2018, pp
          <fpage>233</fpage>
          -
          <lpage>239</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>O.</given-names>
            <surname>Barabash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Dakhno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sobchuk</surname>
          </string-name>
          .
          <article-title>Integro-Differential Models of Decision Support Systems for Controlling Unmanned Aerial Vehicles on the Basis of Modified Gradient Method</article-title>
          .
          <source>IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC) - Ukraine, Kyiv, 16 October</source>
          <year>2018</year>
          . рр.
          <volume>94</volume>
          -
          <fpage>97</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Toliupa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lukova-Chuiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Oksiuk</surname>
          </string-name>
          .
          <article-title>Choice of Reasonable Variant of Signal and Code Constructions for Multirays Radio Channels</article-title>
          . Second International ScientificPractical Conference Problems of Infocommunications.
          <source>Science and Technology. IEEE PIC S&amp;T 2015</source>
          . pp.
          <fpage>269</fpage>
          -
          <lpage>271</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>N.</given-names>
            <surname>Lukova-Chuiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Ruban</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <article-title>Martovytskyi Designing a monitoring model for cluster supercomputers</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          .- №
          <volume>6</volume>
          (
          <issue>2</issue>
          ) .
          <year>2016</year>
          . P.
          <volume>32</volume>
          -
          <fpage>37</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>N.</given-names>
            <surname>Lukova-Chuiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Ruban</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Martovytskyi</surname>
          </string-name>
          .
          <article-title>Approach to Classifying the State of a Network Based on Statistical Parameters for Detecting Anomalies in the Information Structure of a Computing System</article-title>
          .
          <source>Cybernetics and Systems AnalysisV. 54. № 2</source>
          . pp.
          <fpage>142</fpage>
          -
          <lpage>150</lpage>
          .
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>N.</given-names>
            <surname>Lukova-Chuiko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Ruban</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Khudov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Makoveichuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Khizhnyak</surname>
          </string-name>
          .
          <source>Method For Determining Elements of Urban Infrastructure Objects Based On The Results From Air Monitoring.Eastern-European Journal of Enterprise Technologies. - № 4/9 (100)</source>
          . -
          <fpage>2019</fpage>
          . - P.
          <fpage>52</fpage>
          -
          <lpage>61</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>N.</given-names>
            <surname>Lukova-Chuiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I</given-names>
            <surname>Ruban</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Martovytskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kovalenko</surname>
          </string-name>
          .
          <source>Identification in Informative Systems on the Basis of Users' Behaviour</source>
          .
          <source>2019 IEEE 8th International Conference on Advanced Optoelectronics and Lasers (CAOL)</source>
          ,
          <source>Sozopol. Bulgaria</source>
          . pp.
          <fpage>574</fpage>
          -
          <lpage>577</lpage>
          .
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>N.</given-names>
            <surname>Lukova-Chuiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Saiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Nakonechnyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Narytnyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Brailovskyi. Terahertz Range Interconnecting Line For LEO-System</surname>
          </string-name>
          .
          <source>2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering (TCSET), LvivSlavske, Ukraine, pp.
          <fpage>425</fpage>
          -
          <lpage>429</lpage>
          .
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Oleksandr</surname>
            <given-names>Laptiev</given-names>
          </string-name>
          , Vitalii Savchenko, Andrii Pravdyvyi, Ivan Ablazov, Rostyslav Lisnevskyi, Oleksandr Kolos,
          <string-name>
            <given-names>Viktor</given-names>
            <surname>Hudyma</surname>
          </string-name>
          .
          <article-title>Method of Detecting Radio Signals using Means of Covert by Obtaining Information on the basis of Random Signals Model</article-title>
          .
          <source>International Journal of Communication Networks and Information Security (IJCNIS)</source>
          , Vol.
          <volume>13</volume>
          , No.
          <volume>1</volume>
          ,
          <year>2021</year>
          . рр.
          <volume>48</volume>
          -
          <fpage>54</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>