<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A domain-oriented method for evaluating 5G core network software quality⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Viktor Gnatyuk</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roman Hamretskyi</string-name>
        </contrib>
      </contrib-group>
      <fpage>193</fpage>
      <lpage>202</lpage>
      <abstract>
        <p>This paper examines approaches to assessing the quality of fifth-generation (5G) core network software. A method is proposed that combines standard quality metrics in accordance with ISO/IEC 25010 with additional criteria relevant to 5G telecommunication systems, such as latency, scalability, energy efficiency, adaptability, and fault tolerance. A three-tier model is developed, enabling multidimensional assessment of core software considering service, functional, and infrastructure levels. Simulations were conducted to evaluate the method's effectiveness under different scenarios, including load variation, component version updates, and node failures. The proposed approach demonstrates higher precision and practical applicability compared to existing methods. Graphs, block diagrams, and experimental results are presented. Prospects for implementation and future research directions are outlined.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;software</kwd>
        <kwd>5G</kwd>
        <kwd>ISO/IEC 25010</kwd>
        <kwd>QoS</kwd>
        <kwd>software quality</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of recent sources</title>
      <p>
        Software quality assessment is a critically important stage in the development lifecycle, particularly
for high-load systems such as the 5G core. One of the most widely recognized standards for
defining and evaluating quality characteristics is ISO/IEC 25010 [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], which outlines attributes such
as functional suitability, performance efficiency, compatibility, usability, reliability, security,
maintainability, and portability.
While ISO/IEC 25010 offers a universal framework, several researchers [
        <xref ref-type="bibr" rid="ref2 ref3 ref4">2–4</xref>
        ] have emphasized the
need to adapt or extend the quality model for specific domains such as telecommunication
networks. For example, [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] proposes incorporating real-time and resource-dependency features,
which are critical in 5G environments.
      </p>
      <p>
        Considerable attention has also been paid to the quality evaluation of cloud-based software,
which shares architectural features with the 5G core, including virtualization, microservice
architecture, and automated orchestration. In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], a methodology is proposed for assessing the
quality of microservice applications, taking into account parameters such as scalability, fault
tolerance, and update efficiency. Reference [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] introduces a multi-level evaluation model that
considers both technical and business quality indicators.
      </p>
      <p>
        In the context of 5G, some studies [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ] focus on evaluating software performance within
virtualized infrastructure and network functions (NFV), emphasizing the importance of metrics
such as latency, throughput, orchestration delay, and resource efficiency.
      </p>
      <p>
        Thus, an analysis of existing approaches reveals that although general software quality models
exist, they do not fully account for the specific characteristics of the 5G core. Recent research also
highlights that emerging technologies, such as software-defined radio (SDR) receivers, introduce
new cybersecurity risks in wireless environments, which should be reflected in domain-oriented
quality evaluation methods [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref7 ref8 ref9">7–12</xref>
        ]. This justifies the need for a unified assessment method that
integrates general standards with domain-specific indicators.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Objective of the study</title>
      <p>The objective of this paper is to develop a method for assessing the quality of 5G core software that
is based on international standards but adapted to the requirements of modern telecommunication
infrastructure. The paper provides an overview of existing approaches to software quality
evaluation, formulates the requirements for a new assessment method, describes its structure, and
presents an experimental validation of its effectiveness.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Method description</title>
      <p>
        The 5G network core performs critical functions such as access control, mobility management,
traffic routing, quality of service (QoS) assurance, security, and network resource orchestration.
These functions are implemented through a set of software components deployed in a cloud
environment using Network Function Virtualization (NFV) and Software-Defined Networking
(SDN) [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ].
      </p>
      <p>Due to the architectural complexity, high workload dynamics, and strict performance
guarantees, traditional software quality assessment methods are insufficient to comprehensively
evaluate the quality of the 5G core. In particular, it is essential to consider parameters such as:





</p>
      <p>Data transmission latency (crucial for uRLLC-type services).</p>
      <p>Scalability (the system's ability to adapt resources to varying loads).</p>
      <p>Reliability (the system’s ability to function without failure under critical conditions).
Energy efficiency (especially important for distributed edge infrastructures).</p>
      <p>Fault and attack tolerance (including DDoS protection and self-healing).</p>
      <p>
        Integration with cloud-native and containerized infrastructures [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ].
      </p>
      <p>Therefore, it is necessary to develop a software quality assessment method for the 5G core that:
1. Accounts for both traditional quality characteristics (based on ISO/IEC 25010) and
domainspecific indicators.
2. Is adapted to the 5G Core architecture: service-oriented, containerized, and orchestrated.
3. Supports formal representation and quantitative computation of quality indicators.
4. Allows for comparison of alternative implementations of core components (e.g., AMF, SMF,</p>
      <p>
        UPF, etc.).
5. Is suitable for integration into CI/CD pipelines and monitoring systems [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ].
      </p>
      <p>The proposed method for assessing the quality of 5G core software is based on adapting the
ISO/IEC 25010 model to the specifics of the 5G Core architecture. The main idea is to supplement
traditional quality characteristics (functionality, performance efficiency, reliability, and others)
with domain-oriented metrics inherent to cloud-native and next-generation telecommunication
systems.</p>
      <sec id="sec-4-1">
        <title>4.1. Method architecture</title>
        <p>The method comprises three hierarchical levels:
1. Basic Level (Standard): Traditional ISO/IEC 25010 characteristics—functional suitability,
performance efficiency, reliability, security, maintainability, and portability.
2. Extension Level (5G-Specific): Latency, scalability, fault tolerance, NFV/SDN integration,
and energy efficiency.
3. Evaluation Level: Module for collecting, weighting, and interpreting quality indicators.</p>
        <p>Metrics are normalized to a [0;1] scale and aggregated to form a comprehensive quality
score.</p>
        <p>where Q i is the aggregated value of the i-th quality characteristic, mij is the value of the j-th
metric for the i-th characteristic (Table 1), and wij is the weight of the j-th metric (determined
either through expert judgment or based on Analytic Hierarchy Process (AHP) analysis).</p>
        <p>The overall quality indicator of the 5G core software is calculated as a weighted sum of the
quality characteristics:</p>
        <p>n
Q i= ∑ wij⋅ mij ,
j= 1</p>
        <p>k
Q total= ∑ Wi⋅ Q i ,
i= 1
(1)
(2)</p>
        <sec id="sec-4-1-1">
          <title>Delay between AMF ↔ SMF ↔ UPF</title>
        </sec>
        <sec id="sec-4-1-2">
          <title>Number of supported sessions without degradation</title>
        </sec>
        <sec id="sec-4-1-3">
          <title>Average time between failures</title>
        </sec>
        <sec id="sec-4-1-4">
          <title>Power consumption at the user level</title>
        </sec>
        <sec id="sec-4-1-5">
          <title>Core network traffic</title>
          <p>processing speed
The method can be implemented as a monitoring module integrated into a CI/CD pipeline or a
testing environment (e.g., OpenAirInterface, free5GC). The weighting coefficients can be
determined through expert evaluation or the Analytic Hierarchy Process (AHP) method. The
method can also be adapted to specific service types such as eMBB, mMTC, or uRLLC.</p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Mathematical model</title>
        <p>Stage 1: Define a comprehensive set of metrics:
•
•
•</p>
        <p>Functional Metrics (F): correctness, reliability, security;
Non-Functional Metrics (NF): performance, scalability, energy efficiency;
Contextual Metrics (C): adaptability, automation, fault tolerance.</p>
        <p>M = { m1 , m2 , .... mn} , mi∈ [0 ; 1 ].</p>
        <p>Stage 2: Normalize metrics.</p>
        <p>Each metric is normalized to the interval [0;1] (if not already normalized), for example:
where m^i is the normalized value, and mimin, mimax are the minimum and maximum bounds of
the metric, respectively.</p>
        <p>Stage 3: Apply weighting coefficients to metrics.</p>
        <p>To account for the significance of different indicators, a system of weighting coefficients is
applied:</p>
        <sec id="sec-4-2-1">
          <title>Stage 4: Calculate aggregated indices.</title>
          <p>Service level (Q 1):
Functional level (Q 2):
Infrastructure level (Q 3):
m^i =</p>
          <p>mi −mimin
m max−m min ,
i i</p>
          <p>n
wi∈ [0 ; 1 ], ∑ wi= 1.</p>
          <p>i= 1
k
Q 1= ∑
i= 1
l
Q 2= ∑
j= 1
p
Q 3= ∑
z= 1
w(i1)⋅ m^i .
w(j2)⋅ m^j .
w(3)⋅ m^ .</p>
          <p>z z
Q total=α ⋅Q 1+ β ⋅Q 2+γ ⋅Q 3 ,
(3)
(4)
(5)
(6)
(7)
(8)
(9)
where w(r ) are the weights at the corresponding level, and m^i are the metrics grouped by level.
Stage 5: Calculate the integral quality index.</p>
          <p>where α + β + γ= 1, the coefficients α, β, and γ represent the importance of each level (e.g., α =
0.4, β = 0.35, γ = 0.25).</p>
          <p>Stage 6: Perform dynamic assessment over time.</p>
          <p>When the version, configuration, or load changes, the metrics are tracked over timet, allowing the
calculation of:
and to construct graphs showing the degradation or improvement of quality over time.</p>
          <p>All method parameters (the set of metrics, weights, levels) can be adapted to the specifics of a
particular use case, such as a telecom operator’s core, a private 5G network, or a test environment.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Experimental research</title>
      <p>To validate the effectiveness of the proposed method, an experimental testbed was implemented
based on the open-source free5GC stack, simulating the 5G core network.</p>
      <p>Simulation setup:





5G Core (free5GC v3.3.0): AMF, SMF, UPF, PCF, AUSF components.</p>
      <p>User Emulator: UERANSIM v3.2.7.</p>
      <p>Virtualization Platform: Oracle VirtualBox Version 7.1.8 r16846.</p>
      <p>Monitoring and Metrics Collection: Prometheus + Grafana + custom scripts.</p>
      <p>Host Environment: Ubuntu Server 22.04 LTS, Intel Xeon, 64 GB RAM.</p>
      <p>The entire testbed was deployed inside VirtualBox virtual machines running on the host system
(Figures 1–3).</p>
      <p>Baseline load (up to 100 concurrent users).</p>
      <p>Peak load (over 1000 eMBB sessions).</p>
      <p>Failure condition (UPF process termination or SMF overload).</p>
      <p>The method was compared with two other approaches:

</p>
      <p>Method A—standard quality assessment based on ISO/IEC 25010 (without 5G-specific
considerations).</p>
      <p>
        Method B—the model by [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], focused on microservices (Table 2, Figure 4).
      </p>
      <p>The experimental results emphasize the importance of evaluating accuracy, performance, and
applicability. Assessment accuracy refers to the deviation observed during repeated runs, which
remained within ±3%, indicating stable metric interpretation.</p>
      <p>Method performance is defined by the evaluation time—approximately 3 seconds per scenario
with over 500 sessions—enabled by automated data collection. Applicability refers to ease of
integration into CI/CD pipelines (e.g., testing new core component versions), suitability for
comparing alternatives (such as UPF implementations from different vendors), and potential use as
a QoS criterion in SLA agreements.
The proposed method demonstrated higher flexibility and sensitivity to system parameter changes,
which is critical in the dynamic environment of the 5G Core. Its main advantage lies in the ability
to quantitatively account for 5G-specific factors, which are not captured by general-purpose
standards. Due to its modular structure, the method can also be readily adapted to future
requirements, such as integration with AI-based core optimization modules.</p>
      <p>The histogram (Figure 4) illustrates a comparison of three 5G core software quality assessment
methods across four criteria: Q total is the overall quality score; and consideration of latency,
scalability, and automation—key characteristics essential for 5G systems.</p>
      <p>The graph (Figure 5) shows the variation of the integral quality indicator Q total depending on
the number of concurrent sessions (load). The proposed method demonstrates resilience to
increasing load, with only a slight decrease in Q total, while Method A (ISO/IEC 25010) exhibits a
significant drop in quality as the number of users increases.</p>
      <p>The graph (Figure 6) illustrates how the Q total indicator changed during updates of 5G core
components (e.g., transition from version 1.0 to 2.0). The proposed method clearly captures
improvements in system-level quality following updates. Method B demonstrates stability but
shows lower sensitivity to changes.</p>
      <p>The proposed method for assessing the quality of 5G core software offers several significant
advantages that distinguish it from traditional approaches, such as ISO/IEC 25010 or
microserviceoriented models. Among these advantages are:



</p>
      <p>Comprehensiveness: the method accounts for both classical quality metrics (e.g.,
functionality, reliability, usability) and 5G-specific aspects such as latency, scalability, and
energy efficiency.</p>
      <p>Architectural adaptability: the three-level model structure enables adaptation to various 5G
core implementations—ranging from monolithic to cloud-distributed systems.</p>
      <p>Resilience under failure and load: experimental studies showed stable quality scores even
under high-load conditions or failures in specific components (UPF, SMF, AMF).
Automation: the method can be integrated into CI/CD pipelines for continuous quality
monitoring.</p>
      <p>A key advantage of this method compared to others is its orientation toward metrics relevant to
5G and information and communication systems (ICS) in general. This allows for the effective
detection of anomalies during software operation in ICS environments and facilitates quality
improvements through error elimination.</p>
      <p>However, the method also has certain limitations, including:


</p>
      <p>Configuration complexity: full implementation requires deep integration with the
operator’s telecom infrastructure, including access to telemetry data and logs.</p>
      <p>Dependency on data completeness: the accuracy of the assessment depends on the
availability and reliability of input data—particularly from KPI monitoring, tracing, and load
testing results.</p>
      <p>Need for customization: different vendor-specific 5G core implementations may require
adaptations of metric weights and custom indicators.</p>
      <p>The method can be extended to 6G systems or industrial private networks (Private 5G), which
demand even higher levels of QoS/QoE. There is potential for integration with ML modules capable
of automatically adjusting model weights based on changes in system load, SLA policies, or service
type.
Pilot deployment is recommended in a test environment, for example using platforms such as
Open5GS or ONF SD-Core. Integration with monitoring systems (e.g., Prometheus, Grafana,
Zabbix) should be established to collect input metrics. Gradual integration into the operator’s
CI/CD pipeline is suggested for analyzing software releases within the DevOps cycle.</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>This paper proposes a method for assessing the quality of 5G core network software adapted to the
specifics of modern telecommunication systems. The method combines ISO/IEC 25010 standards
with additional metrics pertinent to 5G networks, including latency, scalability, energy efficiency,
automation, and fault tolerance.</p>
      <p>Key outcomes include:


</p>
      <p>Development of a three-level quality assessment model.</p>
      <p>Formalization of the calculation for an integral quality index.</p>
      <p>Experimental validation demonstrating enhanced accuracy, stability, and relevance
compared to existing methods.</p>
      <p>The method provides significant value for mobile network operators, software developers, and
system integrators by enabling:



</p>
      <p>Objective quality assessment of core releases before deployment.</p>
      <p>Identification of scalability bottlenecks.</p>
      <p>Compliance with QoE and SLA requirements.</p>
      <p>Integration into continuous monitoring within DevOps pipelines.</p>
      <p>Future work will focus on expanding the model to 6G and NTN networks, integrating machine
learning for dynamic metric weighting, and deploying the method in operational environments.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1] ISO/IEC 25010:
          <year>2011</year>
          ,
          <article-title>Systems and Software Engineering-Systems and Software Quality Requirements and Evaluation (SQuaRE)-System and Software Quality Models</article-title>
          , International Organization for Standardization, Geneva,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Azgomi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ebrahimi</surname>
          </string-name>
          ,
          <article-title>Quality Model for Real-Time and Embedded Software Systems</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Syst</surname>
          </string-name>
          . Softw.
          <volume>117</volume>
          (
          <year>2016</year>
          )
          <fpage>436</fpage>
          -
          <lpage>449</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jss.
          <year>2016</year>
          .
          <volume>02</volume>
          .016
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Newman</surname>
          </string-name>
          , Building Microservices: Designing
          <string-name>
            <surname>Fine-Grained</surname>
            <given-names>Systems</given-names>
          </string-name>
          , 2nd ed.,
          <string-name>
            <surname>O'Reilly Media</surname>
          </string-name>
          , Sebastopol, CA,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bucchiarone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Dragoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dustdar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Larsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mazzara</surname>
          </string-name>
          ,
          <article-title>A conceptual framework for quality evaluation of microservice architectures</article-title>
          ,
          <source>Service Oriented Comput. Appl</source>
          .
          <volume>14</volume>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11761-019-00273-w
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hawilo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mirahmadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Asal</surname>
          </string-name>
          , NFV:
          <article-title>State of the Art, Challenges, and Implementation in Next Generation Mobile Networks (vEPC)</article-title>
          ,
          <source>IEEE Network 28 (6)</source>
          (
          <year>2014</year>
          )
          <fpage>18</fpage>
          -
          <lpage>26</lpage>
          . doi:
          <volume>10</volume>
          .1109/MNET.
          <year>2014</year>
          .6963800
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>N.</given-names>
            <surname>Nikaein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Knopp</surname>
          </string-name>
          , T. Henderson,
          <article-title>OpenAirInterface: A Flexible Platform for 5G Research, ACM SIGCOMM Comput</article-title>
          .
          <source>Commun. Rev</source>
          .
          <volume>44</volume>
          (
          <issue>5</issue>
          ) (
          <year>2014</year>
          )
          <fpage>33</fpage>
          -
          <lpage>38</lpage>
          . doi:
          <volume>10</volume>
          .1145/2677046.2677052
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>Models and Algorithms for Analyzing Information Risks during the Security Audit of Personal Data Information System</article-title>
          ,
          <source>in: 3rd Int. Conf. on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CH&amp;CMiGIN)</source>
          , Kyiv, Ukraine, vol.
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>155</fpage>
          -
          <lpage>171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <article-title>A System for Assessing the Interdependencies of Information System Agents in Information Security Risk Management using Cognitive Maps</article-title>
          ,
          <source>in: 3rd Int. Conf. on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CH&amp;CMiGIN)</source>
          , Kyiv, Ukraine, vol.
          <volume>3925</volume>
          ,
          <year>2025</year>
          ,
          <fpage>249</fpage>
          -
          <lpage>264</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Shevchenko,
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Zhdanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Kryvytska</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
           
          <article-title>Shevchenko, Fuzzy Cognitive Mapping as a Scenario Approach for Information Security Risk Analysis</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3826</volume>
          ,
          <year>2024</year>
          ,
          <fpage>356</fpage>
          -
          <lpage>362</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>M. TajDini</surname>
            , V. Sokolov,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Performing Sniffing and Spoofing Attack Against ADSB and Mode S using Software Define Radio</article-title>
          ,
          <source>in: IEEE Int. Conf. on Information and Telecommunication Technologies and Radio Electronics</source>
          (
          <year>2021</year>
          )
          <fpage>7</fpage>
          -
          <lpage>11</lpage>
          . doi:
          <volume>10</volume>
          .1109/UkrMiCo52950.
          <year>2021</year>
          .
          <volume>9716665</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>M. TajDini</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Sokolov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <article-title>Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio</article-title>
          ,
          <source>in: 8th Int. Conf. on “Mathematics. Information Technologies. Education:” Modern Machine Learning Technologies and Data Science</source>
          , vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>287</fpage>
          -
          <lpage>296</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bybyk</surname>
          </string-name>
          , I. Opirskyy,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>McIntosh, SDR Receivers as a New Challenge to Cybersecurity Wireless Technology</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>3188</volume>
          ,
          <year>2021</year>
          ,
          <fpage>108</fpage>
          -
          <lpage>119</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Khokhlachova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sydorenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Opirskyy</surname>
          </string-name>
          ,
          <article-title>Method for Optimization of Information Security Systems Behavior under Conditions of Influences, Int</article-title>
          .
          <source>J. Intell. Syst. Appl</source>
          .
          <volume>9</volume>
          (
          <issue>12</issue>
          ) (
          <year>2017</year>
          )
          <fpage>46</fpage>
          -
          <lpage>58</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijisa.
          <year>2017</year>
          .
          <volume>12</volume>
          .05
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Petrova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chaplits</surname>
          </string-name>
          ,
          <article-title>Method of Traffic Monitoring for DDoS Attacks Detection in e-Health Systems and Networks</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          ,
          <volume>2255</volume>
          ,
          <year>2018</year>
          ,
          <fpage>193</fpage>
          -
          <lpage>204</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kharchenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Chyrka</surname>
          </string-name>
          ,
          <article-title>Detection of Airplanes on the Ground using YOLO Neural Network</article-title>
          ,
          <source>in: Int. Conf. on Mathematical Methods in Electromagnetic Theory</source>
          ,
          <year>2018</year>
          ,
          <fpage>294</fpage>
          -
          <lpage>297</lpage>
          . doi:
          <volume>10</volume>
          .1109/MMET.
          <year>2018</year>
          .8460392
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Al-Azzeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Al</given-names>
            <surname>Hadidi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. S.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Shevchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <article-title>Analysis of Self-Similar Traffic Models in Computer Networks</article-title>
          ,
          <source>Int. Rev. Modelling Simulations</source>
          <volume>10</volume>
          (
          <issue>5</issue>
          ) (
          <year>2017</year>
          )
          <fpage>328</fpage>
          -
          <lpage>336</lpage>
          . doi:
          <volume>10</volume>
          .15866/iremos.v10i5.
          <fpage>12009</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Averyanova</surname>
          </string-name>
          , et al.,
          <article-title>UAS Cyber Security Hazards Analysis and Approach to Qualitative Assessment, in: Data Sci</article-title>
          . Secur.,
          <volume>290</volume>
          ,
          <year>2021</year>
          ,
          <fpage>258</fpage>
          -
          <lpage>265</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-16-4486-3_
          <fpage>28</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
            <surname>Tkachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yechkalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kislova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hladyr</surname>
          </string-name>
          ,
          <article-title>Using Mobile ICT for Online Learning during COVID-19 lockdown</article-title>
          , Communications in Computer and Information Science,
          <volume>1308</volume>
          (
          <year>2021</year>
          )
          <fpage>46</fpage>
          -
          <lpage>67</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -77592-
          <issue>6</issue>
          _
          <fpage>3</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>