<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>June</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Conceptual Model for Ensuring Functional Stability of Wireless Networks⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Laptiev</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valentyn Sobchuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykhaylo Sharapov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Sobchuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergey Laptiev</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>State University of Information and Communication Technologies</institution>
          ,
          <addr-line>Solomyanska Str., 7, Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska Str., 60, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>0</volume>
      <fpage>9</fpage>
      <lpage>11</lpage>
      <abstract>
        <p>The article addresses the issue of ensuring the reliability and functional stability of wireless sensor networks under destabilizing factors and enemy countermeasures. The research focuses on developing a methodological approach for creating reliable wireless sensor networks that use audio wave propagation of signals in the air and soil. The study analyzes the key physical aspects of sound waves propagation in various environments and their impact on the performance of sensor networks. Key parameters affecting system functionality are identified, including temperature conditions, air humidity, soil density and composition, elasticity of materials, and more. Existing technologies, such as SOSUS, seismographs and sonars, that use the principles of audio wave propagation are examined. The study explores the optimization problem of designing the structure of wireless sensor networks while considering a range of constraints: probability of connectivity between sensors, communication line lengths, message delay time, bit error rate, data routing setup time, and network node energy consumption. A comprehensive approach is proposed to ensure functional stability by integrating a pseudo-satellite radionavigation system with the wireless sensor network. This integration enhances protection against disruptions and interference and increases the overall reliability of the system. A general model of wireless sensor network operation has been developed, including description of the system's resource set, informational functions and services, structural and parametric system descriptions, and service delivery technology. Particular attention is paid to the relationships between the sets of services and system resources. The results obtained can be used in the design and optimization of wireless sensor networks to ensure their stable operation under active influence from both external and internal destabilizing factors. The proposed approach allows to significantly improve the reliability and functional stability of wireless sensor networks, which is especially important for applications in the military industry and critical civilian systems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Wireless sensor networks</kwd>
        <kwd>functional stability</kwd>
        <kwd>reliability</kwd>
        <kwd>audio wave propagation</kwd>
        <kwd>structure optimization</kwd>
        <kwd>pseudo-satellite systems</kwd>
        <kwd>electronic countermeasures 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The rapid development of wireless sensor networks is one of the trending directions in modern
information technology [1,2]. In the early stages, the prototype of modern wireless sensor networks
(WSNs) can be considered to be distributed military-technical systems, the development of which
was actively carried out at the end of the last century. It is known that sound propagates in the air
through the periodic change of density of air molecules. When an object emits sound, it creates zones
of increased and decreased pressure, which move in the form of waves. The propagation of sound is
affected by: temperature, where higher temperature increases molecular motion and thus the speed
of sound (at 20°C, the speed of sound is about 343 m/s); humidity, moist air transmits sound better,
since water molecules are lighter than nitrogen and oxygen molecules; attenuation, sound waves in
the air gradually fade due to friction between molecules (especially at high frequencies).</p>
      <p>In the ground, sound propagates in the form of seismic waves, which are the result of soil
vibrations. These waves can be both longitudinal (P-waves) and transverse (S-waves). The
propagation is affected by the density and composition of the soil - denser materials such as granite
transmit sound faster than loose rocks - and elasticity, with more elastic materials (for example,
stone) transmit sound better. Notably, sound in the ground attenuates more slowly than in the air,
due to lower friction between particles. These physical properties are actively exploited in various
technologies, such as SOSUS, seismographs, and sonars. The SOund SUrveillance System (SOSUS),
for example, constitutes a global acoustic surveillance network system designed to detect and
identify submarines, i.e. it used water as a medium for the propagation of audio waves, it collected
and transmitted data via dedicated radio communication channels for subsequent processing.
Nevertheless, a persistent challenge lies in ensuring the properties of functional stability and
electronic countermeasure resistance of a complex autonomous navigation system in the format of
GPS signals and sensor monitoring along the line of contact in active combat conditions.</p>
      <p>At the core of this issue is a fundamental contradiction in the requirements for building a
functionally stable system, for example, between the requirement to reduce the enemy's impact on
the system elements, which can be achieved by increasing the distance to the line of combat contact,
and the need to provide the end-users with navigation and reconnaissance information in the area
of combat operations. Furthermore, there also exists a discrepancy between the existing scientific
and methodological frameworks and the conditions of specific operational scenarios, which requires
the development of new models and methods. A partial solution to this problem is the integrated
deployment of a pseudo-satellite radionavigation system in conjunction with a wireless sensor
network, both of which are designed to be resistant to jamming and interference.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Purpose of the study</title>
      <p>The aim of this research is to develop a concept for functionally stable wireless sensor networks [1],
capable of operating under the influence of destabilizing factors that affect signal propagation within
the network. This scientific task remains only partially resolved, both at the hardware and software
levels. One of the key aspects of solving this scientific task is ensuring the functional stability of
wireless sensor networks, which simultaneously guarantees their reliability in the intended context.
From a technological standpoint, it is proposed to implement a comprehensive integrated concept
involving the joint operation of a pseudo-satellite radionavigation system and a wireless sensor
network, both of which are protected against the impact of external and internal destabilizing factors.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Overview of results and sources</title>
      <p>Numerous studies have been devoted to the investigations of the features of the functioning of
complex technical systems under the influence of destabilizing factors. In particular, a systematic
analysis of approaches to ensuring the functional stability of information systems within critical
infrastructure, as well as methods for designing energy-efficient sensor networks using both static
and dynamic sensors are presented in [3,4]. The assessment of functional stability in hierarchical
automated control systems and the development of control strategies for automated manufacturing
centers to maintain the functional stability of enterprise information systems have been examined
in [5-7]. These works have also established the conditions for the practical stability of differential
inclusions using Lyapunov functions, as well as for the practical stability of discrete inclusions with
spatial components.</p>
      <p>Considerable research interest has been directed toward studying the characteristics of signal
generation and transmission across networks of various types. In [10], the authors proposed a
method for detecting radio signals by estimating the parameters of signals exhibiting inverse
Gaussian propagation. Signal processing involving frequency and phase manipulation in
telecommunications has been examined in [11]. In [12], a spectral analysis method for identifying
random digital signals was developed. A method for testing vulnerabilities in corporate networks
using Bernstein transforms, approaches to self-testing and self-diagnosis of modular systems based
on the principle of a walking diagnostic kernel, and an algorithm for recognizing network traffic
anomalies based on artificial intelligence are presented in [13-15]. In [16], effects that are
characteristic of models of the phenomenon of self-excitation of drill string oscillations that can
affect wave propagation are studied in detail. Analytical evaluations of the security level in
distributed and scalable computer systems and signal smoothing methods in the development of
navigation systems are described in [17,18].</p>
      <p>An important aspect involves tools that ensure access to networks for a trusted circle of users.
Studies [19,20] examine the features of biometric authentication using convolutional neural
networks. Studies [21 - 24] are devoted to the development and description of approaches involving
modified McEliece and Niederreiter cryptographic coding systems to enhance security, including
multi-level authentication and hybrid security systems.</p>
      <p>Security models for socio-cyber-physical systems, adaptive resource allocation methods for data
processing and security in cloud environments, and information protection techniques within the
cyber-physical space have been explored in [25-27]. An intrusion detection model based on an
enhanced transformer architecture is described in [28].</p>
      <p>At the same time, the existing research lacks a unified conceptual approach to the modeling and
formal analytical description of functionally stable wireless sensor networks. Therefore, the
following section introduces the authors’ approach to the formalization of this problem.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conceptual approaches to the modeling of functionally stable</title>
    </sec>
    <sec id="sec-5">
      <title>WSNs</title>
      <p>The concept of reliability is defined in national standard DSTU 2860-94 as the ability of an object to
maintain its capacity to perform the required functions within a specified time interval under the
given system parameters. The reliability property should be considered in relation to the intended
purpose of the system and its operating conditions.</p>
      <p>Reliability is one of the key expected characteristics of modern network technologies. A reliable
system is less prone to failures, which in turn enhances its resistance to external disturbances.</p>
      <p>Functional stability refers to the property of complex technical systems that enables them to
continue performing their core functions (potentially at reduced quality levels) under the influence
of internal or external destabilizing factors. It guarantees the system’s ability to maintain operational
capability even in the presence of partial network component failures.. Functional stability demands
that the network be adaptive: able to reallocate tasks and redistribute loads among remaining
operational components to recover performance despite the loss of some original capabilities.</p>
      <p>Thus, functional stability ensures uninterrupted operation and timely response to crisis
conditions, while reliability is more closely associated with preventative design measures. Therefore,
reliability is a necessary but not sufficient condition for achieving functional stability. For systems
to perform effectively under uncertainty and stress, functional stability must be an integral design
objective.</p>
      <sec id="sec-5-1">
        <title>4.1. Criterion for functional stability of WSNs</title>
        <p>Then, having reviewed the key requirements and criteria of functional stability as they directly
pertain to wireless sensor networks and account for all the specific features of their operation, we
can formulate the problem of WSN structural synthesis as follows:</p>
        <p>=  (  ) → max,
 ,  = 1, … ,  ,</p>
        <p>≠  ;
 = ∑ ∑   (  ,   , ℎ ) ≤  +;
 
∀    ≥  min ;</p>
        <p>≤   ;


.</p>
        <p>
          ≤  max ;
 
 &lt;   max ;

 &lt;  max ;
  &lt;  max ,
where  is the number of sensors in the network;
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
(
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
is the quality functional, an objective function to be maximized;
  is the probability of connectivity between a pair ( ,  ) of network sensors;
  is the link distance between sensors ( ,  );
.
        </p>
        <p>is the average message delay between sensors.</p>
        <p>is the bit error rate between sensors ( ,  );
•
•
•
•
•
•
•
 

  is the time for establishing a new data transmission route between sensors ( ,  );
  is the energy consumption of a link between sensors ( ,  ).</p>
        <p>
          Expression (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) defines the optimization criterion for the system under study. Actually, when the
functional reaches its maximum in practice, this means that the probability of connectivity   across
the network components is at its highest, meaning that the network has not effectively lost any of
its components, can perform its tasks as intended and, therefore, is functionally stable.
        </p>
        <p>
          Expressions (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) - (
          <xref ref-type="bibr" rid="ref8">8</xref>
          ) impose constraints on network parameters for solving the optimization
problem. Constraint (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) means that the total costs for the sensor network, taking into account link
lengths, bandwidth and transmitted data volume, must not exceed allowable thresholds.
        </p>
        <p>
          Condition (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) defines the connectivity probability value   for all routes in the network.
Condition (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) limits the volume of information flow   transmitted through each communication
channel with a given bandwidth   .
        </p>
        <p>
          Condition (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) determines the average message delay time   . within the network. Condition
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          ) determines the acceptable value of the bit error rate    during data transmission between a
given pair of vertices, which does not exceed the specified threshold value    .
        </p>
        <p>
          Condition (
          <xref ref-type="bibr" rid="ref7">7</xref>
          ) determines the time for establishing a new data transmission route   between a
given pair of sensors. Condition (
          <xref ref-type="bibr" rid="ref8">8</xref>
          ) means the maximum permissible value of energy consumption
  by a node during the complete cycle of data receiving and transmitting, which must not exceed
the threshold of autonomous power usage   .
        </p>
        <p>
          Thus, solving the formulated optimization problem yields the optimal structure of a sensor
network consisting of N sensors, which satisfies the optimization criterion (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) and constraints (
          <xref ref-type="bibr" rid="ref2">2</xref>
          )–
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          ). This structure is represented by the adjacency matrix of the graph describing the network
topology.
        </p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2. Comprehensive model of WSN functioning</title>
        <p>The system for ensuring functional stability should be created at the design stage of the WSN and
must take into account the peculiarities of its architecture and operation under destabilizing external
and internal factors. This requirement necessitate the development of a comprehensive model of
WSN functioning.</p>
        <sec id="sec-5-2-1">
          <title>Such a model can be presented in general terms as:</title>
          <p>
            = 〈 ,  〉,
where  is the wireless sensor network model;  is the model of destabilizing factors.
(
            <xref ref-type="bibr" rid="ref9">9</xref>
            )
The WSN model can be represented as
          </p>
          <p>
            = 〈ℛ,  ,  ,  〉, (
            <xref ref-type="bibr" rid="ref10">10</xref>
            )
where ℛ is the set of system resources, , understood as the combination of hardware and software
components, auxiliary equipment, system services, and management services;  is the set of
information functions and services provided by the system;  is the structural-parametric description
of the system, which includes the characteristics of resources, their territorial location and methods
of interaction;  is the description of the service delivery technology, encompassing user request
processing, identification of required resources, and the order of their utilization.
          </p>
          <p>The set ℛ of WSN resources includes the collection of software and hardware (including auxiliary
equipment), system services and management services used to deliver specified information services
to end users. The set of resources ℛ can be represented as: ℛ = { 1,  2, … ,   }, where   denotes a
specific resource (hardware, software or other).</p>
          <p>The set  of information services refers to the collection of system operations executed in
response to a set of user requests for access to the resources of the information system. The
structural-parametric description of the system δ includes a description of the computer system
topology, resource parameter specifications, their territorial location and methods of interaction
between the resources. The set of services  can be represented as:  = { 1,  2, … ,   } where   is
a specific information service.</p>
          <p>The structural-parametric description of the system  defines a system of relations on the set ℛ
of WSN resources. This can be represented as a graph or an adjacency matrix:  : ℛ × ℛ → {0,1}
where  (  ,   ) = 1, if resources   and   interact, otherwise  (  ,   ) = 0.</p>
          <p>The description of the information service delivery technology η includes the structure, content
and characteristics of user request flows for information access, as well as technological chains used
to process these requests, including procedures for request identification, resource selection for
service execution, and the rules for resource utilization. This can be formalized as a function that
determines what resources are needed for each type of service:  :  → 2ℛ where  (  ) ⊆ ℛ is the
set of resources that are needed to provide service   .</p>
          <p>The relationship between the sets of services  and the set of system resources ℛ, respectively,
is defined by the mapping  for the particular information system under study. The dependency
between the set of services  and the set of resources ℛ: for each type of service   ∈  there is a
certain set of resources  (  ) that are needed for its implementation. This can be written as: ∀  ∈
 , ∃ (  ) ⊆ ℛ.</p>
          <p>The availability of system resources can be described by the function  : ℛ → {0,1}, where:
 (  ) = 1 if resource   is available,  (  ) = 0 if resource   is not available.</p>
          <p>For each user request  , there exists a specific service   that the system must provide. This can
be described as the function:  :  →  , where  is the set of user requests and  ( ) is the service
that corresponds to the request  .</p>
          <p>While processing a request q, the system uses certain set of resources. This can be described by
a complex function that combines  and  :  :  → 2ℛ,  ( ) =  ( ( )), where  ( ) is the set of
resources that are needed to process the request  .</p>
          <p>For optimal resource utilization, an objective function can be introduced, which either minimizes
the total resource consumption or maximizes the system performance: Objective function:
 (ℛ,  ,  ,  ) → ℛ. For example, minimizing the request processing time or minimizing the number
of resources used.</p>
          <p>Thus, the mathematical model of the WSN describes the interaction between resources, services,
system structure, and service provision technology. The key components of the model are the sets
ℛ and  , the functions  and  , as well as the functions that define the availability of resources and
service requests processing.</p>
          <p>By specifying various parameters of the components, the mathematical model makes it possible
to obtain the optimal structure of an integrated sensor network. The model supports integration
across resources, services, system structure and service delivery technology. For example, Fig. 1
shows a bipartite graph of resources and services for 15 sensors.</p>
          <p>The given Fig.1. reflects the relationship between physical resources and system functions. Two
groups of nodes are depicted.</p>
          <p>As can be seen from the data presented in the table, the proposed mathematical apparatus for
ensuring the reliability of wireless sensor networks makes it possible to construct a reliable network
while achieving advantages over existing solutions in terms of adaptability, the ability to add sensors
without increasing the number of batteries, and optimizing energy consumption, which is very
relevant in modern conditions.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusion</title>
      <p>The study addresses a highly relevant scientific and applied problem: ensuring the functional
stability of wireless sensor networks (WSNs) under challenging operational conditions, including
destabilizing environmental factors and active adversarial interference. A comprehensive approach
is proposed, based on the integration of audio-wave signal propagation technologies through air and
soil with pseudo-satellite radionavigation systems. This methodology enhances the network's
resilience to external impacts and ensures the reliable operation of critical systems in real-time.</p>
      <p>An analysis of the physical aspects of acoustic wave propagation in various media revealed its
dependence on temperature, humidity, soil density, and material elasticity. These parameters
significantly affect signal transmission quality in WSNs, particularly under external interference.
Compared to traditional radio-wave technologies, acoustic wave propagation offers higher resistance
to electromagnetic disturbances, making it a promising solution for both military applications and
civil critical infrastructure systems.</p>
      <p>Special attention is given to the formalization of the optimization problem for WSN structure
design, which takes into account a set of parameters: node connectivity probability, communication
channel length, message latency, bit error rate, energy consumption, and route recovery speed. The
introduction of an objective function aimed at maximizing functional stability allows for the
synthesis of an optimal network topology that balances operational efficiency with economic
feasibility. The outcome of solving this optimization problem is an adjacency matrix of the network
graph, which defines the optimal sensor placement and their interconnections.</p>
      <p>The key achievement of the research is the development of a comprehensive WSN operational
model that considers interactions among resource sets, information services, and destabilizing
factors. The model encompasses a structural-parametric system description, service delivery
technologies, and adaptation mechanisms to changes in the external environment. Central role in
this model is played by the integration of a pseudo-satellite navigation system, which provides an
alternative data transmission channel in the event of failure of primary network components. This
significantly enhances redundancy and the system’s self-recovery capability, which is critical for
deployments in combat zones or areas affected by natural disasters.</p>
      <p>The proposed approach demonstrates advantages over existing SOSUS technologies,
seismographs and sonars, which are limited by specific conditions of use. It provides flexibility in
designing networks adapted to different wave propagation environments, as well as integration with
modern electronic warfare systems. Moreover, the focus on energy efficiency extends the
autonomous operational lifespan of the sensors, which is particularly important for military and
industrial applications.</p>
      <p>Thus, the obtained results offer substantial practical potential for building reliable WSNs capable
of operating under extreme conditions. Future research should focus on experimental validation of
the proposed models, optimization of routing algorithms, and the development of hardware and
software tools for implementing this approach. This will contribute not only to solving the scientific
challenge of ensuring functional stability but also to the creation of next-generation wireless sensor
networks for both strategic defense applications and the civil sector.</p>
    </sec>
    <sec id="sec-7">
      <title>6. Acknowledgements</title>
      <p>The study was conducted within the framework of scientific research work No. 25BP064-01: Methods
and means of intelligently ensuring the functional stability of the reconnaissance system and
autonomous navigation of the combat line using UAVs.</p>
    </sec>
    <sec id="sec-8">
      <title>Declaration on Generative AI</title>
      <sec id="sec-8-1">
        <title>The authors have not employed any Generative AI tools.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Barabash</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sobchuk</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sobchuk</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musienko</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptiev</surname>
            <given-names>O..</given-names>
          </string-name>
          <article-title>Algorithms for synthesis of functionally stable wireless sensor network //</article-title>
          <source>Advanced Information Systems</source>
          .
          <year>2025</year>
          . V.
          <volume>9</volume>
          , № 1. pp.
          <fpage>70</fpage>
          -
          <lpage>79</lpage>
          . DOI: https://doi.org/10.20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2025</year>
          .
          <volume>1</volume>
          .08.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Dovzhenko</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barabash</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musienko</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ivanichenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krasheninnik</surname>
            <given-names>I..</given-names>
          </string-name>
          <article-title>Enhancing sensor network efficiency through optimized flooding mechanism /</article-title>
          / CPITS-2024
          <source>: Cybersecurity Providing in Information and Telecommunication Systems</source>
          .
          <year>2024</year>
          . pp.
          <fpage>465</fpage>
          -
          <lpage>470</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Petrivskyi</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shevchenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseiev</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptiev</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bychkov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedoriienko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tkachenko</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kurchenko</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Opirsky</surname>
            <given-names>I..</given-names>
          </string-name>
          <article-title>Development of a modification of the method for constructing energy-efficient sensor networks using static and</article-title>
          dynamic sensors //
          <source>EasternEuropean Journal of Enterprise Technologies</source>
          .
          <year>2022</year>
          . V.
          <volume>1</volume>
          , №
          <volume>9</volume>
          (
          <issue>115</issue>
          ). pp.
          <fpage>15</fpage>
          -
          <lpage>23</lpage>
          . DOI: https://doi.org/10.15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2022</year>
          .
          <volume>252988</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Barabash</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sobchuk</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musienko</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptiev</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bohomia</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kopytko</surname>
            <given-names>S..</given-names>
          </string-name>
          <article-title>System analysis and method of ensuring functional sustainability of the information system of a critical infrastructure object// System Analysis</article-title>
          and Artificial Intelligence / Zgurovsky M.,
          <string-name>
            <surname>Pankratova</surname>
            <given-names>N</given-names>
          </string-name>
          . (ed.). Cham: Springer,
          <year>2023</year>
          . (Studies in Computational Intelligence; v.
          <volume>1107</volume>
          ). DOI: https://doi.org/10.1007/978-3-
          <fpage>031</fpage>
          -37450-0_
          <fpage>11</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Barabash</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tverdenko</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sobchuk</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musienko</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukova-Chuiko</surname>
            <given-names>N..</given-names>
          </string-name>
          <article-title>The assessment of the quality of functional stability of the automated control system with hierarchic structure // 2020 IEEE 2nd International Conference on System Analysis &amp; Intelligent Computing (SAIC)</article-title>
          . Kyiv, Ukraine,
          <year>2020</year>
          . pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . DOI:
          <volume>10</volume>
          .1109/SAIC51296.
          <year>2020</year>
          .
          <volume>9239122</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Sobchuk</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zamrii</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vlasyk</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsvietkova</surname>
            <given-names>Y..</given-names>
          </string-name>
          <article-title>"Strategies for Control Automated Production Centers to Ensure the Functional Stability of Enterprise Information Systems</article-title>
          , //
          <source>2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT)</source>
          , Kyiv, Ukraine,
          <year>2021</year>
          , pp.
          <fpage>61</fpage>
          -
          <lpage>66</lpage>
          , doi: 10.1109/ATIT54053.
          <year>2021</year>
          .9678784
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Obidin</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ardelyan</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lukova-Chuiko</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musienko</surname>
            ,
            <given-names>A..</given-names>
          </string-name>
          <article-title>"Estimation of functional stability of special purpose networks located on vehicles</article-title>
          , // 2017 IEEE 4th International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD), Kiev, Ukraine,
          <year>2017</year>
          , pp.
          <fpage>167</fpage>
          -
          <lpage>170</lpage>
          , doi: 10.1109/APUAVD.
          <year>2017</year>
          .
          <volume>8308801</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Pichkur</surname>
            <given-names>V..</given-names>
          </string-name>
          <article-title>On practical stability of differential inclusions using Lyapunov functions</article-title>
          .
          <source>Discrete and Continuous Dynamical Systems - B</source>
          ,
          <year>2017</year>
          ,
          <volume>22</volume>
          (
          <issue>5</issue>
          ): pp.
          <fpage>1977</fpage>
          -
          <lpage>1986</lpage>
          . doi:
          <volume>10</volume>
          .3934/dcdsb.2017116
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Pichkur</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linder</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tairova</surname>
            <given-names>M..</given-names>
          </string-name>
          <article-title>On the Practical Stability of Discrete Inclusions with Spatial Components</article-title>
          .
          <source>J Math Sci</source>
          .
          <year>2021</year>
          . V.
          <volume>254</volume>
          , pp.
          <fpage>280</fpage>
          -
          <lpage>286</lpage>
          . https://doi.org/10.1007/s10958-021-05304-7
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Lukova-Chuiko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herasymenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toliupa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptievа</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptiev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <article-title>The method detection of radio signals by estimating the parameters signals of eversible Gaussian propagation</article-title>
          .
          <source>2021 IEEE 3rd International Conference on Advanced Trends in Information Theory, ATIT 2021 - Proceedings</source>
          .
          <year>2021</year>
          . pp.
          <fpage>67</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Boiko</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolubko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barabash</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eromenko</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Havrylko</surname>
            <given-names>Ye..</given-names>
          </string-name>
          <article-title>Signal processing with frequency and phase shift keying modulation in telecommunications</article-title>
          .
          <source>TELKOMNIKA. Telecommunication, Computing, Electronics and Control. Yogyakarta, Indonesia</source>
          ,
          <year>2019</year>
          . Vol.
          <volume>17</volume>
          , № 4. pp.
          <fpage>2025</fpage>
          -
          <lpage>2038</lpage>
          . https://doi.org/10.12928/TELKOMNIKA.
          <year>v17i4</year>
          .
          <fpage>12168</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Laptiev</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tkachev</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maystrov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krasikov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Open</surname>
            'ko
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khoroshko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parkhuts</surname>
            <given-names>L..</given-names>
          </string-name>
          <article-title>The method of spectral analysis of the determination of random digital signals</article-title>
          .
          <source>International Journal of Communication Networks and Information Security (IJCNIS)</source>
          .
          <year>2021</year>
          . Vol
          <volume>13</volume>
          ,
          <string-name>
            <surname>No</surname>
            <given-names>2</given-names>
          </string-name>
          , August pp.
          <fpage>271</fpage>
          -
          <lpage>277</lpage>
          . DOI: https://doi.org/10.54039/ijcnis.v13i2.
          <fpage>5008</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Kyrychok</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptiev</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lisnevsky</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozlovsky</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klobukov</surname>
            <given-names>V..</given-names>
          </string-name>
          <article-title>Development of a method for checking vulnerabilities of a corporate network using bernstein transformations</article-title>
          .
          <source>EasternEuropean journal of enterprise technologies</source>
          . Vol.
          <volume>1</volume>
          №
          <issue>9</issue>
          (
          <issue>115</issue>
          ),
          <year>2022</year>
          pp.
          <fpage>93</fpage>
          -
          <lpage>101</lpage>
          . DOI: https://doi.org/10.15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2022</year>
          .253530
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Laptiev</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musienko</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakonechnyi</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sobchuk</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gakhov</surname>
            <given-names>S.</given-names>
          </string-name>
          , Kopytko S..
          <source>Algorithm for Recognition of Network Traffic Anomalies Based on Artificial Intelligence. 5th International Congress on Human-Computer Interaction</source>
          , Optimization and
          <string-name>
            <given-names>Robotic</given-names>
            <surname>Applications</surname>
          </string-name>
          (HORA)
          <fpage>08</fpage>
          -
          <lpage>10</lpage>
          June 2023 DOI: https://doi.org/10.1109/HORA58378.
          <year>2023</year>
          .10156702
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Hu</surname>
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mukhin</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kornaga</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barabash</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herasymenko</surname>
            <given-names>O</given-names>
          </string-name>
          .
          <article-title>Analytical Assessment of Security Level of Distributed and Scalable Computer Systems</article-title>
          .
          <source>International Journal of Intelligent Systems and Applications</source>
          ,
          <year>2016</year>
          . Vol.
          <volume>8</volume>
          . No.
          <volume>12</volume>
          . Hong Kong: MECS Publisher,
          <year>2016</year>
          . pp.
          <fpage>57</fpage>
          -
          <lpage>64</lpage>
          . https://doi.org/10.5815/ijisa.
          <year>2016</year>
          .
          <volume>12</volume>
          .07
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Datsenko</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchuk</surname>
            <given-names>H..</given-names>
          </string-name>
          <article-title>Biometric authentication utilizing convolutional neural networks</article-title>
          ,
          <source>Advanced Information Systems</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>87</fpage>
          -
          <lpage>91</lpage>
          ,
          <year>2023</year>
          , doi: https://doi.org/10.20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2023</year>
          .
          <volume>2</volume>
          .
          <fpage>12</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Salnikov</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karaman</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krylova</surname>
            <given-names>V..</given-names>
          </string-name>
          <article-title>Highly reconfigurable soft-cpu based peripheral modules design</article-title>
          ,
          <source>Advanced Information Systems</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>92</fpage>
          -
          <lpage>97</lpage>
          ,
          <year>2023</year>
          , doi: https://doi.org/10.20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2023</year>
          .
          <volume>2</volume>
          .
          <fpage>13</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Yevseiev</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korol</surname>
            <given-names>O.</given-names>
          </string-name>
          , et. al..
          <article-title>Development of McEliece modified asymmetric crypto-code system on elliptic truncated codes</article-title>
          ,
          <source>Eastern-European Journal of Enterprise Technologies</source>
          .
          <year>2016</year>
          .
          <volume>4</volume>
          ,
          <issue>9</issue>
          (
          <issue>82</issue>
          ), р.
          <fpage>18</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Yevseiev</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kots</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liekariev</surname>
            <given-names>Y..</given-names>
          </string-name>
          <article-title>Developing of multi-factor authentication method based on Niederreiter-McEliece modified crypto-code system</article-title>
          ,
          <source>Eastern-European Journal of Enterprise Technologies</source>
          .
          <year>2016</year>
          . 6/4 (
          <issue>84</issue>
          ), p.
          <fpage>11</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Yevseiev</surname>
            <given-names>S.</given-names>
          </string-name>
          , et.al..
          <article-title>Practical implementation of the Niederreiter modified crypto-code system on truncated elliptic codes” Eastern-</article-title>
          <source>European Journal of Enterprise Technologies</source>
          ,
          <volume>6</volume>
          /4(
          <issue>96</issue>
          ). p.
          <fpage>24</fpage>
          -
          <lpage>31</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Petrovska</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuchuk</surname>
            <given-names>H..</given-names>
          </string-name>
          <article-title>Adaptive resource allocation method for data processing and security in cloud environment</article-title>
          .
          <source>Advanced Information Systems</source>
          , vol.
          <volume>7</volume>
          , No.
          <issue>3</issue>
          , pp.
          <fpage>67</fpage>
          -
          <lpage>73</lpage>
          ,
          <year>2023</year>
          , doi: https://doi.org/10.20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2023</year>
          .
          <volume>3</volume>
          .
          <fpage>10</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Dzheniuk</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseiev</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lazurenko</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serkov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kasilov</surname>
            <given-names>O..</given-names>
          </string-name>
          <article-title>A method of protecting information in cyber-physical space</article-title>
          ,
          <source>Advanced Information Systems</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>80</fpage>
          -
          <lpage>85</lpage>
          ,
          <year>2023</year>
          , doi: https://doi.org/10.20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2023</year>
          .
          <volume>4</volume>
          .11.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Gavrylenko</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poltoratskyi</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nechyporenko</surname>
            <given-names>A.</given-names>
          </string-name>
          , “
          <article-title>Intrusion detection model based on improved transformer”</article-title>
          ,
          <source>Advanced Information Systems</source>
          , vol.
          <volume>8</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>94</fpage>
          -
          <lpage>99</lpage>
          ,
          <year>2024</year>
          . https://doi.org/10.20998/
          <fpage>2522</fpage>
          -
          <lpage>9052</lpage>
          .
          <year>2024</year>
          .
          <volume>1</volume>
          .12.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>