<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>June</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Method of Detecting Dangerous Signals of a Given Frequency Range⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Laptiev</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuriy Shcheblanin</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana Laptieva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Parkhomenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergey Laptiev</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>State University of Trade and Economics / Kyiv National University of Trade and Economics</institution>
          ,
          <addr-line>Kyoto Str., 19, Kyiv, 02156</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska Str., 60, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>0</volume>
      <fpage>9</fpage>
      <lpage>11</lpage>
      <abstract>
        <p>The article presents a novel method for detecting dangerous radio signals within a specified frequency range, leveraging Bayesian hypothesis testing. With the increasing sophistication of covert technical means, such as radio beacons and hidden transmitters, traditional detection techniques based on spectral analysis or power measurement are often insufficient. These modern devices employ low-power transmission, frequency agility, and signal masking to avoid detection. To address this challenge, the authors propose a statistically robust approach rooted in Bayesian inference, which allows for the integration of prior knowledge about signal characteristics and noise behavior. The methodology formalizes the detection task as a binary hypothesis test: the presence (H₁) or absence (H₀) of a dangerous signal in the observed data. By applying Bayes' theorem, the model updates prior probabilities with empirical observations, enabling more accurate and adaptive decision-making under uncertainty. The study derives key performance metrics, including false alarm probability, signal detection probability, and overall error probability, demonstrating how these indicators improve with the incorporation of additional signal features. Simulation results show that increasing the number of detection parameters from four to seven raises the success rate of identifying dangerous transmissions from 80% to 95%, confirming the effectiveness of the proposed method. This Bayesian framework enhances the reliability and precision of radio monitoring systems, particularly in complex electromagnetic environments where classical methods fail. The research contributes to the field of information security by offering a principled and flexible solution for countering technical espionage and preventing unauthorized data leakage via radio channels. The proposed method can be implemented in practical operations of technical protection services, significantly improving the efficiency of signal detection and strengthening the overall security posture of critical information infrastructure.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Wireless networks</kwd>
        <kwd>information protection</kwd>
        <kwd>radio channel</kwd>
        <kwd>information flow</kwd>
        <kwd>radio bookmarks</kwd>
        <kwd>random radio signals</kwd>
        <kwd>cyberspace</kwd>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Information has become one of the most valuable economic assets that influence the competitiveness
of enterprises, government institutions, and other entities in modern society. The acquisition of
confidential information without direct physical access has evolved into a new form of technological
activity known as "technical espionage." Among the most common methods for acquiring sensitive
data is the use of specialized technical means designed to covertly obtain and transmit data via radio
channels. These devices are often referred to as radio beacons, radio bugs, or covert listening devices.</p>
      <p>Radio beacons can vary significantly in their design: from simple analog transmitters to complex
digital systems equipped with data storage modules, remote control capabilities, encryption, and
environmental adaptability. The primary goal of such devices is to ensure maximum concealment of
their operation. This is achieved through the use of low-power transmitters, careful selection of
operating frequencies, limited transmission duration (activation only when necessary), and the
application of signal masking techniques.</p>
      <p>As a result, the challenge of detecting such devices becomes increasingly relevant, especially at
facilities where critical or classified information is stored or processed. Traditional detection methods
based on spectral analysis, power measurement, or visual inspection have limited effectiveness when
modern concealment technologies are employed. Therefore, researchers are increasingly turning to
statistical approaches—particularly hypothesis testing—as a foundation for building automated radio
monitoring analysis systems.</p>
      <p>Hypothesis testing is one of the fundamental statistical tools used to verify assumptions about
the parameters of random processes. In general, it involves comparing two mutually exclusive
hypotheses: the null hypothesis (H₀) and the alternative hypothesis (H₁). The null hypothesis
assumes no significant changes or relationships in the process under study, while the alternative
suggests their presence. Based on collected data, a statistical analysis is performed to determine
whether the null hypothesis should be accepted or rejected.</p>
      <p>In the context of radio monitoring, this method can be applied to detect anomalies in the spectrum
that may indicate the presence of illegal transmissions. For instance, if the background noise level in
a certain frequency band significantly exceeds the expected level, it may suggest the presence of a
hidden transmitter. Thus, hypothesis testing becomes an important tool for automating the analysis
of radio environment conditions.</p>
      <p>
        According to [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the formalization of the hypothesis testing problem involves determining the
probability of Type I error (rejecting a true H₀) and Type II error (accepting a false H₀). To ensure
optimal decision-making, various criteria are used, such as the Neyman-Pearson criterion, the
maximum likelihood criterion, or the Bayesian criterion. The latter becomes particularly relevant
when prior knowledge about the signal's occurrence probability is available.
      </p>
      <p>
        Works [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] examine the classification of hypothesis testing into single-sample and
twosample procedures. Single-sample methods are used to test hypotheses about a single distribution,
whereas two-sample methods are used to compare two independent datasets. However, in most
cases, these methods are discussed within the general framework of mathematical statistics, without
specific adaptation to physical processes such as radio signals.
      </p>
      <p>
        Studies [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] demonstrate the advantages of the Bayesian approach to hypothesis testing
compared to classical methods. Classical algorithms, including the maximum likelihood method, do
not account for prior information, which can lead to increased error rates in uncertain situations. In
contrast, the Bayesian approach allows for the integration of knowledge about the signal model, its
probability of occurrence, and the statistical characteristics of noise.
      </p>
      <p>A key distinction of the Bayesian approach is that model parameters are treated as random
variables with known or estimated prior distributions. This enables real-time adaptation of the
model, which is critically important in tasks involving the detection of weak, short-term, or chaotic
signals.</p>
      <p>
        In works [6] and [
        <xref ref-type="bibr" rid="ref6">7</xref>
        ], two main strategies for implementing Bayesian learning from data are
described. The first, known as the Search and Score method, involves searching for the optimal model
structure by maximizing a quality criterion, such as the Akaike Information Criterion (AIC) or the
Bayesian Information Criterion (BIC). The second strategy employs constraint-based algorithms,
which infer conditional independence between variables based on statistical tests.
      </p>
      <p>Although machine learning offers opportunities for data analysis automation, expert assessments
and analytical models often remain more reliable under high uncertainty. This is especially true for
specialized tasks such as detecting radio signals in complex electromagnetic environments.</p>
      <p>Considering the current state of research, the limitations of existing detection methods, and the
need to improve the efficiency of radio monitoring, it is scientifically justified to develop a Bayesian
approach to hypothesis testing for identifying dangerous signals within a specified frequency range
at information-sensitive sites.</p>
      <p>Therefore, it is relevant to develop a Bayesian hypothesis testing method for detecting dangerous
signals of a given frequency range at objects of information activity. This will enhance the
effectiveness of radio monitoring systems, ensure reliable protection of information resources, and
prevent the loss of confidential data..</p>
      <p>
        Based on the above, the development of a method of Bayesian hypothesis testing for detecting
dangerous signals of a given frequency range at the objects of information activity is relevant.
2. Main part
In various information systems, it is often necessary to solve problems related to distinguishing
certain random processes. This primarily refers to the task of radio monitoring of a given frequency
range, digital measurement systems and calculation of parameters of dangerous noise-like signals in
technical channels of information leakage [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">10-13</xref>
        ] .
      </p>
      <p>The tasks of random signal recognition are related to the problems of statistics, and its solution
is based on the application of the theory of statistical hypothesis testing using appropriate measures
(dimensions).</p>
      <p>To consider this issue, we will present the basic information that allows us to solve the problem
of observing random signals in discrete time.</p>
      <p>Let the result of radio monitoring (observation) receive a vector x, which is the value of a vector
random variable X, which takes values from the radio monitoring frequency range (observation
space) Ωx.</p>
      <p>We take into account that random signals of the radio monitoring range can be an additive
mixture, a multiplicative mixture or a combined mixture.</p>
      <p>That is, one of a given set of fully known signals, which are given by the expression
S i = [S i, S 2i,...S ni]T, i 0, m −1
and noise (interference) with a given probability distribution density.</p>
      <p>Then the task of detecting a dangerous signal is a special case of recognition when m = 2 and one
of the signals is identically zero: S0 = 0.</p>
      <p>For example, when recognizing two signals S0 and S1 against the background of combined
additive V and multiplicative U noise on observation x, hypothesis testing should be carried out
H 0 : X = U 0S +V , H1: X = U1S +V ,
(1)
(2)
where is U = diagU 1,U 2,...,U n  a random matrix of divisions of multiplicative noises;</p>
      <p>T
V = V 1,V 2,...,V n  is a random vector of additive noise divisions.</p>
      <p>The task of testing the hypotheses described by expression (1) can be presented in a parametric
form.</p>
      <p>Let the random variable ϑ take values from the set
Ωϑ = {0;1}. An available implementation would be a random variable described by the expression
It is necessary to test the hypotheses</p>
      <p>X = (1− )(U S0 +V ) + (U S1 +V ) =
= (1− )U S0 +U S1 +V</p>
      <p>H 0 : = 0, = 1.
(3)
(4)</p>
      <p>The given example shows that, given the task of detecting (recognizing) the probable value
(dangerous signal) X depends on some random value (depends on the state of nature), the value of
which ϑ must be determined in a specific experience.</p>
      <p>Note that with this formulation, the tasks of detection and estimation of signal parameters do not
fundamentally differ and are solved in the same way.</p>
      <p>We will assume that the conditional distribution function F X|(x | ) = PX  x | =  (conditional
density of the probability distribution) W x (x | ) and the density of the probability distribution
W ( ) are known at the beginning of the study.</p>
      <p>For the given example, the action space A consists of two elements: a0 and a1, which respectively
mean the acceptance of the hypothesis H 0(ˆ = 0) i H1(ˆ = 1).</p>
      <p>The solution space D consists of all mappings d: Ωx → A of the vector of observations into
available actions. Thus, the frequency space of radio monitoring is divided into two areas:
x = x | d(x) = a0</p>
      <p>acceptance of hypothesis H0 (commitment of action a0 and the area
x = x | d(x) = a1 } acceptance of hypothesis H1 (commitment of action а1). The task of optimal
signal detection synthesis is to perform this breakdown. Note that the regions and may be disjoint.</p>
      <p>With this formulation of the task, each action is assigned a mutually unambiguous assessment of
the state (parameter) of nature, therefore the space A and Ωɵ can be equated: А = Ωɵ. Each action
(decision about the value of the random parameter Ωɵ in a specific experience) is accompanied by
losses, which are described by the loss function L :  A → R+ R — a set of real positive numbers.
The loss function maps the estimate of this parameter to each true value of the state (parameter) of
nature Ωɵ. Since the decision ˆ = ˆ can be accompanied by errors, in the event of an error, the person
making the decision suffers losses, which are described by the loss function. It is clear that the loss
function is an integral function. At the same time, the losses in the case of a correct decision should
be greater than the losses in the case of a wrong decision</p>
      <p>We assign a risk to each solution d = d(x) and the state of nature
.
r(d*) = mindD  R( ,d (x)W ( )d ( )
</p>
      <p>It is possible to determine that the Bayesian decision function can be found from the condition of
minimum posterior risk.</p>
      <p>To detect dangerous signals, namely to test the hypotheses of the presence of dangerous signals,
we will apply the Bayes estimation method.</p>
      <p>Bayesian hypothesis testing represents a robust statistical framework that enables researchers to
assess the relative plausibility of competing hypotheses in light of observed data. Unlike classical
frequentist methods, which primarily rely on p-values to reject a null hypothesis without directly
quantifying the evidence in favor of alternative explanations, Bayesian hypothesis testing provides
a more comprehensive and interpretable approach. It allows for the incorporation of prior knowledge
or expert beliefs about the hypotheses before observing the data, making it especially valuable in
domains where such information is available or critical for decision-making.</p>
      <p>In this framework, each hypothesis is assigned a prior probability distribution that reflects
existing knowledge or assumptions regarding its likelihood. Once empirical data are collected, Bayes'
theorem is applied to update these prior probabilities, yielding posterior probabilities that quantify
the degree of belief in each hypothesis after considering the observed data. This process not only
supports hypothesis evaluation but also facilitates model comparison and uncertainty quantification
in a probabilistically coherent manner.</p>
      <p>
        A key feature of Bayesian hypothesis testing is its ability to compute the Bayes factor — a
quantitative measure of the strength of evidence favoring one hypothesis over another. The Bayes
factor is defined as the ratio of the marginal likelihoods of the data under two competing hypotheses,
weighted by their respective prior probabilities. When the Bayes factor exceeds 1, it indicates that
the data provide more support for the first hypothesis compared to the second; conversely, values
below 1 suggest stronger support for the alternative hypothesis [
        <xref ref-type="bibr" rid="ref13 ref14">14,15</xref>
        ].
      </p>
      <p>
        This methodological advantage makes Bayesian hypothesis testing particularly suitable for
applications in fields such as signal processing, cybersecurity, and information protection, where
decisions must often be made under uncertainty and with limited data. For instance, in the detection
of covert radio signals or anomalies in electromagnetic environments, Bayesian techniques can
improve classification accuracy by integrating prior knowledge about signal characteristics and
noise behavior [
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18">16–19</xref>
        ]. As a result, the Bayesian approach offers a flexible, principled, and highly
informative alternative to traditional hypothesis testing methodologies.The Bayesian decision rule
d * = d *(x)A is chosen from the condition of minimum average risk
(4)
(5)
(6)
      </p>
      <p>Characteristics of the detector. Under the condition A = Ωɵ = {0;1}), the main characteristics of
the detector are:</p>
      <p>a) the probability of a false alarm ɑ = P {d(X) = 1 | ɵ = 0}, which is equal to the probability of
accepting the hypothesis H1 about the presence of a useful signal while there is no useful signal;
b) the possibility of passing a signal β = P{d(X) = 0 | ɵ = 1}, which is equal to the probability of
accepting the hypothesis H0 about the absence of a useful signal while a useful signal is present;
c) probability of correct detection Qd = P {d(X) = 1 | ɵ = 1} = 1-β, is equal to the probability of
accepting the hypothesis H1 about the presence of a useful signal while the useful signal is actually
present;
d) the probability of a complete error Qd = ɑР { ɵ = 0} + βР { ɵ = 1}.</p>
      <p>The quantity ɑ is called the level of significance of the criterion d(x), and the quantity Qd is called
the power of the criterion.</p>
      <p>Bayesian hypothesis testing, adapted for the detection of whistleblowing signals, is a powerful
and flexible statistical method for detecting dangerous signals of a given frequency range, which can
help information security professionals make more informed decisions and draw more accurate
conclusions. In general, this method can take into account complex models with many parameters
and hypotheses that may be difficult to analyze using classical methods.</p>
    </sec>
    <sec id="sec-2">
      <title>3. Overview of results and sources</title>
      <p>The basis of the decision-making method in probabilistic-statistical research is a mathematical model
of the investigated process, which is characterized by its structure. A correct assessment of the
structure makes it possible to make a correct decision based on such a model.</p>
      <p>
        The concept of the structure of a mathematical model includes the following elements [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2,
2023</xref>
        ]:
1. dimensionality of the model (the number of equations forming the model);
2. order of the model (maximum order of the difference or differential equation included in the
model);
      </p>
      <p>3. nonlinearity and its type (nonlinearity with respect to variables or non-linearity with respect
to parameters);
4. the time (or lag) of delay (at the entrance) and its assessment;
5. disturbance and its type (deterministic or random, type of distribution, probability distribution
parameters);
6. restrictions on model variables and parameters.</p>
      <p>Let’s consider a practical application. Conducted radio monitoring and detected, for example, 52
unknown random signals. We denote by A the event which means that a signal exceeding the
amplitude threshold was detected from these signals, and by B – the event which means that a signal
of unknown frequency modulation was detected. Obviously, these events are dependently related,
since their intersection means that we have detected an unknown signal, i.e. A ∩ B={unknown signal}.</p>
      <p>Thus, the probability that we detect an unknown signal of unknown frequency modulation is</p>
      <p>Thus, the probability of detecting an unknown signal from an unknown frequency-pulse
modulation will be 80%.</p>
      <p>How can we take not four signs of detection of dangerous signals, signals which may be signals
of means of secretly obtaining information, but more, for example, five, then six and seven signs.
That should significantly increase the probability of detecting random signals. This hypothesis was
verified by simulation. We leave other conditions for the analysis unchanged. Then we get for five
That is, the probability became 85%, which corresponds to theoretical statements.</p>
      <p>If we use not five, but six signs of detection when detecting the signals of radio jamming devices,
with unchanged initial conditions, we will get</p>
      <p>That is, the probability became 90%, which also corresponds to theoretical statements.</p>
      <p>If we use not six, but seven signs of detection when detecting the signals of radio jamming devices,
with unchanged initial conditions, we will get</p>
      <p>That is, the probability became 95%, which also corresponds to theoretical statements.</p>
      <p>It should be borne in mind that there are many parameters for detecting radio signals. Therefore,
probabilities must be carefully applied in mathematical calculations.</p>
      <p>For a visual proof of the proposed method, we present a graphic representation. A graphic
presentation of the results of the methodology is presented in Fig. 1.
0,90
0,85
0,80
0,75
0,70
4
5
6
7</p>
      <p>On the x-axis, the number of detection parameters increases incrementally from four to seven.
These parameters may include characteristics such as amplitude threshold exceedance, frequency
modulation type, signal duration, spectral density distribution, and temporal correlation with known
interference patterns. The y-axis represents the probability of signal detection expressed as a
percentage.</p>
      <p>As shown in the figure, when only four detection features are applied, the probability of
identifying a dangerous signal reaches approximately 80% . With the inclusion of a fifth feature, this
probability rises to 85% , indicating improved accuracy due to additional contextual information.
Further enhancement is observed when six features are utilized, resulting in a detection probability
of 90% . Finally, with the integration of a seventh detection parameter, the success rate reaches 95%
, demonstrating that each added characteristic significantly contributes to the overall effectiveness
of the detection process.</p>
      <p>This trend confirms the theoretical assumption that increasing the number of relevant signal
features enhances the reliability and precision of the decision-making mechanism based on Bayesian
hypothesis testing. It also supports the practical applicability of the method in real-world scenarios
where early and accurate detection of unauthorized transmissions is critical for information security.</p>
    </sec>
    <sec id="sec-3">
      <title>4. Conclusion</title>
      <p>Based on the conducted research of hypothesis testing methods with the aim of their application for
detecting dangerous signals within a specified frequency range, it has been proven that the adapted
Bayesian hypothesis testing method offers significant advantages over traditional classical
approaches. This method provides higher accuracy in detecting dangerous radio signals, especially
under conditions of uncertainty and in the presence of complex-structured noise.</p>
      <p>The Bayesian approach enables specialists in information security not only to formalize the
decision-making process but also to consistently update their prior beliefs based on new empirical
data. This results in more substantiated, reliable, and flexible conclusions, which are critically
important in tasks related to the detection of covert information-gathering devices. Unlike classical
methods, which rely on p-value analysis and often fail to provide a quantitative measure of the
strength of evidence, Bayesian methodology allows for a quantitative assessment of hypothesis
probabilities, offering richer informational support for decision-making.</p>
      <p>Simulation results have shown that the use of additional signal parameters — increasing from
four to seven — during hypothesis testing increases the probability of detecting dangerous signals
from 80% to 95%. This demonstrates the effectiveness of the proposed method. Such an improvement
of 15% is significant and confirms the theoretical assumptions regarding the advantages of the
Bayesian approach under real-world radio monitoring conditions.</p>
      <p>Thus, the advantages of the adapted Bayesian hypothesis testing method for detecting dangerous
signals within a given frequency range unquestionably confirm the feasibility of its implementation
in the practical operations of technical information protection services. The proposed approach can
be successfully applied to enhance the efficiency of radio monitoring systems, ensure the integrity
and confidentiality of information, and counteract technical channels of data leakage.</p>
    </sec>
    <sec id="sec-4">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
[6] Oleksandr Laptiev, Nataliia Lukova-Chuiko, Serhii Laptiev, Tetiana Laptieva, Vitaliy Savchenko,
Serhii Yevseiev. Development of a Method for Detecting Deviations in the Nature of Traffic
from the Elements of the Communication Network. International Scientific And Practical
Conference “Information Security And Information Technologies”: Conference Proceedings.
1319 September 2021. Kharkiv – Odesa, Ukraine. Р.1-9 ISBN 978-966-676-818-9.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>O.</given-names>
            <surname>Laptiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kotenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Akhramovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Samosyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Shuklin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Biehun</surname>
          </string-name>
          .
          <article-title>Method of Determining Trust and Protection of Personal Data in Social Networks</article-title>
          .
          <source>International Journal of Communication Networks and Information Security (IJCNIS)</source>
          , Vol.
          <volume>13</volume>
          , No.
          <volume>1</volume>
          ,
          <year>2021</year>
          . рр.
          <volume>15</volume>
          -
          <fpage>21</fpage>
          . https://www.ijcnis.org/index.php/ijcnis/article/view/4882
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Oleksandr</given-names>
            <surname>Laptiev</surname>
          </string-name>
          , Vitalii Savchenko, Andrii Pravdyvyi, Ivan Ablazov, Rostyslav Lisnevskyi, Oleksandr Kolos,
          <string-name>
            <given-names>Viktor</given-names>
            <surname>Hudyma</surname>
          </string-name>
          .
          <article-title>Method of Detecting Radio Signals using Means of Covert by Obtaining Information on the basis of Random Signals Model</article-title>
          .
          <source>International Journal of Communication Networks and Information Security (IJCNIS)</source>
          , Vol.
          <volume>13</volume>
          , No.
          <volume>1</volume>
          ,
          <year>2021</year>
          . рр.
          <volume>48</volume>
          -
          <fpage>54</fpage>
          . https://www.ijcnis.org/index.php/ijcnis/article/view/4902
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Oleksandr</given-names>
            <surname>Laptiev</surname>
          </string-name>
          , Volodymyr Tkachev, Oleksii Maystrov, Oleksandr Krasikov, Pavlo Open'ko, Volodimir Khoroshko,
          <string-name>
            <given-names>Lubomir</given-names>
            <surname>Parkhuts</surname>
          </string-name>
          .
          <article-title>The method of spectral analysis of the determination of random digital signals</article-title>
          .
          <source>International Journal of Communication Networks and Information Security (IJCNIS)</source>
          . Vol
          <volume>13</volume>
          ,
          <string-name>
            <surname>No</surname>
            <given-names>2</given-names>
          </string-name>
          ,
          <year>August 2021</year>
          рр.
          <fpage>271</fpage>
          -
          <lpage>277</lpage>
          . ISSN:
          <fpage>2073</fpage>
          -
          <lpage>607X</lpage>
          (
          <article-title>Online)</article-title>
          . DOI : https://doi.org/10.54039/ijcnis.v13i2.
          <fpage>5008</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Lukova-Chuiko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herasymenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toliupa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptievа</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptiev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <article-title>The method detection of radio signals by estimating the parameters signals of eversible Gaussian propagation 2021</article-title>
          <source>IEEE 3rd International Conference on Advanced Trends in Information Theory, ATIT 2021 - Proceedings</source>
          ,
          <year>2021</year>
          , Р.
          <fpage>67</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Khudov</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berezhnyi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yarosh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oleksenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khomik</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yuzova</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zvonko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yarovyi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Glukhov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Sobora</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Improving a method for detecting and measuring coordinates of a stealth aerial vehicle by a network of two small-sized radars</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>6</volume>
          (
          <issue>9</issue>
          (
          <issue>126</issue>
          ),
          <fpage>6</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Mashkov</surname>
            <given-names>O.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sobchuk</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barabash</surname>
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dakhno</surname>
            <given-names>N.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shevchenko</surname>
            <given-names>H.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maisak</surname>
            <given-names>T.V.</given-names>
          </string-name>
          <article-title>Improvement of variational-gradient method in dynamical systems of automated control for integro-differential models</article-title>
          . // Mathematical Modeling and Computing,
          <year>2019</year>
          , Vol.
          <volume>6</volume>
          , No 2, pp.
          <fpage>344</fpage>
          -
          <lpage>357</lpage>
          . https://doi.org/10.23939/mmc2019.
          <fpage>02</fpage>
          .344
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Sobchuk</surname>
            ,
            <given-names>V. V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Zelenska</surname>
            ,
            <given-names>I. O.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Construction of asymptotics of the solution for a system of singularly perturbed equations by the method of essentially singular functions</article-title>
          .
          <source>Bulletin of Taras Shevchenko National University of Kyiv. Physics and Mathematics</source>
          , (
          <volume>2</volume>
          ),
          <fpage>184</fpage>
          -
          <lpage>192</lpage>
          . https://doi.org/10.17721/1812-
          <fpage>5409</fpage>
          .
          <year>2023</year>
          /2.34
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Kapustian</surname>
            ,
            <given-names>O.A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kapustyan</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Ryzhov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Sobchuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>Approximate Optimal Control for a Parabolic System with Perturbations in the Coefficients on the Half-Axis</article-title>
          .
          <source>Axioms</source>
          <year>2022</year>
          ,
          <volume>11</volume>
          , 175. https://doi.org/10.3390/ axioms11040175
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Sobchuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Barabash</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Musienko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Tsyganivska</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kurylko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <article-title>Mathematical Model of Cyber Risks Management Based on the Expansion of Piecewise Continuous Analytical Approximation Functions of Cyber Attacks in the Fourier Series</article-title>
          .
          <source>Axioms</source>
          <year>2023</year>
          , (
          <issue>12</issue>
          ),
          <volume>924</volume>
          . https://doi.org/10.3390/axioms12100924
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Sobchuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olimpiyeva</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musienko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sobchuk</surname>
            ,
            <given-names>A. Ensuring</given-names>
          </string-name>
          <article-title>the properties of functional stability of manufacturing processes based on the application of neural networks</article-title>
          <source>CEUR Workshop Proceedings</source>
          ,
          <year>2021</year>
          ,
          <volume>2845</volume>
          , рр.
          <fpage>106</fpage>
          -
          <lpage>116</lpage>
          . ISSN 16130073
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Valentyn</surname>
            <given-names>Sobchuk</given-names>
          </string-name>
          , Oleg Barabash, Andriy Musienko and Olha
          <string-name>
            <surname>Svynchuk</surname>
          </string-name>
          (
          <year>2021</year>
          )
          <article-title>Adaptive accumulation and diagnostic information systems of enterprises in energy and industry sectors</article-title>
          .
          <source>E3S Web of Conferences: 1st Conference on Traditional and Renewable</source>
          Energy Sources:
          <article-title>Perspectives and Paradigms for the 21st Century (TRESP</article-title>
          <year>2021</year>
          ).
          <source>January 22-23</source>
          ,
          <year>2021</year>
          . Volume
          <volume>250</volume>
          (
          <year>2021</year>
          ) Prague, Czech Republic. рр.
          <volume>82</volume>
          -
          <fpage>87</fpage>
          . https://doi.org/10.1051/e3sconf/202125008002
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Zaika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Trembovetskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Shuklin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Berkman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Storchak</surname>
          </string-name>
          , I. Rolin, “
          <article-title>Composite Radioisotope Coating Parameters and Reflecting Characteristics Calculation Selection Method</article-title>
          ,” in
          <source>International Journal of Advanced Trends in Computer Science and Engineering</source>
          , Vol.
          <volume>8</volume>
          , No.
          <issue>5</issue>
          , pp.
          <fpage>2246</fpage>
          -
          <lpage>2251</lpage>
          ,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .30534/ijatcse/2019/60852019
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>V.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tolubko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Berkman</surname>
          </string-name>
          , et al. “
          <article-title>Model of an alternative navigation system for high-precision weapons</article-title>
          ,” in
          <source>The Journal of Defense Modeling and Simulation</source>
          ,
          <volume>19</volume>
          (
          <issue>3</issue>
          ),
          <fpage>255</fpage>
          -
          <lpage>262</lpage>
          ,
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .1177/1548512920921955
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Dakhno</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leshchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravchenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dudnik</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trush</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khankishiev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          “
          <article-title>Dynamic model of the spread of viruses in a computer network using differential equations”</article-title>
          .
          <source>IEEE 3rd International Conference on Advanced Trends in Information Theory</source>
          , ATIT`
          <fpage>2021</fpage>
          -
          <lpage>Proceedings</lpage>
          ,
          <year>2021</year>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>115</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Khudov</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tahyan</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lishchenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Misiuk</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bashynskyi</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fakadii</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maslenko</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herda</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lavrut</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nedilskyi</surname>
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2023</year>
          ),
          <article-title>The Creation of a Hidden Radar Field for the Detection of Small Aerial Objects due to the Use of Signals from Telecommunication Systems</article-title>
          ,
          <source>International Journal of Applied Engineering and Technology</source>
          <volume>5</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>9</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Bondarenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravchenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salkutsan</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tyshchenko</surname>
            <given-names>M. “</given-names>
          </string-name>
          <article-title>Synthesis of the Structure of Multilevel Hierarchical Systems of Increased Survivability Based on a Subjective Probability Model”</article-title>
          ,
          <source>IEEE 2nd International Conference on Advanced Trends in Information Theory</source>
          , ATIT`
          <fpage>2020</fpage>
          - Proceedings, pp.
          <fpage>138</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Riabtsev</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravchenko</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salkutsan</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tyshchenko</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharadkin</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bondarenko</surname>
            <given-names>V.</given-names>
          </string-name>
          “
          <article-title>Information model of decision support in the design of information and communication systems based on the customer's profile”</article-title>
          ,
          <source>IEEE 2nd International Conference on Advanced Trends in Information Theory</source>
          , ATIT`
          <fpage>2020</fpage>
          - Proceedings, pp.
          <fpage>234</fpage>
          -
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Dudnik</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravchenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trush</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leshchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dakhno</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rakytskyi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>Study of the features of ensuring quality indicators in multiservice networks of the Wi-Fi standard</article-title>
          .
          <source>2021 IEEE 3rd International Conference on Advanced Trends in Information Theory, ATIT 2021 - Proceedings</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>93</fpage>
          -
          <lpage>98</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Kravchenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leshchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dakhno</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Comparative evaluation of a universities websites quality</article-title>
          .
          <source>CEUR Workshop Proceedingsthis link is disabled</source>
          ,
          <year>2022</year>
          ,
          <volume>3132</volume>
          , pp.
          <fpage>166</fpage>
          -
          <lpage>175</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Yudin</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mashkov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravchenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cherniak</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salkutsan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tyshchenko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          “
          <article-title>Reconfiguration of computations in multiprocessor computing system”</article-title>
          .
          <source>IEEE 3rd International Conference on Advanced Trends in Information Theory</source>
          , ATIT`
          <fpage>2021</fpage>
          -
          <lpage>Proceedings</lpage>
          ,
          <year>2021</year>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>173</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Dakhno</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leshchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravchenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dudnik</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trush</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khankishiev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          “
          <article-title>Dynamic model of the spread of viruses in a computer network using differential equations”</article-title>
          .
          <source>IEEE 3rd International Conference on Advanced Trends in Information Theory</source>
          , ATIT`
          <fpage>2021</fpage>
          -
          <lpage>Proceedings</lpage>
          ,
          <year>2021</year>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>115</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lienkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sieliukov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Lienkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Tolok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Loza</surname>
          </string-name>
          .
          <source>Evolution of Radars Resolution Capability Using Simulation Mathematical Model. Proceedings 5th International Conference “Methods and Systems of Navigation and Motion Control”. ISBN: 978-153865870-3 - Kyiv</source>
          ,
          <year>2018</year>
          . - P.
          <fpage>195</fpage>
          -
          <lpage>197</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>