[1] Al-Dalvash A.: Models of optimal fuel functioning of remote access security in information networks. Ukrainian Scientific Journal of Information Security 26(3), 2021, 126–131 [https://doi.org/10.18372/2225-5036.27.16513].
DOI: https://doi.org/10.18372/2225-5036.27.16513
[2] Barabash O. V. et al.: Target Programming with Multicriteria Restrictions Application to the Defense Budget Optimization. Advances in Military Technology 14(2), 2019, 213–229.
[3] Buryachok V. L. et al.: Information and cyber security: socio-technical aspect. DUT, Kyiv 2015, 24–30.
[4] Khoroshko V. et al.: Optimization of information structures of local networks. Informatics and mathematical methods in modeling 10(1-2), 2020, 45–54.
DOI: https://doi.org/10.15276/imms.v10.no1-2.45
[5] Khoroshko V. et al.: Synthesis of the optimal topology of the data transmission network. Legal, regulatory and metrological support of the information protection system in Ukraine 2(28), 2022, 20–28.
[6] Kyrychok R. et al.: Development of a method for checking vulnerabilities of a corporate network using Bernstein transformations. Eastern-European journal of enterprise technologies 1(9), 2022, 93–101 [https://doi.org/10.15587/1729-4061.2022.253530].
DOI: https://doi.org/10.15587/1729-4061.2022.253530
[7] Laptiev O. et al.: The method of spectral analysis of the determination of random digital signals. International Journal of Communication Networks and Information Security (IJCNIS) 13(2), 2021, 271–277 [https://doi.org/10.54039/ijcnis.v13i2.5008].
DOI: https://doi.org/10.17762/ijcnis.v13i2.5008
[8] Lukova-Chuiko N. et al.: The method detection of radio signals by estimating the parameters signals of eversible Gaussian propagation. IEEE 3rd International Conference on Advanced Trends in Information Theory, ATIT 2021, 67–70.
DOI: https://doi.org/10.1109/ATIT54053.2021.9678856
[9] Milov O. et al.: Mechanisms of cyber security: the problem of conceptualization. Ukrainian Scientific Journal of Information Security 25(2), 2019, 110–116 [https://doi.org/10.18372/2225-5036. 25.13841].
DOI: https://doi.org/10.18372/2225-5036.25.13841
[10] Mukhamadieva Z. B.: Algorithms of the optimal structure of a computer network. A young scientist 22(102), 2015, 29–30.
[11] Sobchuk V. et al.: Algorithm for solution of systems of singularly perturbed differential equations with a differential turning point. Bulletin of the Polish Academy of Sciences Technical Sciences 71(3), 2023, e145682 [https://doi.org/10.24425/bpasts.2023.145682 WoS].
DOI: https://doi.org/10.24425/bpasts.2023.145682
[12] Sobchuk V. et al.: Ensuring the properties of functional stability of manufacturing processes based on the application of neural networks CEUR Workshop Proceedings, 2021, 2845, 106–116.
[13] Sobchuk V. et al.: The limited solutions method for telecommunications network information security models. IEEE 3rd International Conference on Advanced Trends in Information Theory, ATIT 2021. 2021, 126–131.
DOI: https://doi.org/10.1109/ATIT54053.2021.9678655
[14] Tolyupa S. et al.: Formation of a strategy for managing the modes of operation of protection systems based on the game management model. Security of information systems and technologies 3, 2020, 78–86.
[15] Zamrii I. V. et al.: Algorithm of control and prediction of functional stability of complex information and technical systems. Telecommunications and information technologies 1(74), 2022, 4–15.
DOI: https://doi.org/10.31673/2412-4338.2022.010414