Research of Some Hazard Factors and Intensity of a Set Security Events in the Telecommunication System
By: Bayram Ibrahimov and Islam Islamov
References
- Ahmad, A., Mahmoud, K., Saed, A., Kim, K., Raymond, C., and Maysa, S. (2022) Network traffic classification: Techniques, datasets, and challenges. Digital Communication and Network, 10(3), 676-692. DOI: 10.1016/j.dcan.2022.09.009.
- Breiman, L. (2001) Random forests. Machine Learning, 45, 5-32. DOI: 10.1023/A:1010933404324.
- Casson Moreno, V., Reniers, G., Salzano, E., Cozzani, V. (2018) Analysis of physical and cyber security-related events in the chemical and process industry. Process Safety and Environmental Protection, 116, 621-631. DOI: 10.1016/j.psep.2018.03.026.
- Chandra, K.P. (2019) Nonlinear filtering: Methods and applications. Springer, 197 p. DOI:10.1007/978-3-030-01797-2.
- Dhanabal, L. and Shantharajah, S.P. (2015) A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering, 4(6), 54-64. DOI: 10.17148/IJARCCE.2015.4696.
- Erohin, S.D. (2019) Managing security of critical information infrastructure. Systems of Signal Synchronization, Generating and Processing in Telecommunications, 1-14. DOI:10.1109/SYNCHROINFO.2019.8814097.
- Ibrahimov, B. (2023) Investigation of noise immunity telecommunication systems according to the criterion energy efficiency. Transport and Telecommunication, 24(4), 375-384. DOI:10.2478/ttj-2023-0029.
- Ibrahimov, B., and Valiyev, F. (2024) Research useful and service traffic based on machine learning in multiservice software defined network. Artificial Intelligence and Digital Development, 41-44. DOI:10.59849/aidd.2024.41.
- Ibrahimov, B.G., Humbatov, R.T., and Ibrahimov, R.F. (2018) Cryptographic methods and means protection transmitted information in telecommunication systems. IFAC-Papers OnLine, 51(30), 821-824. DOI:10.1016/J.IFACOL.2018.11.187.
- Ibrаhimov, B.G., Orujov, А.О., Hasanov, A.H., and Tahirova, К.М. (2021) Research and analysis efficiency fiber optical communication lines using quantum technology. T-Comm, 15(10), 50-54. DOI: 10.36724/2072-8735-2021-15-10-50-54.
- Islamov, I. (2023) Optimization of broadband microstrip antenna device for 5G wireless communication systems. Transport and Telecommunication, 24(4), 409-422. DOI:10.2478/ttj-2023-0032.
- Islamov, I., and Safarli, A. (2023) Design, modelling and research of an antenna system for transmitting and receiving information in satellite systems. Transport and Telecommunication, 24 (3), 297-308. DOI: 10.2478/ttj-2023-0024.
- Islamov I.J., Hunbataliyev E.Z., and Zulfugarli, A.E. (2022) Numerical simulation of characteristics of propagation of symmetric waves in microwave circular shielded waveguide with a radially inhomogeneous dielectric filling. International Journal of Microwave and Wireless Technologies, 9, 761-767. DOI: 10.1017/S1759078721001082.
- Kenechi, O., and Sesan, O. (2025) Enhancing cybersecurity measures in critical infrastructure: Challenges and innovations for resilience. Journal of Scientific Research and Reports, 31(2), 474-484. DOI: 10.9734/jsrr/2025/v31i22868.
- Lipatnikov, V.A., Shevchenko, A.A., Kosolapov, V.S., and Sokol, D.S. (2022) Method for ensuring information security of a VoIP telephony network with a forecast of an intruder’s intrusion strategy. Information and Control Systems, 1, 54-67. DOI:10.31799/1684-8853-2022-1-54-67.
- Nguyen, T.T., and Armitage, G. (2008) A survey of techniques for internet traffic classification using machine learning. IEEE Communication Surveys & Tutorials, 10(4), 56-76. DOI:10.1109/SURV.2008.080406.
- Ouissale, E.G., Ikrame, K., and Hayat, E.B. (2024) Evaluating AI and ML in network security: A comprehensive literature review. Procedia Computer Science, 251, 727-733. DOI:10.1016/j.procs.2024.11.176.
- Pallaprolu, S.C., Sankineni, R., Thevar, M., Karabatis, G., and Wang, J. (2017) Zero-day attack identification in streaming data using semantics and spark. In: Proceedings of IEEE International Congress on Big Data, Honolulu, June 2017. IEEE, 121-128. DOI:10.1109/BigDataCongress.2017.25
- Petukhov, A.N., Erokhin, S.D., and Pilyugin, P.L. (2019) Event-oriented security policy and a formal model of the mechanism for protecting critical information infrastructures. Proceedings of Educational Institutions of Communication, 5(4), 99-105. DOI:10.31854/1813-324X-2019-5-4-99-105.
- Xiangyu, X., Tong, Z., Wei, Y., Zhao, W., Shikun, Z., Dongdong, D., and Qing, G. (2018) An ensemble approach for detecting anomalous user behaviors. International Journal of Software Engineering and Knowledge Engineering, 28(11-12), 1637-1656. DOI: 10.1142/S0218194018400211.
- Zhou, Y., Cheng, N., Lu, N., and Shen, X. (2015) Multi-UAV-aided networks: Aerial-ground cooperative vehicular networking architecture. IEEE Vehicular Technology Magazine, 10(4), 36-44. DOI:10.1109/MVT.2015.2481560.
Language: English
Page range: 204 - 213
Published on: Apr 26, 2026
Published by: Transport and Telecommunication Institute
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year
Keywords:
Related subjects:
© 2026 Bayram Ibrahimov, Islam Islamov, published by Transport and Telecommunication Institute
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.