<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="EDITORIAL" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Научно-аналитический журнал &quot;Вестник Санкт-Петербургского университета ГПС МЧС России&quot;</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="online">2218-130X</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">65965</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>INFORMATICS, COMPUTER ENGINEERING AND CONTROL</subject>
    </subj-group>
    <subj-group>
     <subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">MODELING CYBERATTACK SCENARIOS IN CYBERPOLYGONS</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>МОДЕЛИРОВАНИЕ СЦЕНАРИЕВ КИБЕРАТАК В КИБЕРПОЛИГОНАХ</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-6113-8981</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Метельков</surname>
       <given-names>Александр Николаевич</given-names>
      </name>
      <name xml:lang="en">
       <surname>Metelkov</surname>
       <given-names>Alexander N.</given-names>
      </name>
     </name-alternatives>
     <email>metelkov5178@mail.ru</email>
     <bio xml:lang="ru">
      <p>кандидат юридических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of jurisprudence sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский университет ГПС МЧС России</institution>
     <city>Санкт-Петербург</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Saint-Petersburg university of State fire service of EMERCOM of Russia</institution>
     <city>Saint-Petersburg</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2023-07-07T13:14:08+03:00">
    <day>07</day>
    <month>07</month>
    <year>2023</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2023-07-07T13:14:08+03:00">
    <day>07</day>
    <month>07</month>
    <year>2023</year>
   </pub-date>
   <volume>2023</volume>
   <issue>2</issue>
   <fpage>161</fpage>
   <lpage>176</lpage>
   <history>
    <date date-type="received" iso-8601-date="2023-06-06T00:00:00+03:00">
     <day>06</day>
     <month>06</month>
     <year>2023</year>
    </date>
    <date date-type="accepted" iso-8601-date="2023-06-20T00:00:00+03:00">
     <day>20</day>
     <month>06</month>
     <year>2023</year>
    </date>
   </history>
   <self-uri xlink:href="https://journals.igps.ru/en/nauka/article/65965/view">https://journals.igps.ru/en/nauka/article/65965/view</self-uri>
   <abstract xml:lang="ru">
    <p>Цель статьи состоит в исследовании возможностей современной технологии и концепции киберполигонов для решения практических задач, направленных &#13;
на повышение устойчивости и безопасности компьютерных систем за счет повышения качества подготовки специалистов. В условиях резкого возрастания числа компьютерных атак на информационную инфраструктуру становится весьма актуальным внедрение современных информационных технологий в подготовку специалистов. В развитых странах мира в обучении современным практикам обеспечения информационной безопасности активно применяются киберполигоны. Технология киберполигонов на основе моделирования киберугроз в безопасной среде в течение почти двух десятилетий &#13;
ее использования в ведущих университетах мира подтвердила свою эффективность для защиты систем и сетей. Методы моделирования эффективно используются для конструирования компьютерной атаки и обучения по разным сценариям. Практика показала особую значимость технологий моделирования кибератак в подготовке персонала современным методам защиты информации. В результате исследования и обобщения зарубежного опыта применения практико-ориентированного подхода с использованием киберполигонов, автор приходит к выводу о целесообразности их внедрения в образовательный процесс ведущих отраслевых и ведомственных высших образовательных учреждений в целях повышения эффективности закрепления знаний, получения навыков в сфере информационной безопасности, формирования компетенций, позволяющих вести дальнейшие масштабные преобразования в области цифровизации государственного управления.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The purpose of the article is to study the possibilities of modern technology and the concept of cyberpolygons for solving practical problems aimed at improving the stability and security of computer systems by improving the quality of training. In the context of a sharp increase in the number of computer attacks on the information infrastructure, it becomes very important &#13;
to introduce modern information technologies into the training of specialists. In the developed countries of the world, cyberpolygons are actively used in teaching modern information security practices. Cyberpolygon technology based on simulation of cyber threats in a secure environment has been proven to be effective for the protection of systems and networks for almost two &#13;
decades of its use in the world's  leading universities.  Practice has shown the particular importance in the training of personnel in modern methods of protection against computer attacks. As a result of research and generalization of foreign experience in applying a practice-oriented approach using cyberpolygons, the author comes to the conclusion that it is expedient to introduce them into the educational process of leading industry and departmental higher educational institutions in order &#13;
to increase the effectiveness of consolidating knowledge, gaining skills in the field of information security, and developing competencies , allowing for further large-scale transformations in the field of digitalization of public administration.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>киберполигон</kwd>
    <kwd>обучение</kwd>
    <kwd>моделирование</kwd>
    <kwd>кибеугрозы</kwd>
    <kwd>компьютерная атака</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>cyberpolygon</kwd>
    <kwd>training</kwd>
    <kwd>modeling</kwd>
    <kwd>cyberthreats</kwd>
    <kwd>computer attack</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ait cyber range: Flexible cyber security environment for exercises, training and research: In Proc. of the 1st European Interdisciplinary Cybersecurity Conference (EICC’20) / M. Leitner [et al.]. Rennes, France, 2020. P. 1-6.</mixed-citation>
     <mixed-citation xml:lang="en">Ait cyber range: Flexible cyber security environment for exercises, training and research: In Proc. of the 1st European Interdisciplinary Cybersecurity Conference (EICC’20) / M. Leitner [et al.]. Rennes, France, 2020. P. 1-6.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Cyber ranges and testbeds for education, training, and research / N. Chouliaras [et al.] // Applied Sciences. 2021. № 11 (4). P. 1809-1831.</mixed-citation>
     <mixed-citation xml:lang="en">Cyber ranges and testbeds for education, training, and research / N. Chouliaras [et al.] // Applied Sciences. 2021. № 11 (4). P. 1809-1831.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Brilingaite A., Bukauskas L., Kutka E. Development of an educational platform for cyber defence training: In Proc. of the 16th European Conference on Cyber Warfare and Security (ECCWS’17). Dublin, Ireland, 2017. P. 73-81. Academic Conferences International Limited.</mixed-citation>
     <mixed-citation xml:lang="en">Brilingaite A., Bukauskas L., Kutka E. Development of an educational platform for cyber defence training: In Proc. of the 16th European Conference on Cyber Warfare and Security (ECCWS’17). Dublin, Ireland, 2017. P. 73-81. Academic Conferences International Limited.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Kypo cyber range: Design and use cases: In Proc. of the 12th International Conference on Software Technologies (ICSOFT’17) / J.Vykopal [et al.]. Madrid, Spain. 2017. P. 310-321. SciTePress.</mixed-citation>
     <mixed-citation xml:lang="en">Kypo cyber range: Design and use cases: In Proc. of the 12th International Conference on Software Technologies (ICSOFT’17) / J.Vykopal [et al.]. Madrid, Spain. 2017. P. 310-321. SciTePress.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Karjalainen M., Kokkonen T. Comprehensive cyber arena; the next generation cyber range: In Proc. of the 4th IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW’20). Genoa, Italy. 2020. P. 11-16. IEEE.</mixed-citation>
     <mixed-citation xml:lang="en">Karjalainen M., Kokkonen T. Comprehensive cyber arena; the next generation cyber range: In Proc. of the 4th IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW’20). Genoa, Italy. 2020. P. 11-16. IEEE.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Yamin M.M., Katt B., Gkioulos V. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Comput. Secur. 2020. № 88. P. 101636.</mixed-citation>
     <mixed-citation xml:lang="en">Yamin M.M., Katt B., Gkioulos V. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Comput. Secur. 2020. № 88. P. 101636.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Jiyeon KIM, Hyung-Jong Kim. Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis // Information Security Applications. WISA 2014. Lecture Notes in Computer Science. Springer, Cham. 2015. Vol. 8909. P. 370-382.</mixed-citation>
     <mixed-citation xml:lang="en">Jiyeon KIM, Hyung-Jong Kim. Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis // Information Security Applications. WISA 2014. Lecture Notes in Computer Science. Springer, Cham. 2015. Vol. 8909. P. 370-382.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Sarjoughian H. Introduction to DEVS modeling &amp;simulation with JAVA: Developing component-based simulation models // Arizona State University. 2005.</mixed-citation>
     <mixed-citation xml:lang="en">Sarjoughian H. Introduction to DEVS modeling &amp;simulation with JAVA: Developing component-based simulation models // Arizona State University. 2005.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ingalls Ricki G. Introduction to simulation: in Proc. of the 40th Conference on Winter Simulation. Winter Simulation Conference. 2008.</mixed-citation>
     <mixed-citation xml:lang="en">Ingalls Ricki G. Introduction to simulation: in Proc. of the 40th Conference on Winter Simulation. Winter Simulation Conference. 2008.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Whitley John N. Attribution of attack trees. Computers&amp;Electrical Engineering. 2011. № 37 (4). P. 624-628.</mixed-citation>
     <mixed-citation xml:lang="en">Whitley John N. Attribution of attack trees. Computers&amp;Electrical Engineering. 2011. № 37 (4). P. 624-628.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Saini Vineet, Qiang Duan, Vamsi Paruchuri. Threat modeling using attack trees // Journal of Computing Sciences in Colleges. 2008. № 23 (4). P. 124-131.</mixed-citation>
     <mixed-citation xml:lang="en">Saini Vineet, Qiang Duan, Vamsi Paruchuri. Threat modeling using attack trees // Journal of Computing Sciences in Colleges. 2008. № 23 (4). P. 124-131.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Have it your way: Generating customized log datasets with a model-driven simulation testbed / M. Landauer [et al]. Transactions on Reliability. 2021. № 70 (1). S. 402-415. IEEE.</mixed-citation>
     <mixed-citation xml:lang="en">Have it your way: Generating customized log datasets with a model-driven simulation testbed / M. Landauer [et al]. Transactions on Reliability. 2021. № 70 (1). S. 402-415. IEEE.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Обучение методам обнаружения компьютерных атак на базе киберполигона кафедры «Информационной безопасности» РТУ (МИРЭА) / А.П. Коваленко [и др.] // Методы и технические средства обеспечения безопасности информации. 2021. № 30. С. 39-44.</mixed-citation>
     <mixed-citation xml:lang="en">Obuchenie metodam obnaruzheniya komp'yuternyh atak na baze kiberpoligona kafedry «Informacionnoj bezopasnosti» RTU (MIREA) / A.P. Kovalenko [i dr.] // Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informacii. 2021. № 30. S. 39-44.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Davies J., Margat S. Review of cyberproving grounds and test benches (№ DSTO-GD-0771) // Cyber Electronic Warfare Division, Defense Science and Technology Organization DSTO, Edinburgh, AU 5111. Australia. 2013.</mixed-citation>
     <mixed-citation xml:lang="en">Davies J., Margat S. Review of cyberproving grounds and test benches (№ DSTO-GD-0771) // Cyber Electronic Warfare Division, Defense Science and Technology Organization DSTO, Edinburgh, AU 5111. Australia. 2013.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Правила предоставления субсидий из федерального бюджета на введение в эксплуатацию и обеспечение функционирования киберполигона для обучения и тренировки специалистов и экспертов разного профиля, руководителей в области информационной безопасности и информационных технологий современным практикам обеспечения безопасности (с изм. и доп. от 27 февр. 2021 г.; утв. постановлением Правительства Рос. Федерации от 12 окт. 2019 г. № 1320). Доступ из справ.-правового портала «Гарант».</mixed-citation>
     <mixed-citation xml:lang="en">Pravila predostavleniya subsidij iz federal'nogo byudzheta na vvedenie v ekspluataciyu i obespechenie funkcionirovaniya kiberpoligona dlya obucheniya i trenirovki specialistov i ekspertov raznogo profilya, rukovoditelej v oblasti informacionnoj bezopasnosti i informacionnyh tekhnologij sovremennym praktikam obespecheniya bezopasnosti (s izm. i dop. ot 27 fevr. 2021 g.; utv. postanovleniem Pravitel'stva Ros. Federacii ot 12 okt. 2019 g. № 1320). Dostup iz sprav.-pravovogo portala «Garant».</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Жуков М.М., Баркалов Ю.М., Телков А.Ю. Методологический подход к имитационному моделированию при исследовании практической эффективности систем защиты от сетевых кибератак // Вестник Воронежского института МВД России. 2022. № 1. С. 24-39.</mixed-citation>
     <mixed-citation xml:lang="en">Zhukov M.M., Barkalov Yu.M., Telkov A.Yu. Metodologicheskij podhod k imitacionnomu modelirovaniyu pri issledovanii prakticheskoj effektivnosti sistem zashchity ot setevyh kiberatak // Vestnik Voronezhskogo instituta MVD Rossii. 2022. № 1. S. 24-39.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Цифровые технологии и проблемы информационной безопасности / под ред. Е.В. Стельмашонок, И.Н. Васильевой. СПб.: Изд-во СПбГЭУ, 2021. 163 с.</mixed-citation>
     <mixed-citation xml:lang="en">Cifrovye tekhnologii i problemy informacionnoj bezopasnosti / pod red. E.V. Stel'mashonok, I.N. Vasil'evoj. SPb.: Izd-vo SPbGEU, 2021. 163 s.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B18">
    <label>18.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ferette L. European Union Agency for Cybersecurity. The 2015 report on national and international cyber security exercises: survey, analysis and recommendations, European Network and Information Security Agency. 2015.</mixed-citation>
     <mixed-citation xml:lang="en">Ferette L. European Union Agency for Cybersecurity. The 2015 report on national and international cyber security exercises: survey, analysis and recommendations, European Network and Information Security Agency. 2015.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B19">
    <label>19.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">A targeted attack for enhancing resiliency of intelligent intrusion detection modules in energy cyber physical systems: In 19th International Conference  on Intelligent System Application to Power Systems (ISAP) / El. Hariri M. [et al.]. 2017. P. 1-6. IEEE.</mixed-citation>
     <mixed-citation xml:lang="en">A targeted attack for enhancing resiliency of intelligent intrusion detection modules in energy cyber physical systems: In 19th International Conference on Intelligent System Application to Power Systems (ISAP) / El. Hariri M. [et al.]. 2017. P. 1-6. IEEE.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B20">
    <label>20.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Васильев В.И., Кириллова А.Д., Вульфин А.М. Когнитивное моделирование вектора кибератак на основе меташаблонов CAPEC // Вопросы кибербезопасности. 2021. № 2 (42).</mixed-citation>
     <mixed-citation xml:lang="en">Vasil'ev V.I., Kirillova A.D., Vul'fin A.M. Kognitivnoe modelirovanie vektora kiberatak na osnove metashablonov CAPEC // Voprosy kiberbezopasnosti. 2021. № 2 (42).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B21">
    <label>21.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Lessons learned from complex hands-on defence exercises in a cyber range: In Proc. of the 47th IEEE Frontiers in Education Conference (FIE’17) / J. Vykopal [et al.]. Indianapolis, Indiana, USA. 2017. P. 1-8. IEEE.</mixed-citation>
     <mixed-citation xml:lang="en">Lessons learned from complex hands-on defence exercises in a cyber range: In Proc. of the 47th IEEE Frontiers in Education Conference (FIE’17) / J. Vykopal [et al.]. Indianapolis, Indiana, USA. 2017. P. 1-8. IEEE.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B22">
    <label>22.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research / Leitner Maria [et al.] // Proceedings of the European Interdisciplinary Cybersecurity Conference. 2020. P. 49.</mixed-citation>
     <mixed-citation xml:lang="en">AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research / Leitner Maria [et al.] // Proceedings of the European Interdisciplinary Cybersecurity Conference. 2020. P. 49.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B23">
    <label>23.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Абрамов Е.С., Андреев А.В., Мордвин Д.В. Применение графов атак для моделирования вредоносных сетевых воздействий // Известия Южного федерального университета. Технические науки. 2012. № 126 (1). С. 165-174.</mixed-citation>
     <mixed-citation xml:lang="en">Abramov E.S., Andreev A.V., Mordvin D.V. Primenenie grafov atak dlya modelirovaniya vredonosnyh setevyh vozdejstvij // Izvestiya Yuzhnogo federal'nogo universiteta. Tekhnicheskie nauki. 2012. № 126 (1). S. 165-174.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B24">
    <label>24.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Курилов Ф.М. Моделирование систем защиты информации. Приложение теории графов // Технические науки: теория и практика: материалы III Междунар. науч. конф. Чита: Изд-во Молодой ученый, 2016. С. 6-9.</mixed-citation>
     <mixed-citation xml:lang="en">Kurilov F.M. Modelirovanie sistem zashchity informacii. Prilozhenie teorii grafov // Tekhnicheskie nauki: teoriya i praktika: materialy III Mezhdunar. nauch. konf. Chita: Izd-vo Molodoj uchenyj, 2016. S. 6-9.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B25">
    <label>25.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Zeigler Bernard P., Herbert Praehofer, Tag Gon Kim. Theory of modeling and simulation. 2nd edition, Academic Press, 2000 // Theory of Modeling and Simulation: Integrating Discrete Event and Continuous Complex Dynamic Systems.</mixed-citation>
     <mixed-citation xml:lang="en">Zeigler Bernard P., Herbert Praehofer, Tag Gon Kim. Theory of modeling and simulation. 2nd edition, Academic Press, 2000 // Theory of Modeling and Simulation: Integrating Discrete Event and Continuous Complex Dynamic Systems.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B26">
    <label>26.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">ГОСТ Р 53114-2008. Защита информации. Обеспечение информационной безопасности в организации. Основные термины и определения. URL: htth:// base.garant.ru (дата обращения: 24.04.2023).</mixed-citation>
     <mixed-citation xml:lang="en">GOST R 53114-2008. Zashchita informacii. Obespechenie informacionnoj bezopasnosti v organizacii. Osnovnye terminy i opredeleniya. URL: htth://base.garant.ru (data obrashcheniya: 24.04.2023).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B27">
    <label>27.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Бутырский Е.Ю., Матвеев А.В. Математическое моделирования систем и процессов. СПб.: Стратегия будущего, 2022. 733 с.</mixed-citation>
     <mixed-citation xml:lang="en">Butyrskij E.Yu., Matveev A.V. Matematicheskoe modelirovaniya sistem i processov. SPb.: Strategiya budushchego, 2022. 733 s.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B28">
    <label>28.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Метельков А.Н. Киберучения: зарубежный опыт защиты критической инфраструктуры // Правовая информатика. 2022. № 1. С. 51-60.</mixed-citation>
     <mixed-citation xml:lang="en">Metel'kov A.N. Kiberucheniya: zarubezhnyj opyt zashchity kriticheskoj infrastruktury // Pravovaya informatika. 2022. № 1. S. 51-60.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B29">
    <label>29.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">The Current State of The Art and Future of European Cyber Range Ecosystem / C. Virág [et al.]. 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece. 2021. P. 390-395.</mixed-citation>
     <mixed-citation xml:lang="en">The Current State of The Art and Future of European Cyber Range Ecosystem / C. Virág [et al.]. 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece. 2021. P. 390-395.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B30">
    <label>30.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">User Behavior Simulation in ICS Cyber Ranges: 19th Annual International Conference on Privacy / C. Liu [et al.]. Security&amp;Trust (PST), Fredericton, NB, Canada. 2022. P. 1-5.</mixed-citation>
     <mixed-citation xml:lang="en">User Behavior Simulation in ICS Cyber Ranges: 19th Annual International Conference on Privacy / C. Liu [et al.]. Security&amp;Trust (PST), Fredericton, NB, Canada. 2022. P. 1-5.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B31">
    <label>31.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Матвеев А.В., Метельков А.Н., Шестаков А.В. Риски кибератак: ликвидация последствий проявлений кибертерроризма и чрезвычайных ситуаций // Вестник Воронежского института ФСИН России. 2023. № 1. С. 98-106. EDN AYXLTO.</mixed-citation>
     <mixed-citation xml:lang="en">Matveev A.V., Metel'kov A.N., Shestakov A.V. Riski kiberatak: likvidaciya posledstvij proyavlenij kiberterrorizma i chrezvychajnyh situacij // Vestnik Voronezhskogo instituta FSIN Rossii. 2023. № 1. S. 98-106. EDN AYXLTO.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B32">
    <label>32.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Методика технико-экономической оценки вариантов построения организационно-технической системы класса «киберполигон» / А.В. Матвеев [и др.] // Инженерный вестник Дона. 2023. № 6. URL: http://www.ivdon.ru/ru/magazine/archive/n6y2023/8474/.</mixed-citation>
     <mixed-citation xml:lang="en">Metodika tekhniko-ekonomicheskoj ocenki variantov postroeniya organizacionno-tekhnicheskoj sistemy klassa «kiberpoligon» / A.V. Matveev [i dr.] // Inzhenernyj vestnik Dona. 2023. № 6. URL: http://www.ivdon.ru/ru/magazine/archive/n6y2023/8474/.</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
