{"version.version":"0.0.7","version.cm_url":"https://github.com/ceurws/ceur-spt","spt.html_url":"/Vol-2318/paper15.html","spt.description":null,"spt.id":"Vol-2318/paper15","spt.wikidataid":null,"spt.title":"Security Estimation of the Simulation Polygon for the Protection of Critical Information Resources","spt.pdfUrl":"https://ceur-ws.org/Vol-2318/paper15.pdf","spt.volume":{"number":2318,"acronym":"ITS 2018","wikidataid":"Q113543030","title":"Selected Papers of the XVIII International Scientific and Practical Conference \"Information Technologies and Security\" (ITS 2018)","description":"Proceedings of ITS 2018 workshop","url":"http://ceur-ws.org/Vol-2318/","date":"2019-02-20","dblp":"conf/its2/2018","k10plus":"1663624305","urn":"urn:nbn:de:0074-2318-4"},"spt.session":null,"cvb.id":"Vol-2318/paper15","cvb.title":"Security Estimation of the Simulation Polygon for the Protection of Critical Information Resources","cvb.type":null,"cvb.position":null,"cvb.pagesFrom":null,"cvb.pagesTo":null,"cvb.authors":"Bogdan Korniyenko,Liliya Galata,Lesya Ladieva","cvb.vol_number":"2318","cvb.pdf_name":"paper15.pdf","cvb.pages":"176-187","cvb.fail":null,"dblp.dblp_publication_id":"https://dblp.org/rec/conf/its2/KorniyenkoGL18","dblp.dblp_proceeding_id":"https://dblp.org/rec/conf/its2/2018","dblp.volume_number":2318,"dblp.title":"Security Estimation of the Simulation Polygon for the Protection of Critical Information Resources.","dblp.authors":[{"dblp_author_id":"https://dblp.org/pid/310/0510","label":"Liliya Galata","wikidata_id":null,"orcid_id":null,"gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/310/0888","label":"Bogdan Korniyenko","wikidata_id":null,"orcid_id":null,"gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/316/5413","label":"Lesya Ladieva","wikidata_id":null,"orcid_id":null,"gnd_id":null}],"dblp.pdf_id":"Vol-2318/paper15"}