<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Strategies of Social Engineering Attacks on Information Resources of Gamified Online Education Projects</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Vyacheslav</forename><surname>Zolotarev</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Siberian State University of Science and Technology</orgName>
								<address>
									<postCode>660037</postCode>
									<settlement>Krasnoyarsk</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Anastasiya</forename><surname>Arkhipova</surname></persName>
							<email>arhipova@corp.nstu.ru</email>
							<affiliation key="aff1">
								<orgName type="institution">Novosibirsk State Technical University</orgName>
								<address>
									<postCode>630073</postCode>
									<settlement>Novosibirsk</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nikolay</forename><surname>Parotkin</surname></persName>
							<email>nyparotkin@yandex.ru</email>
							<affiliation key="aff0">
								<orgName type="institution">Siberian State University of Science and Technology</orgName>
								<address>
									<postCode>660037</postCode>
									<settlement>Krasnoyarsk</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Anna</forename><surname>Lvova</surname></persName>
							<email>lvova.ap@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution">North-Caucasus Federal University</orgName>
								<address>
									<postCode>355017</postCode>
									<settlement>Stavropol</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Strategies of Social Engineering Attacks on Information Resources of Gamified Online Education Projects</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">E84C932E190799E52BE70728FB976003</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T13:40+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>education, quest, model, activity forecasting, gamification, role model, task model Anna Lvova) ORCID: 0000-0002-8054-8564 (Vyacheslav Zolotarev)</term>
					<term>0000-0003-0791-8087 (Anastasiya Arkhipova)</term>
					<term>0000-0002-3486-0602 (Nikolay Parotkin)</term>
					<term>0000-0002-9863-564X (Anna Lvova)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Safe collaboration in complex projects is a key way of multi-university interaction. With the development of educational strategies aiming at network implementation, safe collaboration tools have to be tested and evaluated with different empirical and analytical techniques. The work investigates the possibility of predicting social-engineering attacks on information resources through understanding the interaction model of participants in networking educational projects. It presents results based on managing roles and tasks within a project, applying an indistinct attack readiness indicator in choosing an attack strategy. Some experiments carried out within the framework of existing networking are shown. The results are promising for educational environments and in the design of protective actions for information resources in networking educational projects.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The networking of universities in collaborative projects is a complex sequence of activities, including the deployment of common information resources used on a cooperative basis by all project participants. A particular challenge in terms of the emerging risks of information interoperability is the implementation of gamification in such projects.</p><p>The several approaches which are requiring a generalisation of the principles of secure information exchange between participants can be identified. For example, projects based on cooperative game tasks execution <ref type="bibr" target="#b0">[1]</ref> or game-based learning <ref type="bibr" target="#b1">[2]</ref> can provide interesting insights into safe collaboration. Phishing attacks <ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref> are the most studied types of social engineering attacks. Moreover, gametheoretic issues of modelling intruder actions, including using stochastic and signalling games as tools <ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref>, allow us to look at the problem from the perspective of attack scenario selection. Particular attention is paid to the issues of remote access and rights differentiation between the participants, while when implementing role-based interaction (e.g., for the web or social network-based projects <ref type="bibr" target="#b9">[10]</ref>), role-based access control models can be used within the resources and information systems of the project. The scheme of access based on roles and tasks inside a gamified networked educational project is shown in Fig. <ref type="figure">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Access based on roles and tasks</head><p>It is correct to consider information interaction risks as well. When predicting the strategy of impact on information resources of a gamified collaborative project, information protection tasks can be simplified and standardized (by choosing the most suitable scenarios for the intruder for counteraction). In the following, we consider an approach that implements intruder actions evaluation for social-engineering attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Purpose and objectives of the research</head><p>Social engineering attacks <ref type="bibr" target="#b10">[11]</ref> have started to spread actively with the use of individual accounts of participants, both staff and learners, in online educational projects. The boundaries of privacy have shifted. A personal account can be attacked during an educational interaction and privileged within the information system of an online educational project.</p><p>Thus, the aim of the project is to identify and investigate strategies of social engineering attacks directed through participants in networked educational projects, especially gamified ones, against the shared information resources of such projects.</p><p>The choice of intruder strategy is shown through the features of role-and task-based access control model in the information system of collaborative educational project. The goals of the intruder at each levels of social-engineering attack are shown. The feature of quantitative assessment of the scenario will be the application of an indistinct attack readiness indicator when selecting a scenario of an attack. Next, the practical relevance is assessed using the example of attacks carried out on educational resources.</p><p>This will show some general steps for identifying such an attack scenario and analysing it from the intruder's perspective.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Main part</head><p>Based on the characteristics of social engineering and APT attacks, including those for gaming tasks <ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref>, it is possible to formulate an intruder's algorithm of action:</p><p>1. Identifying a module or sub-process containing the aspect of players and/or organisers interaction which is the intruder's goal. This may be the transfer of keys to the game tasks or the formation of a solution as part of a shared resource's cooperative use.</p><p>2 Define the tasks to be undertaken by the module or process defined in step 1.</p><p>3. An empirical estimator of parameters and metrics suitable for assessing the vulnerability of participants (participants' social network accounts) in a gamified collaborative project to social engineering attacks.</p><p>3а. Estimation of "simple" metrics such as the number of friends and followers, formation of strong (relatives) and weak (living in the same city, etc.) ties, assessment of the intensity of information exchange.</p><p>3b. (if necessary). Estimation of "complex" metrics, working with the social graph, clarifying possible pathways and secondary (tertiary, etc.) targets of attack.</p><p>4. Estimate the qualitative content of the participant-resource linkages in order to estimate additional motivation.</p><p>5. (if necessary). Complementing the participant model with the means to protect against social engineering attacks that the participant or the social network itself implements.</p><p>6. Implementing the attack. Having decided on a primary attack scenario, the intruder uses the idea of the greatest benefit to refine the scenario. The model below describes how it is possible to predict an intruder's actions when using a particular scenario or a combination of scenarios.</p><p>At the same time, within the framework of the task of implementing a social engineering attack, several basic scenarios can be identified for common information resources of gamified network projects.</p><p>Such scenarios could be:</p><p>1. Exposure to rules and content. Pretexting. Implementation of reverse social engineering.</p><p>2. Attack to the web interface. Introducing elements to facilitate a phishing attack.</p><p>3. Account theft and spoofing. Identify a participant's place in a role-and task-based access control model and use their account to execute an attack.</p><p>4. Attack to the communications, including interception or spoofing for social media, forums or email messages.</p><p>5. Infrastructure integrity attack, i.e. the substitution or distortion of a common resource to implement a social engineering attack.</p><p>Working within the specified algorithm, an intruder chooses one or more scenarios for an attack. The choice of scenario will primarily be based on the access control features of the project, depending on the purpose of the attack (Fig. <ref type="figure" target="#fig_0">2</ref>).</p><p>From the intruder's perspective, (given the constraints of the security policy framework in which the attacked entity operates), the following sequence of indistinct evaluations can be constructed. Let an information system X have a security policy that involves the following components: O is the set of system objects; S is the set of subjects (S →О);</p><p>T is a set of types; X = {r (read), w (write), x (execution)} is the set of access types. U is the set of user competences.</p><p>Then the owner of object O can be defined for any X as T →U, and the access of subjects to certain objects of the system is T×R → {allow, deny}. The intruder considers the attack context and possible targets for the attack, formed as an enumeration of objects with specified owners. An affiliation matrix can be formed like this: Next, forming the coefficients of importance for the implementation of scenarios based on expert estimation of the capabilities of the managerial staff of the organization (the intruder, applying methods of targeting, select a specific target -LMS administrator, the owner of the in-game process, in-game role and the person who assigns it) and adjust from their position set</p><formula xml:id="formula_0">𝐶 𝐴 𝑘 (k = [1, Z]).</formula><p>As a result of expert qualitative estimation of the set of system objects O in the form of a set of indistinct CE evaluations, it is possible to propose a definition of the attack readiness indicator in the form of an indistinct number 𝐿𝑆 ~𝑗:</p><formula xml:id="formula_1">𝐿𝑆 ~ = ∑ 𝐶 𝐴 𝑡 𝑍 t=1 × 𝐶𝐸 ~ .</formula><p>where ∑ ~ indistinct addition performed using one of the methods of implementing indistinct arithmetic operations.</p><p>From this position in the simulation, an attack scenario can be identified that provides information on both the possible depth of attack (see Fig. <ref type="figure" target="#fig_0">2</ref>) and the attack target that the intruder will choose based on the analysis of potential targets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Relevant vulnerabilities</head><p>Within the framework of the considered scenarios of attack implementation in network learning and gamification it is necessary to consider a possible set of office applications, social networks and networking environments of communication and interaction between users. The use of which is convenient and commonplace both within the interaction of the educational project and the everyday activities of the participants. As such, let us consider the following representatives of the mentioned classes:</p><p>1. Discord messaging system (discord. com/); 2. Adobe Acrobat Reader is a reading and editing tool; 3. The social network VKontakte (vk. com); 4. LMS Moodle. The scenario of an intruder gaining access to the system of any participant in the same messenger communication channel can be illustrated by the use of the closed 2020 Discord vulnerability CVE-2020-15174 <ref type="bibr" target="#b14">[15]</ref> for cross-site scripting in iframe. The latter is an attack using social engineering techniques, as with this technology an intruder can get participants of a conversation interested in unusual content (a video, 3d model, interactive module), with content that can be tailored to a specific person or be interesting to all, followed by connection filtering.</p><p>The use of PDF documents containing interactive elements with JavaScript code to distribute tasks, receiving responses from participants via interactive forms, could lead to a similar situation. If we consider the number of vulnerabilities that Adobe addresses in this product and the relatively infrequent updates by the end user, the level of risk will be quite high.</p><p>As an example, here is a list of vulnerabilities resolved at the end of 2020 from CVE-2020-9693 to CVE-2020-9723. These allow access outside of the user's memory area and execution of arbitrary code <ref type="bibr" target="#b14">[15]</ref>.</p><p>LMS Moodle as a basis for educational projects also has a set of vulnerabilities <ref type="bibr" target="#b14">[15]</ref>. Some relevant ones can be highlighted. For example, CVE-2019-3810, CVE-2019-3848 were used for additional information extraction.</p><p>CVE-2019-10154 was used for messaging analysis. CVE-2019-10186 was used to obtain a session key in certain XML handling situations, and CVE-2019-3849 was used for privilege escalation. Within the resource interaction, CVE-2019-3850 (comment handling) and CVE-2019-10133 (link handling) should also be noted.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>The approach shown for estimating an intruder's actions in a social engineering attack on information resources is not only suitable for networked educational projects. In any distributed work with databases or other shared resources, this approach is acceptable.</p><p>In addition, it should be noted that the approach takes into account some peculiarities of the development of network education projects, which have not been considered much before. For example, the issue of mixing personal and corporate accounts is touched upon. The idea of vulnerability of particular representatives of project administration to targeted social-engineering attack is also taken into account. Working with project resources from the intruder's point of view is also possible, taking into account the peculiarities of the access control model.</p><p>Assessing the potential for targeted attacks on the information resources of online education projects will be shown in future research, but given existing publications <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>, this seems to be a promising avenue.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Acknowledgement</head><p>This work was supported by the Russian Foundation for Basic Research project No 19-013-00711 a.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Initial attack scenario selection based on access control features</figDesc><graphic coords="3,72.00,249.08,450.30,198.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="2,72.35,72.00,450.30,252.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Let us denote the set of attacks on information system Х as А = {A1,…, AZ}. Then the set of attack scenarios on the information system is a Cartesian product of the form:&lt;𝐶 𝐴 1 × 𝐶 𝐴 2 × … × 𝐶 𝐴 𝑍 &gt;, where 𝐶 𝐴 𝑍 = {𝐶 𝐴 𝑍1 , … , 𝐶 𝐴 𝑍 𝑙 } is the set of possibilities to implement l attack scenarios 𝐴 𝑍 .</figDesc><table><row><cell>Membership matrix</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>O1</cell><cell>…</cell><cell>ON</cell></row><row><cell>O1</cell><cell>&lt;X, U&gt;</cell><cell>…</cell><cell>&lt;X, U&gt;</cell></row><row><cell>…</cell><cell>…</cell><cell>&lt;Xi, Uj&gt;</cell><cell>…</cell></row><row><cell>ON</cell><cell>&lt;X, U&gt;</cell><cell>…</cell><cell>&lt;X, U&gt;</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Understanding social engineering threats in massively multiplayer online role-playing games: an issue review / GAP Indian</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">R</forename><surname>Grandhi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">C</forename><surname>Galimotu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Forensics and Behavioural Sciences</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="66" to="71" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Game Design Based Learning of Programming</title>
		<author>
			<persName><forename type="first">J</forename><surname>Rugelj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lapina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings SLET-2019 -Proceedings of the International Scientific Conference Innovative Approaches to the Application of Digital Technologies in Education and Research</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="29" to="42" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">A survey of phishing attacks: Their types, vectors and technical approaches / Expert Systems with Applications</title>
		<author>
			<persName><forename type="first">L</forename><surname>Kang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Chek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Choon</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">106</biblScope>
			<biblScope unit="page" from="1" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Phishing Attacks and Defenses</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Chaudhry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Chaudhry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">G</forename><surname>Rittenhouse</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Security and Its Applications</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="247" to="256" />
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A Survey on Phishing Attacks</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">R</forename><surname>Sahu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Dubey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Applications</title>
		<imprint>
			<biblScope unit="volume">88</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="42" to="45" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Adversarial classification using signaling games with an application to phishing detection / Data Min Knowl Disc</title>
		<author>
			<persName><forename type="first">N</forename><surname>Figueroa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>L'huillier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Weber</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="page" from="92" to="133" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rass</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="page" from="1" to="1" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies / ICST Transactions on Scalable Information Systems</title>
		<author>
			<persName><forename type="first">F</forename><surname>Tchakounte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Nyassi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Duplex</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Udagepola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Atemkeng</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1" to="24" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Game based Cybersecurity Training for High School Students</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Manghui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Tae-Hoon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Justin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Jonathan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SIGCSE &apos;18 Proceedings of the 49th ACM Technical Symposium on Computer Science Education</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="68" to="73" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Zolotarev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zhukova</surname></persName>
		</author>
		<title level="m">Role model features in educational serious games / 2019 International conference «quality management, transport and information security, information technologies</title>
				<meeting><address><addrLine>IT&amp;QM&amp;IS</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="583" to="586" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">F</forename><surname>Salahdine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kaabouch</surname></persName>
		</author>
		<title level="m">Social Engineering Attacks: A Survey / Future Internet</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page">11</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Automated Player Activity Analysis for a Serious Game About Social Engineering / Studies in Systems</title>
		<author>
			<persName><forename type="first">B</forename><surname>Krylov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Abramov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Khlobystova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision and Control</title>
		<imprint>
			<biblScope unit="volume">337</biblScope>
			<biblScope unit="page" from="587" to="599" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Analysis and forecasting strategies of attacks on game resources for distributed cybersecurity training games</title>
		<author>
			<persName><forename type="first">K</forename><surname>Safonov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Zolotarev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Derben</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IOP Conf. Ser.: Mater. Sci. Eng</title>
		<imprint>
			<biblScope unit="volume">822</biblScope>
			<biblScope unit="page">12027</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">The models separation of access rights of users to critical documents of information system as factor of reduce impact of successful social engineering attacks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Khlobystova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Abramov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2782</biblScope>
			<biblScope unit="page" from="264" to="268" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<ptr target="https://cve.mitre.org/" />
		<title level="m">CVE® Program</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<ptr target="https://www.cvedetails.com/product/3590/Moodle-Moodle.html?vendor_id=2105" />
		<title level="m">Moodle: CVE security vulnerabilities, version and detailed reports</title>
				<imprint/>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
