<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Cybersecurity Providing in Information and Telecommunication Systems, October</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Development of Virtual Laboratories and Innovative Cybersecurity Courses for Distance Learning</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Lemeshko</string-name>
          <email>oleksandr.lemeshko.ua@ieee.org</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandra Yeremenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maryna Yevdokymenko</string-name>
          <email>maryna.yevdokymenko@ieee.org</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ievgeniia Kuzminykh</string-name>
          <email>yevheniia.kuzminykh@nure.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Amal Mersni</string-name>
          <email>amal.mersni@nure.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Resilience</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>IoT Security</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cybersecurity, Virtual laboratory, Education</institution>
          ,
          <addr-line>Distance Learning, Innovative Courses, Cyber</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kharkiv National University of Radio Electronics</institution>
          ,
          <addr-line>Nauky Ave. 14, Kharkiv, 61166</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>26</volume>
      <issue>2021</issue>
      <fpage>98</fpage>
      <lpage>107</lpage>
      <abstract>
        <p>The article is devoted to developing virtual laboratories and innovative cybersecurity courses for distance learning due to the urgent need for effective education in the current conditions that should include and supplement the modern theoretical content of the relevant courses with the necessary practical skills. Currently, the problem of the organization of practical and laboratory works acquires special importance when the demanded level of knowledge requires training laboratories to be equipped with the necessary modern equipment and corresponding network technologies. Recently, the trend of virtualization of both networks and computers has become popular and intensive, which allows the development and implementation of more flexible types of virtualized laboratory solutions for distance learning. Moreover, virtualization tools are extremely useful in teaching and learning in the field of cybersecurity, as they are effectively applied in simulating various types of attacks, without harming the physical equipment or the entire user network. In turn, the basis for preparing innovative courses for the next generation of cybersecurity experts is the availability of specific servers for the rapid deployment of the proposed Сybersecurity Virtual Laboratory (CVLab) and its direct implementation in the educational process of the university. Introducing the CVLab will have a significant impact on improving the quality of education in higher education institutions, as well as promote research and teaching experience for researchers and scholars.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Currently, in conditions of distance learning of students, the problem of the organization of practical
and laboratory works acquires special importance [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1–5</xref>
        ]. This mainly applies to technical universities,
where training in normal conditions is carried out on real equipment and using specialized software. As
a result, there is an urgent need to create virtual labs as an effective platform for distance learning for
students, particularly in the field of cybersecurity. In this case, one of the effective solutions is to create
and deploy a Cybersecurity Virtual Laboratory (CVLab) for distance learning, which will help ensure
continuous quality training of future professionals. Besides, distance learning must not be for
informational purposes only. Therefore, the formation of practical skills of students requires rapid
development and implementation of effective means of distance learning. The technologies of
virtualization of networks and computers allow the development and introduction of flexible virtualized
laboratories.
      </p>
      <p>
        The education of future cybersecurity professionals should include and supplement the modern
theoretical content of the relevant courses with the necessary practical skills [
        <xref ref-type="bibr" rid="ref10 ref11 ref6 ref7 ref8 ref9">6–11</xref>
        ] (Fig. 1). In the field
of cybersecurity education, it is assumed that teachers and practical/laboratory work under their
EMAIL:
(O.
      </p>
      <p>Lemeshko);
oleksandra.yeremenko.ua@ieee.org
(O.</p>
      <p>Yeremenko);</p>
      <p>2022 Copyright for this paper by its authors.
FOUNDATIONAL DIGITAL SKILLS</p>
      <p>FOR ALL GRADUATES
· Analyzing Data
· Managing Data
· Software Development
· Computer</p>
      <p>Programming
· Digital Security and</p>
      <p>
        Privacy
guidance should motivate students to perform and solve practical and problem-oriented tasks on real
equipment. At the same time, students under the guidance of a teacher can perform such tasks
individually or in groups with a limited number of participants in the learning process, thus acquiring
soft skills of communication and cooperation [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. This model is effective and provides the acquisition
of the required practical skills. In addition, the quality of education and the accumulation of the
demanded level of knowledge require that training laboratories be equipped with the necessary modern
equipment, network technologies, as only such conditions and work with real technologies and
cybersecurity will allow students to confirm theoretical knowledge in practice.
      </p>
      <p>CYBERSECURITY GRADUATES` SKILLS
Soft skills:
· Problem-Solving Skills
· Analytical, Inquisitive</p>
      <p>and Insightful Skills
· Technical Aptitude
· Attention to Detail
· Threat Hunting
· Communication
· Collaboration
· A Desire to Learn
· Research and Writing
· Business Acumen
· Agility
· Adaptability
· Leadership
· Project Management</p>
      <p>Hard skills:
· Security Incident</p>
      <p>Handling &amp; Response
· Security Information
and Event</p>
      <p>Management (SIEM)
· Risk, Audit &amp;</p>
      <p>Compliance
· Penetration testing
· Network security
· Identity and access</p>
      <p>management
· Analytics &amp; Intelligence
· Firewall/IDS/IPS Skills
· Application Security</p>
      <p>Development
· Advanced Malware</p>
      <p>Prevention
· Data Management</p>
      <p>Protection
· Digital Forensics
· Mobile Device</p>
      <p>Management</p>
    </sec>
    <sec id="sec-2">
      <title>2. Specifics of Creating the Cybersecurity Virtual Laboratory for Distance</title>
    </sec>
    <sec id="sec-3">
      <title>Learning</title>
      <p>
        In recent years, the trend of virtualization of both networks and computers has become popular and
intensive, which allows us to develop and implement more flexible types of virtualized laboratory
solutions, including for distance learning [
        <xref ref-type="bibr" rid="ref10 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref21 ref22 ref6 ref9">6, 9, 10, 12-22</xref>
        ]. Moreover, virtualization functionality is
widely supported by almost all service and network providers. The number of virtualization tools is
increasing, as well as the latest network equipment created to work in a virtual environment [
        <xref ref-type="bibr" rid="ref12 ref15 ref16 ref19 ref20 ref21 ref6">6, 12, 15,
16, 19-21</xref>
        ]. Thus, virtualization allows us to overcome the limitations of traditional networks and
hardware network laboratories, given their high cost, power consumption, stability, and the limited
number of devices, remote access, etc. All this indicates the significant potential of virtualized remote
access laboratories.
      </p>
      <p>In general, a Cybersecurity Virtual Laboratory will use appropriate computer equipment (powerful
servers or cluster servers) for distance learning. Thus, such laboratories allow you to run the required
number of devices per student and even simulate complex networking scenarios needed to perform
practical and laboratory work on cybersecurity (network security, penetration testing, digital forensics,
etc.). Therefore, virtualization technologies are currently seen as the only way to deploy future
cybersecurity laboratories for distance learning and their long-term resilience in quarantine and
isolation.</p>
      <p>
        Virtualization allows you to create and use virtual environments for a physical machine (computer),
network, or operating system. In addition, virtual environments allow you to use different operating
systems or even networks on a single physical machine (Fig. 2) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Virtualization tools are also
particularly useful in teaching and learning in the field of cybersecurity, as they are effectively used to
simulate various types of attacks, without harming the physical machine (equipment) or the entire user
network [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. It should be noted that even well-known and widespread attacks require multiple hosts
and resources for their modeling and investigation.
      </p>
      <sec id="sec-3-1">
        <title>Centralized management</title>
        <sec id="sec-3-1-1">
          <title>Control plane</title>
        </sec>
        <sec id="sec-3-1-2">
          <title>Laboratory plane</title>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Virtual machines network</title>
      </sec>
      <sec id="sec-3-3">
        <title>Virtual host machine</title>
      </sec>
      <sec id="sec-3-4">
        <title>Host machine</title>
        <p>
          Characteristics of some existing virtual cybersecurity laboratories are presented in Table 1 [
          <xref ref-type="bibr" rid="ref10 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref9">9, 10,
12-19</xref>
          ].
        </p>
        <p>
          Therefore, virtualization can be configured on both the desktop and the cloud infrastructure. The
virtual desktop environment allows you to use virtual machines with different operating systems that
share the resources of the host computer [
          <xref ref-type="bibr" rid="ref17 ref6">6, 17</xref>
          ]. This allows students to run programs that require
different platforms. The main problem with virtualization on a desktop computer is the large size of the
virtual machine. In addition, students must have high-performance computers to run multiple virtual
machines. It should also be noted that virtual machines might require special configuration, such as
installing and configuring specialized cybersecurity software and libraries, which requires additional
skills from students who need to perform the configuration themselves. In this case, an alternative
solution may be establishing a cloud environment for virtualization, which students can also access
remotely outside the university.
        </p>
        <p>The basis for preparing courses for the next generation of cybersecurity experts is the availability of
specific servers for the rapid deployment of a Сybersecurity Virtual Laboratory and its direct
implementation in the educational process of the university.</p>
        <p>
          Distributed laboratory
architecture for game-based
learning in cybersecurity and
critical infrastructures [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]
        </p>
        <p>Description
A virtual platform based on multiple virtual machines, designed to
provide students with remote access to experiment with malware
and ethical hacking in a secure environment.</p>
        <p>A distributed virtual computer lab for cybersecurity and network
technology training. The laboratory was implemented for use both
in distance learning and on campus. This has been made possible
by the extension of the basic Virtual Security Lab (VCL) through
distribution, central management, assisted learning, and security.</p>
        <p>CLaaS uses cloud computing and virtualization technologies to
conduct virtual cybersecurity experiments and gain practical
experience on the vulnerabilities used to launch cyber-attacks,
how to fix them, and how to strengthen the protection of cyber
resources and services.</p>
        <p>SEED Labs provide a built-in virtual machine image that is
preconfigured for 30 cybersecurity labs that cover a wide range of
computer and information security topics, including software
security, network security, web security, operating system
security, and mobile application security.</p>
        <p>An inter-institutional laboratory that offers innovative, practical,
collaborative learning experiences aimed at preventing and
reducing real-time cyberattacks. Using a well-established and
relatively common malicious code (exploits) in a virtual laboratory,
students will experience multidimensional simultaneous attacks
and learn to solve, correct, and resist such actions in a special
shared environment.</p>
        <p>An integrated learning environment for both information security
and computer science using open-source Xen virtualization
technology.</p>
        <p>Distributed remote laboratory for cybersecurity training and
infrastructure protection systems using virtualization
technologies, cloud computing, and Game-Based Learning (GBL).</p>
        <p>
          Tele-Lab IT-Security [
          <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
          ]
        </p>
        <p>Cloud platform for practical cybersecurity education.</p>
        <p>According to the main goal of CVLab, namely the organization of an effective distance learning
process, it is necessary to implement a number of activities, namely:
1. Organizing the purchase of server equipment according to the technical recommendations and
computing resources demands.
2. Deploying and launching CVLab for distance learning.
3. Testing CVLab by performing practical and laboratory work to verify its proper operation, as
well as eliminating possible errors.
4. Providing open access CVLab for all target groups in Ukraine, namely students and teachers.
5. Organizing online webinars on the possibilities of using CVLab for students and teachers.
6. Dissemination of information about CVLab and its capabilities through social networks and
internet resources in order to interest students at various universities in Ukraine, where they are
trained in cybersecurity.
7. Effective quality control (internal quality control, monitoring, and evaluation).</p>
        <p>Moreover, the rapid provision of a virtual distance learning CVLab platform will help to ensure the
full-fledged learning of students during the quarantine. Such a virtual platform will contain all the
necessary tools, software, as well as recommendations for laboratory and practical work of basic
training courses, such as Network &amp; Cloud Security, Secure Software Development, Malware Analysis,
Web Security, Penetration Testing, and Ethical Hacking, Digital Forensic, etc.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. Impact of Implementing the Cybersecurity Virtual Laboratory</title>
      <p>Introducing the CVLab and developing the innovative courses on cybersecurity, as well as
integrating into the educational process of Ukrainian higher education institutions (HEIs) has a
significant impact in the following:
· raising awareness about cybersecurity policies and facilitating future cooperation between
companies and security regulatory bodies;
· fostering of understanding the cybersecurity policies through a series of training courses;
· improving the quality of education in the HEIs.</p>
      <p>In addition, the introduction of CVLab will promote research and the first teaching experience for
young researchers and scholars. The CVLab development team members are young scientists and
teachers with broad experience in teaching specialized disciplines in the field of cybersecurity. The
involvement of young researchers will entail successful implementation of the CVLab objectives, which
will be achieved both through self-training and independent research in the field of cybersecurity, and
jointly as a team, by attracting external experts in this field, internships in industry, and exchanging
experience on the international conferences.</p>
      <p>Extremely important that CVLab deployment will foster the publication and dissemination of the
results of academic research. Nowadays, cybersecurity research and development are important all over
the world. Cyber-attacks are on the increase and a connected economy and society that is more
vulnerable to cyber threats and attacks requires stronger defenses. The main goal and principles of
Cybersecurity Strategy are to foster a reliable, safe, and open cyber ecosystem that should remain valid.
However, the continuously evolving and deepening threat landscape demand more action to withstand
and deter attacks in the future.</p>
      <p>In accordance with the Cyber Security Strategy of Ukraine, the main objective is also to create
conditions for the safe functioning of cyberspace, application of cyberspace to benefit individuals,
society, and the State. However, the research of Ukrainian scientists focused on specific threats and
attacks in narrow areas, and the research itself is technical in nature. Nevertheless, cybersecurity is not
limited to network, information security, and technical protection. Therefore, the urgent task of
conducting comprehensive research in Ukraine arises, aimed at developing and implementing the most
effective regulatory protection mechanisms.</p>
      <p>Therefore, carrying out research on cybersecurity topics will allow to deepen knowledge, broaden
the outlook, and highlight the best practices for their further dissemination at the territory of Ukraine.
Publication of articles in scientific and technical journals as well as in local and regional press and
participation in international conferences will disseminate the knowledge and experience and
exchanging cybersecurity information.</p>
      <p>The development of new and modernization of existing courses will be based on analyzing
challenges in the cybersecurity area in Ukraine and worldwide with getting feedback from industry,
public, and government stakeholders on skills and knowledge demands in Ukraine. To ensure the
sustainability of the CVLab results, all the courses will be implemented in the educational curriculum
at Ukrainian universities, and delivered material, including publications could be accessed free on the
website of the project.</p>
      <p>According to the key objectives for cybersecurity and information and communications technology,
cybersecurity certification the network and information systems, as well as electronic communication
networks and services play a vital role in society and have become the backbone of economic growth.</p>
      <p>Information and communications technology (ICT), IoT, and Smart Infrastructures underpin the
complex systems which support everyday social activities, connect people and devices, keep our
economies running in key sectors such as health, energy, finance, transport, and, in particular, support
the functioning of the internal market. In this context, the security and certification of the products,
services, and processes become significant relevant areas both in Ukraine and all over the world.</p>
      <p>To make the Ukrainian market more familiar with the current standards and policies in cybersecurity,
the CVLab team will modernize existing courses expanding the content with cybersecurity policies and
best practices in the specific areas as IoT, namely cyber resilience and ICT services that are relevant for
graduates in their professional life. These courses will enhance students` professional skills and their
competitiveness in the labor market.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Innovative Courses Example and Description</title>
      <p>
        As part of the implementation of CVLab, it is planned to develop the following innovative
specialized courses, which are relevant today and include the scientific results of young scientists
involved in the deployment of the laboratory [
        <xref ref-type="bibr" rid="ref23 ref24 ref25 ref26 ref27">23-31</xref>
        ].
      </p>
      <p>Among them, the course titled “Best practices in the cyber resilience strategy” can be distinguished,
the brief description of which is presented below.</p>
      <p>The purpose of the course is to provide knowledge in current frameworks, modern methods of
protecting networks and cloud systems. The students will obtain knowledge about cyber resilience
means, practical skills in deep packet inspection systems, secure routing, fault-tolerant network and
systems, firewalls, access control methods of protection, software-defined networks, and cloud security
principles.</p>
      <p>Course syllabus:
1. Towards a Global Cyber Resilience Framework</p>
      <p>Goal: to study the current understanding of cyber resilience based on getting an overview of what
sort of resilience measures are currently in place, as well as highlight any glaring gaps in efforts.
2. The cyber resilience strategy</p>
      <p>Goal: to study best practices aimed at providing three core pillars of the Eurosystem’s cyber
resilience strategy.</p>
      <p>3. Analysis of Cyber Defense Policy Framework</p>
      <p>Goal: to study about Cyber Defense Policy Framework for the consistent implementation promotion
of the relevant framework, which is essential to increasing cyber resilience.</p>
      <p>4. The main concepts of secure routing in reliable networks.</p>
      <p>Goal: to know characteristics of existing network security methods in infocommunications; analysis
of secure routing methods in the communication networks; improving secure routing methods.
5. Network security metrics evaluation.</p>
      <p>Goal: to know the probability of compromising the network elements (links, nodes, routes, network
segments); existing and novel methods of evaluating the probability of compromise.</p>
      <p>6. Fault-tolerant routing as the approach for ensuring cyber resilience in the modern network
architectures and clouds.</p>
      <p>Goal: to know default gateway protection within fault-tolerant routing; inter-area fast rerouting in
the case of hierarchical routing; fast rerouting with load balancing in software-defined networks;
faulttolerant cloud infrastructures.</p>
      <p>The course teaches strategic documentation and cybersecurity approaches of the EU frameworks for
ensuring the cyber resilience of ICT. The course also combines EU frameworks and technical
knowledge about the fundamentals of SDN, cloud, virtualization technologies, IPS/IDS, advanced VPN
protection, secure routing, design a fault-tolerant network to protect network elements.</p>
      <p>Also, currently considerable interest in a course called “Best practices for IoT and Smart
Infrastructures”, which description is as follows.</p>
      <p>The purpose of the course is to define security measures for IoT in the entailed complexity that is
brought by the diversity of application areas for IoT. This course helps to understand what needs to be
secured and what security measures to implement in order to protect the Internet of Things from cyber
threats. During the course, the differences in apportioning risk to distinct environments in each IoT
domain will be considered as well as threats and risks related to the IoT devices.</p>
      <p>Course syllabus:
1. IoT Security Standards Gap Analysis</p>
      <p>Goal: to study and analyze the gaps in IoT security and provide guidelines for the development or
repositioning of standards.</p>
      <p>2. Baseline Security Recommendations for IoT</p>
      <p>Goal: to study best practices to help secure IoT products and systems including physical security,
device secure boot, secure operating system, application security, encryption, network connection, and
so on (IoT Security Foundation).</p>
      <p>3. Security and Resilience of Smart Home Environments</p>
      <p>Goal: to study securing Smart Home Environments from cyber threats by highlighting good
practices that apply to every step of a product lifecycle: its development, its integration in Smart Home
Environments, and its usage and maintenance until end-of-life. The study also highlights the
applicability of security measures to different types of devices. The good practices apply to
manufacturers, vendors, solution providers for hardware and software, and developers.
4. Good Practices for Security of Internet of Things in the context of Smart Manufacturing
Goal: to study and analyze the security and privacy challenges related to the evolution of industrial
systems and services precipitated by the introduction of IoT innovations. Introduce the good practices
to ensure the security of IoT in the context of Industry 4.0/Smart Manufacturing, while mapping the
relevant security and privacy challenges, threats, risks, and attack scenarios.</p>
      <p>5. Security of IoT cloud services</p>
      <p>Goal: to provide a high-level overview on the security issues to IoT developers and IoT integrators
that make use of IoT Cloud Computing and Cloud Service Providers (CSPs) of IoT Cloud offerings.
6. Cybersecurity Challenges and Recommendations for industrial IoT</p>
      <p>Goal: to study the main challenges to the adoption of the security measures and security of Industry
4.0 and Industrial IoT. To get acquired with recommendations to different stakeholder groups in order
to promote Industry 4.0 cybersecurity and facilitate wider take-up of relevant innovations in a secure
manner.</p>
      <p>7. Vulnerability Disclosure in the Internet of Things Product (IoT security foundation)
Goal: study how to report newly discovered security vulnerabilities to the product or
serviceproviding organization and make the public announcement of security vulnerabilities by that
organization.</p>
      <p>8. IoT Security Compliance Framework (IoT security foundation)</p>
      <p>Goal: to study how Framework sets out a comprehensive set of security requirements for aspects of
the organization and product. To learn how to do a risk assessment of the IoT products, how to create a
Compliance Checklist, understand how to provide a list of countermeasures to reduce any security risk.</p>
      <p>The course will increase the awareness of participants about what measures according to EU
cybersecurity policies should be implemented to protect IoT and Smart Infrastructure from cyber
threats. Given the pervasiveness and massive deployment of the IoT concept, cyber threats against it
have real consequences on the safety of citizens and industrial objects.</p>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusion</title>
      <p>It should be mentioned that the introduction of a cybersecurity virtual laboratory (CVLab) aimed at
improving the effectiveness of distance education meets the objectives of the Cyber Security Strategy
of Ukraine, as well as priorities and areas of its provision, ranging from general digital literacy to
training of security sector actors [32]. At the same time, among the advantages of CVLab
implementation are the following.</p>
      <p>Ease of use and implementation in the educational process. After installing CVLab, students can
perform practical and laboratory works both on the server and on their personal device, after
downloading the image of the virtual laboratory at a convenient time. Teachers can create instructions
and guides for laboratory work, whereas students can access and create feedback.</p>
      <p>Versatility and efficiency. Due to the fact that CVLab will include training courses that are part of
the basic curriculum in the field of cybersecurity, this virtual platform will be able to cover most
universities in which students study in this specialty.</p>
      <p>Availability. CVLab courses will be publicly available. Students and teachers can use this virtual
laboratory for distance learning in the field of cybersecurity.</p>
      <p>Sustainability. Using CVLab is an effective tool for distance learning not only during the global
pandemic, but will be useful in the educational process during any period of student learning.</p>
      <p>Technical support. Periodic updating of the platform and support as needed are provided.</p>
    </sec>
    <sec id="sec-7">
      <title>6. References</title>
      <p>and Systems. MCT 2019, volume 152of Lecture Notes in Networks and Systems, Springer, Cham,
2021, pp. 191-205. doi: https://doi.org/10.1007/978-3-030-58359-0_10.
[28] O. Lemeshko, M. Yevdokymenko, M. Yeremenko, I. Kuzminykh, Cyber Resilience and Fault
Tolerance of Artificial Intelligence Systems: EU Standards, Guidelines, and Reports, in:
Proceedings of the Selected Papers on Cybersecurity Providing in Information and
Telecommunication Systems (CPITS 2020), CEUR, 2020, pp. 99-108.
http://ceur-ws.org/Vol2746/paper9.pdf.
[29] I. Kuzminykh, A. Carlsson, Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT
Architecture. In: Galinina O., Andreev S., Balandin S., Koucheryavy Y. (eds) Internet of Things,
Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018,
volume 11118 of Lecture Notes in Computer Science, Springer, Cham, 2018, pp. 52-63.
doi: https://doi.org/10.1007/978-3-030-01168-0_6.
[30] M. TajDini, V. Sokolov, I. Kuzminykh, S. Shiaeles, B. Ghita, Wireless Sensors for Brain</p>
      <p>Activity—A Survey, Electronics 9 (2020) 2092. https://doi.org/10.3390/electronics9122092.
[31] I. Kuzminvkh, Development of traffic light control algorithm in smart municipal network, in:
Proceedings of the 2016 13th International Conference on Modern Problems of Radio Engineering,
Telecommunications and Computer Science (TCSET), IEEE, 2016, pp. 896-898.
doi: https://doi.org/10.1109/TCSET.2016.7452218.
[32] Cybersecurity Strategy of Ukraine, Decree of the President of Ukraine from 15.03.2016. 96/2016.
https://zakon.rada.gov.ua/laws/show/96/2016#n11.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K.E.</given-names>
            <surname>Ehimwenma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Crowther</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Beer</surname>
          </string-name>
          ,
          <article-title>Formalizing Logic Based Rules for Skills Classification and Recommendation of Learning Materials</article-title>
          ,
          <source>International Journal of Information Technology and Computer Science (IJITCS) 10(9)</source>
          (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          . doi: https://doi.org/10.5815/ijitcs.
          <year>2018</year>
          .
          <volume>09</volume>
          .01.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.E.</given-names>
            <surname>Adekunle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.S.</given-names>
            <surname>Adewale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.K.</given-names>
            <surname>Boyinbode</surname>
          </string-name>
          ,
          <article-title>Appraisal on Perceived Multimedia Technologies as Modern Pedagogical Tools for Strategic Improvement on Teaching and Learning</article-title>
          ,
          <source>International Journal of Modern Education and Computer Science (IJMECS) 11(8)</source>
          (
          <year>2019</year>
          )
          <fpage>15</fpage>
          -
          <lpage>26</lpage>
          . doi: https://doi.org/10.5815/ijmecs.
          <year>2019</year>
          .
          <volume>08</volume>
          .02.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Azouzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.E.</given-names>
            <surname>Hajlaoui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Brahmi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ayachi</surname>
          </string-name>
          <string-name>
            <surname>Ghannouchi</surname>
          </string-name>
          ,
          <article-title>Collaborative E-Learning Process Discovery in Multi-tenant Cloud</article-title>
          ,
          <source>International Journal of Intelligent Systems and Applications (IJISA) 13(2)</source>
          (
          <year>2021</year>
          )
          <fpage>21</fpage>
          -
          <lpage>37</lpage>
          . doi: https://doi.org/10.5815/ijisa.
          <year>2021</year>
          .
          <volume>02</volume>
          .02.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Al-Hagery</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Alzaid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.S.</given-names>
            <surname>Alharbi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Alhanaya</surname>
          </string-name>
          ,
          <article-title>Data Mining Methods for Detecting the Most Significant Factors Affecting Students</article-title>
          ' Performance,
          <source>International Journal of Information Technology and Computer Science (IJITCS) 12(5)</source>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          . doi: https://doi.org/10.5815/ijitcs.
          <year>2020</year>
          .
          <volume>05</volume>
          .01.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.W.</given-names>
            <surname>Adejo</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Ewuzie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Usoro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Connolly</surname>
          </string-name>
          ,
          <article-title>E-Learning to m-Learning: Framework for Data Protection and Security in Cloud Infrastructure</article-title>
          ,
          <source>International Journal of Information Technology and Computer Science (IJITCS) 10(4)</source>
          (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . doi: https://doi.org/10.5815/ijitcs.
          <year>2018</year>
          .
          <volume>04</volume>
          .01.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Segeč</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Moravčík</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kontšek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Papán</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Uramová</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yeremenko</surname>
          </string-name>
          ,
          <article-title>Network virtualization tools - analysis and application in higher education</article-title>
          ,
          <source>in: Proceedings of the 2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>699</fpage>
          -
          <lpage>708</lpage>
          . doi: https://doi.org/10.1109/ICETA48886.
          <year>2019</year>
          .
          <volume>9040148</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <article-title>Implementation of Active Learning in the Master's Program on Cybersecurity</article-title>
          , in: Hu Z.,
          <string-name>
            <surname>Petoukhov</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dychka</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>He</surname>
            <given-names>M</given-names>
          </string-name>
          .
          <article-title>(eds) Advances in Computer Science for Engineering and Education II</article-title>
          .
          <source>ICCSEEA</source>
          <year>2019</year>
          , volume
          <volume>938</volume>
          <source>of Advances in Intelligent Systems and Computing</source>
          , Springer, Cham,
          <year>2020</year>
          , pp.
          <fpage>610</fpage>
          -
          <lpage>624</lpage>
          . doi: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          - 16621-2_
          <fpage>57</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Z. B.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          , Implementation of Social Engineering Attack at Institution of Higher Education,
          <source>in: Proceedings of the 1th International Workshop on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CybHyg)</source>
          , Oct.,
          <year>2019</year>
          , vol.
          <volume>2654</volume>
          , pp.
          <fpage>155</fpage>
          -
          <lpage>164</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Carlsson</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Kuzminykh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gustavsson</surname>
          </string-name>
          ,
          <article-title>Virtual Security Labs Supporting Distance Education in ReSeLa Framework</article-title>
          , in: Auer M.,
          <string-name>
            <surname>Tsiatsos</surname>
            <given-names>T</given-names>
          </string-name>
          . (
          <article-title>eds) The Challenges of the Digital Transformation in Education</article-title>
          .
          <source>ICL</source>
          <year>2018</year>
          , volume
          <volume>917</volume>
          <source>of Advances in Intelligent Systems and Computing</source>
          , Springer, Cham,
          <year>2019</year>
          , pp.
          <fpage>577</fpage>
          -
          <lpage>587</lpage>
          . doi: https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -11935-5_
          <fpage>55</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Carlsson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gustavsson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Truksans</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Balodis</surname>
          </string-name>
          ,
          <article-title>Remote Security Labs in the Cloud ReSeLa</article-title>
          ,
          <source>in: Proceedings of the 2015 IEEE Global Engineering Education Conference (EDUCON)</source>
          , IEEE,
          <year>2015</year>
          , pp.
          <fpage>199</fpage>
          -
          <lpage>206</lpage>
          . doi: https://doi.org/10.1109/EDUCON.
          <year>2015</year>
          .
          <volume>7095971</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.</given-names>
            <surname>Mouheb</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Abbas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Merabti</surname>
          </string-name>
          , Cybersecurity Curriculum Design: A Survey, in: Pan Z.,
          <string-name>
            <surname>Cheok</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Müller</surname>
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>El</surname>
            <given-names>Rhalibi A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kifayat</surname>
            <given-names>K</given-names>
          </string-name>
          . (eds) Transactions on
          <string-name>
            <surname>Edutainment</surname>
            <given-names>XV</given-names>
          </string-name>
          , volume
          <volume>11345</volume>
          of Lecture Notes in Computer Science, Springer, Berlin, Heidelberg,
          <year>2019</year>
          , pp.
          <fpage>93</fpage>
          -
          <lpage>107</lpage>
          . doi: https://doi.org/10.1007/978-3-
          <fpage>662</fpage>
          -59351-
          <issue>6</issue>
          _
          <fpage>9</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Haag</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Vranken</surname>
          </string-name>
          , M. van
          <string-name>
            <surname>Eekelen</surname>
          </string-name>
          ,
          <article-title>A Virtual Classroom for Cybersecurity Education</article-title>
          , in: Pan Z.,
          <string-name>
            <surname>Cheok</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Müller</surname>
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>El</surname>
            <given-names>Rhalibi A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kifayat</surname>
            <given-names>K</given-names>
          </string-name>
          . (eds) Transactions on
          <string-name>
            <surname>Edutainment</surname>
            <given-names>XV</given-names>
          </string-name>
          , vol
          <volume>11345</volume>
          of Lecture Notes in Computer Science, Springer, Berlin, Heidelberg,
          <year>2019</year>
          , pp.
          <fpage>173</fpage>
          -
          <lpage>208</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>662</fpage>
          -59351-6_
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>C.</given-names>
            <surname>Tunc</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hariri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>De La Peña Montero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Fargo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Satam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Al-Nashif</surname>
          </string-name>
          ,
          <article-title>Teaching and Training Cybersecurity as a Cloud Service</article-title>
          ,
          <source>in: Proceedings of the 2015 International Conference on Cloud and Autonomic Computing</source>
          , IEEE,
          <year>2015</year>
          , pp.
          <fpage>302</fpage>
          -
          <lpage>308</lpage>
          . doi: https://doi.org/ 10.1109/ICCAC.
          <year>2015</year>
          .
          <volume>47</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>SEED</given-names>
            <surname>Labs</surname>
          </string-name>
          ,
          <year>2002</year>
          . https://seedsecuritylabs.org/
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.</given-names>
            <surname>Murphy</surname>
          </string-name>
          , E. Sihler,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ebben</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Lovewell</surname>
          </string-name>
          , G. Wilson,
          <article-title>Building a Virtual Cybersecurity Collaborative Learning Laboratory (VCCLL)</article-title>
          ,
          <source>in: Proceedings of the International Conference on Security and Management (SAM)</source>
          (p.
          <fpage>1</fpage>
          <lpage>)</lpage>
          .
          <source>The Steering Committee of The World Congress in Computer Science</source>
          , Computer Engineering and Applied Computing (WorldComp),
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.J.</given-names>
            <surname>Powell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.T.</given-names>
            <surname>Davis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.S.</given-names>
            <surname>Johnson</surname>
          </string-name>
          , P.Y.
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          <string-name>
            <surname>Turchek</surname>
            ,
            <given-names>I.W.</given-names>
          </string-name>
          <string-name>
            <surname>Parker</surname>
          </string-name>
          ,
          <article-title>VLabNet: the integrated design of hands-on learning in information security and networking</article-title>
          ,
          <source>in: Proceedings of the 4th annual conference on Information security curriculum development</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>C.</given-names>
            <surname>Willems</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Meinel</surname>
          </string-name>
          ,
          <article-title>Tele-lab IT-security: An architecture for an online virtual IT security lab</article-title>
          ,
          <source>International Journal of Online and Biomedical Engineering (iJOE) 4</source>
          (
          <issue>2</issue>
          ) (
          <year>2008</year>
          )
          <fpage>31</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>C.</given-names>
            <surname>Willems</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Klingbeil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Radvilavicius</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cenys</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Meinel</surname>
          </string-name>
          ,
          <article-title>A distributed virtual laboratory architecture for cybersecurity training</article-title>
          ,
          <source>in: Proceedings of the 2011 International Conference for Internet Technology and Secured Transactions</source>
          , IEEE,
          <year>2011</year>
          , pp.
          <fpage>408</fpage>
          -
          <lpage>415</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>J.</given-names>
            <surname>Cano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Hernández</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ros</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tobarra</surname>
          </string-name>
          ,
          <article-title>A distributed laboratory architecture for game based learning in cybersecurity and critical infrastructures</article-title>
          ,
          <source>in: Proceedings of the 2016 13th International Conference on Remote Engineering and Virtual Instrumentation (REV)</source>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>183</fpage>
          -
          <lpage>185</lpage>
          . doi: https://doi.org/10.1109/REV.
          <year>2016</year>
          .
          <volume>7444461</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>K.</given-names>
            <surname>Nance</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Hay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Dodge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Seazzu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Burd</surname>
          </string-name>
          ,
          <article-title>Virtual laboratory environments: Methodologies for educating cybersecurity researchers</article-title>
          ,
          <source>Methodological Innovations Online</source>
          <volume>4</volume>
          (
          <issue>3</issue>
          ) (
          <year>2009</year>
          )
          <fpage>3</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Moritz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Willems</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Goderbauer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Moeller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Meinel</surname>
          </string-name>
          ,
          <article-title>Enhancing a virtual security lab with a private cloud framework</article-title>
          ,
          <source>in: Proceedings of the 2013 IEEE International Conference on Teaching</source>
          ,
          <article-title>Assessment and Learning for Engineering (TALE)</article-title>
          , IEEE,
          <year>2013</year>
          , pp.
          <fpage>314</fpage>
          -
          <lpage>320</lpage>
          . doi: https://doi.org/10.1109/TALE.
          <year>2013</year>
          .
          <volume>6654452</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>K.</given-names>
            <surname>Salah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hammoud</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zeadally</surname>
          </string-name>
          ,
          <article-title>Teaching cybersecurity using the cloud</article-title>
          ,
          <source>IEEE Transactions on Learning Technologies</source>
          <volume>8</volume>
          (
          <issue>4</issue>
          ) (
          <year>2015</year>
          )
          <fpage>383</fpage>
          -
          <lpage>392</lpage>
          . doi: https://doi.org/10.1109/TLT.
          <year>2015</year>
          .
          <volume>2424692</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>O.</given-names>
            <surname>Lemeshko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yeremenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shapovalova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Hailan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yevdokymenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Persikov</surname>
          </string-name>
          ,
          <article-title>Design and Research of the Model for Secure Traffic Engineering Fast ReRoute under Traffic Policing Approach</article-title>
          , in
          <source>: Proceedings of the 2021 IEEE 16th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>23</fpage>
          -
          <lpage>26</lpage>
          . doi: https://doi.org/10.1109/CADSM52681.
          <year>2021</year>
          .
          <volume>9385253</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>O.</given-names>
            <surname>Lemeshko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yeremenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yevdokymenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shapovalova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Radivilova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ageyev</surname>
          </string-name>
          ,
          <article-title>Secure Based Traffic Engineering Model in Softwarized Networks</article-title>
          ,
          <source>in: Proceedings of the IEEE International Conference on Advanced Trends in Information Theory ATIT</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi: https://doi.org/10.1109/ATIT50783.
          <year>2020</year>
          .
          <volume>9349301</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>O.</given-names>
            <surname>Lemeshko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yeremenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yevdokymenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shapovalova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.M.</given-names>
            <surname>Hailan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mersni</surname>
          </string-name>
          ,
          <article-title>Cyber Resilience Approach Based on Traffic Engineering Fast ReRoute with Policing</article-title>
          ,
          <source>in: Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>117</fpage>
          -
          <lpage>122</lpage>
          . doi: https://doi.org/10.1109/IDAACS.
          <year>2019</year>
          .
          <volume>8924294</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>O.</given-names>
            <surname>Lemeshko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yeremenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shapovalova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yevdokymenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Akulynichev</surname>
          </string-name>
          , V. Porokhniak,
          <article-title>Research of Secure Routing with Load Balancing and Compromise Probability Behavior Account</article-title>
          ,
          <source>in: Proceedings of the IEEE EUROCON 2021 - 19th International Conference on Smart Technologies</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>296</fpage>
          -
          <lpage>299</lpage>
          . doi: https://doi.org/10.1109/ EUROCON52738.
          <year>2021</year>
          .
          <volume>9535642</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>O.</given-names>
            <surname>Lemeshko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yeremenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yevdokymenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Sleiman</surname>
          </string-name>
          ,
          <article-title>System of Solutions the Maximum Number of Disjoint Paths Computation Under Quality of Service and Security Parameters</article-title>
          , in: M.
          <string-name>
            <surname>Ilchenko</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Uryvsky</surname>
          </string-name>
          , L. Globa (Eds.),
          <source>Advances in Information and Communication Technology</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>