<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analysis of Information Flows of Distance Education Systems, Taking into Account the Need to Ensure Their Cybersecurity</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Valery Lakhno</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lazat Kydyralina</string-name>
          <email>lazat_75@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Berik Akhmetov</string-name>
          <email>berik.akhmetov@yu.edu.kz</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bagdat Yagaliyeva</string-name>
          <email>bagdat.yagaliyeva@yu.edu.kz</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kayirbek Makulov</string-name>
          <email>kaiyrbek.makulov@yu.edu.kz</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>NJSC “Shakarim University in Semey</institution>
          ,”
          <addr-line>163 Shugaev str., Semey, 070000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National University of Life and Environmental Sciences of Ukraine</institution>
          ,
          <addr-line>19 H. Rodimtseva str., Kyiv, 03041</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>microdistrict 32, Aktau, 130000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <fpage>104</fpage>
      <lpage>109</lpage>
      <abstract>
        <p>A structure for organizing information flows (IF) in distance learning systems (DLS) of universities is proposed, which is able to increase the efficiency of the complex interaction of both existing and new promising mechanisms for controlling and processing IF that circulate in DLS. The proposed additions imply the development of new or the use of ready-made models of protected information flows (IF) and DLS processes. And besides, the features of optimization measures related to the information security of the DLS are taken into account. The proposed model covers a set of conditions and tasks that are priority when searching for optimal information security measures for DLS.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Distance learning system</kwd>
        <kwd>information flows</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>information security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the context of the global digitalization of
society, distance education systems (DLS) are
becoming more and more widespread in the field
of education, due to their inherent qualitative
characteristics and features [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1–4</xref>
        ]. At the same
time, the tasks of ensuring cybersecurity (KB) of
information flows (IF), which contain
confidential information and belong to the DLS,
or are part of its workflow, were updated [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The
existing standard solutions for CS od DLS,
according to many researchers [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6–8</xref>
        ], are only able
to partially solve problems related to IS and CS od
DLS.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of Previous Studies</title>
      <p>
        Many authors [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8">1–8</xref>
        ], dealing with the issues of
providing IS and CS of enterprises in the digital
sphere, and this can undoubtedly include the
digital educational environment of the university
(DEEU), have shown that the most effective
approach can be the one in which the information
flow management system (IF) inside the DEEU is
made based on the separation of the goals of the
functioning of these flows, as well as the content
that each flow contains.
      </p>
      <p>
        During the research, there was performed an
analysis based on the results of an audit of IS and
CS of international companies dealing with
relevant issues for state organizations, including
universities and other large educational
institutions (EI). First of all, they are EU, the
USA, and Canada [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. As the results of such
studies [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] showed, as well as the data cited in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
and not taking into account specific targeted
attacks aimed at buffer overflow and violation of
cryptographic protocols [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], a significant number
of violations is associated with unauthorized data
changes in DEEU (&gt; 12%), with bypassing the
restrictions policy on IS in DEEU (&gt; 15%), with
insufficient protection of the authentication
procedure, etc.
      </p>
      <p>
        Different according to the source data [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] can
be the targets, objects and subjects of cyber
attacks on DEEU, see Table 1.
      </p>
      <p>For several years, analysts in the field of IS and
CS have fixed a trend indicating a steady increase
of the number of cyber incidents and cyberattacks
in DEEU.</p>
      <p>
        This, in particular, can be explained by the
increase of the number of local networks of
universities and other EI that are connected to
public networks [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        In publications devoted to the problem of
evaluating the security of DEEU [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] it is noted
that in addition to the technical tasks on protection
of the information circulating in ICSU, it is
necessary to analyze periodically information
risks and to monitor the effectiveness of the
implemented measures aimed at ensuring IS and
CS of the university. These procedures allow to
consider:
 The variability of requirements in the tasks of
information protection (for example, from
content protection to protection of personal
information of employees and students).
 The potential possibility for the emergence of
new cyberthreats and vulnerabilities in ICSU.
 The decrease of the effectiveness of already
implemented measures for information
protection over time.
 The decrease of the reliability of information
processing in IEEU by physical obsolescence
of the equipment and software.
      </p>
      <p>Thus, within the framework of this subsection
of the research, we will consider the task of
creating a DLS structure that would take into
account the degree of security of individual
information flows within the DEEU, and would
also potentially be able to provide control over the
IF, as well as protect the DLS from arbitrary
information attacks by computer intruders.</p>
      <p>
        For DLS, as for most digital systems, there are
two types of key threats that, to one degree or
another, can affect the level of students'
preparation, as well as the performance of DLS as
a whole. Such groups of threats, without a more
detailed classification, to which a fairly large
number of studies by other authors are devoted
[
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref9">9–15</xref>
        ], include:
      </p>
      <p> External threats, i.e. remote influence on
the DLS of an attacker, for example, aimed at
creating opportunities for illegal penetration into
the DLS.</p>
      <p> Internal threats, unlawful introduction by
malefactors of foreign information flows into the
DEEU, in particular, into information systems,
using vulnerabilities and weaknesses in the DLS
protection circuits.</p>
      <p>We believe that in order to realize the main
mission of the DLS, i.e. to give chances to all
students, regardless of their location, economic
social, and other conditions, to receive a quality
education and at the same time remain
costeffective and competitive, any DLS of a modern
university should have the following properties:
 Qualitatively and promptly process
information flows that circulate in the DLS,
as well as in the DEEU as a whole.
 Contribute to a continuous and stable cycle of
work of the DLS.
 Ensure the confidentiality of personal data of
teachers and students who use DLS.</p>
      <p>Purpose of the study is development of
models of protected information flows (IF) and
processes in DLS, which will allow taking into
account the features of optimization measures
related to IS of DLS.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Models and Methods</title>
      <p>Based on the above, it is possible to present the
structure of the DLS and its main information
flows, based not only on the functional
requirements for the DLS, but also taking into
account the need to solve the problem of ensuring
information and cyber security of such systems.
The block diagram is shown on Fig. 1. This
approach allows, to the extent necessary, to take
into account both the basic requirements for the
DLS, and take into account the tasks of protecting
information flows within the system.</p>
      <p>
        In case of the emergence of external
information flows, indicated in diagram 1 as "1",
they must first be processed in the block
responsible for collecting and processing
information before getting into the DEEU and its
DLS component (on Fig. 1. designated as BCPI).
This block, in accordance with the
recommendations [
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18">15–18</xref>
        ], implements the
following functions:
      </p>
      <p>Analysis of incoming traffic and protection of
DLS from external ones (cybersecurity block
CSB);</p>
      <p>IF analysis (information flow analysis block
IFAB). This block is intended for: (a) IF
monitoring - tracking IF circulating in the DLS, as
well as their accounting and accumulation of
statistics; (b) analysis of IF from the functional
units of the university; (c) encoding-decoding IF,
and the formation of specialized IF, which are
intended exclusively for students; (d) IF routing;
(e) protection against internal threats.</p>
      <p>Planning (Planning Block, PLB). This block is
designed to collect, store and backup information
that circulates in the DLS).</p>
      <p>Implementation (Implementation Block
(IMB). This block is intended for the subsequent
implementation of the plans and data developed in
the IMB.</p>
      <p>Each of the above functions can be
implemented based on the work of their own
algorithms to solve the tasks. The coordinated
work of all blocks is able to filter out “potentially
dangerous” or “malicious flows” (viruses, spam,
etc.), which will prevent the implementation of
many external and internal cyber threats for DLS.</p>
      <p>Upon successful verification in the CSB, the
IF-1 information flow is transmitted to the
analysis unit, i.e. in AB. The block diagram of
IFAB operation is shown on Fig. 2. As mentioned
above, IFAB performs the work of evaluating and
processing all information flows circulating in the
DEEU and DLS, and most importantly, registers
and analyzes the status of “encoded IF.” If the
current IF, located in the IFAB, does not pass the
check for this status, the encoding procedure is
performed in relation to it. By encoding, we mean
the implementation of the procedure, when, based
on the sets of goals and semantic elements, a new
IF will be formed with a formalized structure that
corresponds to the expression:</p>
      <p>M C INFL  M ind , M sem , M con ,

(1)
where MC INFL is structure of the encoded IF; Mind
is a set of indices that determine the ownership of
IF; Msem is set of semantic IF content; Mcon is a set
of initial content corresponding to the IF.</p>
      <p>Therefore, it is possible to implement
protection against basic internal threats in the IF
section "1-2". Of course, for this it is necessary,
based on the architecture of a particular DLS, to
select adequate means and methods of protection.</p>
      <p>International
relations
Information
funds
Others
14 Financial</p>
      <p>divisions 4</p>
      <p>Functional divisions Ki
1</p>
      <p>CSB
11</p>
      <p>PLB
BCPI
2
3</p>
      <p>DEEU
Rectorate, deans</p>
      <p>IFAB
10
12 IMB
7</p>
      <p>13
5 6 Accounting 15</p>
      <p>Accounting for staff and</p>
      <p>students
9 8 DLS software</p>
      <p>In order for a targeted or accidental malicious
IF to be processed in the DLS, it must first be
converted to the IF format accepted in the system.
Otherwise, this thread will be ignored. At the
same time, after encoding, the initial IF will lose
its initial activity, and, therefore, will no longer
pose a direct threat to the DLS.</p>
      <p>
        If the IF meets all the requirements, primarily
in terms of IS and CS, then based on the set Mind,
this IF will be forwarded to its recipients, based
on the routing algorithm and tasks. These IFs on
Fig. 2 are designated by the positions 3–10. We
believe that the DLS works in conjunction with
the electronic document management system
(EDMS), which are now being widely introduced
into the digital environment of universities around
the world [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1–4</xref>
        ]. Such an organization of IF
circulation in the DEEU and DLS will increase the
efficiency of all structural units of universities that
No
      </p>
      <p>Set of semantic elements</p>
      <p>Extraction of
semantic elements
from IF
IF encoding</p>
      <p>Set of DLS goals
10
10
2</p>
      <p>Analysis of conformity encoded by IF
Yes</p>
      <p>Need in IF
encoding?</p>
      <p>No Withdrawal of IF from</p>
      <p>DLS
IF ownership analysis</p>
      <p>Кi=3…10</p>
      <p>To maintain the relevance of the information
arrays (IA) contained in the DLS and their backup
copies, the PLB is used. This contributes to
solving the problem of restoring IA and
monitoring their integrity in cases of accidental
failure or targeted destructive impacts on the DLS
by computer intruders.</p>
      <p>In case where the analyzed IF contains
requests for the provision of a certain course or
other educational content, control actions (CA)
should be automatically generated in the IFAB,
which are then sent to the CA. The result of the
implementation of the CA will be the formation of
a virtual environment that contains elements that
contribute to the implementation of the request.</p>
      <p>Based on the scheme of information flows of
DLS, taking into account the need to ensure their
cybersecurity, a fundamentally new methodology
for creating an IS support system for DEEU and
DLS is proposed. The methodology contains the
following steps:
1. Determination of the probability of the impact
of IS and CS threats on the DEEU and/or DLS.
2. Determination of a generalized indicator of the
level of IS and CS of the DEEU and/or DLS.
are responsible for organizing distance education,
primarily by updating a specific IF within the
framework of only their own functional tasks.
3. Evaluating the effectiveness of investments in</p>
      <p>IS and CS of the DEEU and/or DLS.
4. Creation of an integrated mechanisms for
providing IS and CS to the DEEU and/or DLS.</p>
      <p>The proposed structure for organizing
information flows in the DLS of universities, in
our opinion, is able to effectively implement the
complex interaction of both existing and new
promising mechanisms for controlling and
processing IF that circulate in the DEEU and
DLS.</p>
      <p>
        Cyber attacks on DLS [
        <xref ref-type="bibr" rid="ref15 ref17 ref5 ref6">5, 6, 15, 17</xref>
        ] lead to
information loss, equipment and hardware
failures, significant material and moral losses that
are inflicted on the owner and users of the network
and the DEEU as a whole. Most often, a cyber
attack is a consequence of the presence of
weaknesses in the DEEU, its information
networks (InN) or in their protection systems.
That is, a vulnerability is a weakness in the
information assets of the DEEU or in the ISS,
leading to the possibility of implementing certain
cyber threats. Therefore, in order to counteract the
main cyber threats, the information security
system of the DLS should solve the following
tasks:
 To delimit and control the access of
subscribers (users) to the resources of the DLS
or/and InN.
 To implement functions for the protection of
data transmitted within the framework of the
relevant information flows through
communication channels.
 To register, collect, store, process and issue
information about all events (including
incoming and outgoing flows) that occur in the
InN, DLS or DEEU.
 To implement monitoring of the work of users
of InN (DLS).
 To ensure that the operating environment is
closed for already tested software.
 To implement protection against uncontrolled
introduction of potentially dangerous software
into the InN (DLS) (for example, containing
“bookmarks” or leading to critical errors).
 To carry out self-defense against means of
overcoming the information security system
and protection against the introduction and
spread of malicious software.
 To ensure the availability of DLS information
resources, for example, by data backup.
 To ensure and control the integrity of critical
resources for the DLS or DEEU as a whole.
      </p>
      <p>During the research, the method of managing
the IS of DLS or DEEU was considered. The
method is based on a set of optimization models,
and the main steps of this method were:
 Measures to develop several alternative
models of protected IF in the DLS circuits.
 Measures for the development or selection of
an adequate optimization model of the LMS
IS.
 Search for the extremum of the objective
function in the analysis of alternative sets of
DLS protection tools, etc.</p>
      <p>In particular, as part of the development of a
method for justifying measures to ensure the IS of
the DLS by the criterion of an integral loss
minimum, such a model was proposed to find the
optimal values of the periods for reviewing
measures aimed at ensuring the IS of the DLS of
the university.</p>
      <p>If it is necessary to justify the review period for
measures related to the provision of IS of the DLS
(and/or DEEU) is t0 , it is necessary to solve the
following system of equations:</p>
      <p>T
IL0 t0 ,T   min  Lk tk , t dt,</p>
      <p>kAL 0</p>
      <p>Lk tk , t   TCk tk , t   RV t  PTRk tk , t ,
where AL is area of permissible time periods for
reviewing measures for the IS of the DLS;</p>
      <p>Lk(Δtk,t) is the resulting losses at the k-th value of
the review period associated with the IS of the DLS
at a point in time t ;</p>
      <p>
        TCk(Δtk,t) is total costs for IS of the DLS at the
k-th value of the period, for example, can be
determined depending on the strategy of investing
in IS systems chosen by the university
management. Such models are presented in detail
in [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ];
      </p>
      <p>RV(t) is the value of protected information
resources presented in the DLS or DEEU;</p>
      <p>K is the number of possible values for the review
period for IS activities of the DLS and/or DEEU;</p>
      <p>Pck(Δtk,t) is probability of authorized access to
IR in DLS;</p>
      <p>Pck tk , t   Pg ,
PTRk tk , t   Pper ,
k  1,2,3,...K.
(2)</p>
      <p>Pg is the value of the probability of authorized
access to IR in the DLS allowed by information
security metrics;</p>
      <p>PTRk(Δtk,t) is the value of the probability of
realization of the IF or processes; violation at the
k-th value of the review period of the IS activities
of the DLS at the time T;</p>
      <p>Pper is admissible value for the probability of
violation of IF or processes in the DLS.</p>
      <p>In this case, you can get a solution that allows
to achieve the minimum integral losses on the
time interval is IL0 t0 ,T  .</p>
      <p>Taking into account the structural features of
the protected information flows and processes in
the DLS, the value of the protected information
resources, the potential awareness of intruders,
there is proposed a model that develops the
Shewhart-Deming cyclic control model.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions</title>
      <p>The following results were obtained in the
research:
 A structure for organizing information flows
(IF) in distance learning systems (DLS) of
universities is proposed, which is able to
increase the efficiency of the complex
interaction of both existing and new promising
mechanisms for controlling and processing IF
that circulate in the DEEU and DLS.
 The proposed additions imply the development
of new or the use of ready-made models of the
protected IF and processes with DLS. And
besides, the features of optimization measures
related to the information security of the DLS
are taken into account. The proposed model
covers a set of conditions and tasks that are
priorities in the search for optimal information
security measures for DLS.</p>
    </sec>
    <sec id="sec-5">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Aljawarneh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Web</given-names>
            <surname>Engineering</surname>
          </string-name>
          <article-title>Security Methodology for E-Learning Systems</article-title>
          .
          <source>Network Security</source>
          , vol.
          <volume>3</volume>
          ,
          <issue>2011</issue>
          , pp.
          <fpage>12</fpage>
          -
          <lpage>15</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Brzhevska</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of the Process of Information Transfer from the Source-toUser in Terms of Information Impact, in Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3188</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>257</fpage>
          -
          <lpage>264</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Z. B.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          , Implementation of Social Engineering Attack at Institution of Higher Education,
          <source>in: Proceedings of the 1th International Workshop on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CybHyg)</source>
          , vol.
          <volume>2654</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>155</fpage>
          -
          <lpage>164</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Vladymyrenko</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of Implementation Results of the Distributed Access Control System, in VI In-ternational Scientific</article-title>
          and Practical Conference Problems of Infocommunications.
          <source>Science and Technology</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>44</lpage>
          . doi:
          <volume>10</volume>
          .1109/PICST47496.
          <year>2019</year>
          .
          <volume>9061376</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Hasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Alghazzawi</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Zafar,
          <source>ELearning Systems and Their Security</source>
          ,
          <source>BRIS Journal of Adv. S&amp;T</source>
          , vol.
          <volume>2</volume>
          ,
          <issue>2014</issue>
          , pp.
          <fpage>83</fpage>
          -
          <lpage>92</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L. B. A.</given-names>
            <surname>Rabai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Rjaibi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. B.</given-names>
            <surname>Aissa</surname>
          </string-name>
          ,
          <article-title>Quantifying Security Threats for E-Learning Systems</article-title>
          , in International Conference on Education and
          <string-name>
            <surname>e-Learning</surname>
            <given-names>Innovations</given-names>
          </string-name>
          ,
          <year>2012</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Blanco-Justicia</surname>
          </string-name>
          , et al.,
          <source>Achieving Security and Privacy in Federated Learning Systems: Survey</source>
          , Research Challenges and
          <string-name>
            <given-names>Future</given-names>
            <surname>Directions</surname>
          </string-name>
          .
          <source>Engineering Applications of Artificial Intelligence</source>
          , vol.
          <volume>106</volume>
          ,
          <year>2021</year>
          ,
          <volume>104468</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C.</given-names>
            <surname>Savulescu</surname>
          </string-name>
          , et al.,
          <source>Security in E-Learning Systems, in 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Alexei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alexei</surname>
          </string-name>
          ,
          <article-title>Cyber Security Threat Analysis in Higher Education Institutions as a Result of Distance Learning</article-title>
          ,
          <source>International Journal of Scientific and Technology Research</source>
          , vol.
          <volume>3</volume>
          ,
          <issue>2021</issue>
          , pp.
          <fpage>128</fpage>
          -
          <lpage>133</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Koller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Friedman</surname>
          </string-name>
          ,
          <article-title>Probabilistic Graphical Models</article-title>
          .
          <source>Principles and Techniques</source>
          , MIT Press,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname>Rajaboevich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Nasrullaev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fayzieva</surname>
          </string-name>
          ,
          <article-title>Methods and Intelligent Mechanisms for Constructing Cyberattack Detection Components on Distance-Learning Systems</article-title>
          ,
          <source>in 2020 International Conference on Information Science and Communications Technologies (ICISCT)</source>
          , IEEE,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>D.</given-names>
            <surname>Dang-Pham</surname>
          </string-name>
          , et al.,
          <source>Network Analytics for Improving Students' Cybersecurity Awareness in Online Learning Systems, 2020 RIVF International Conference on Computing and Communication Technologies (RIVF)</source>
          , IEEE,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>N.</given-names>
            <surname>Rjaibi</surname>
          </string-name>
          , et al.,
          <article-title>Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-learning Case Study</article-title>
          ,
          <source>International Journal of Secure Software Engineering (IJSSE)</source>
          , vol.
          <volume>4</volume>
          .
          <issue>3</issue>
          ,
          <issue>2013</issue>
          , pp.
          <fpage>64</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>T.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Reddi</surname>
          </string-name>
          ,
          <article-title>Deep Reinforcement Learning for Cyber Security</article-title>
          ,
          <source>in IEEE Transactions on Neural Networks and Learning Systems</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          , et al.,
          <article-title>Teaching Cyber-Security for Distance Learners: A Reflective Study</article-title>
          , in
          <source>2020 IEEE Frontiers in Education Conference (FIE)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Elsawy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
          ,
          <article-title>E-Learning using the Blackboard System in Light of the Quality of Education and Cyber Security</article-title>
          ,
          <source>International Journal of Current Engineering and Technology</source>
          , vol.
          <volume>9</volume>
          , no.
          <issue>1</issue>
          ,
          <issue>2019</issue>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>54</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>O.</given-names>
            <surname>Keskin</surname>
          </string-name>
          , et al.,
          <article-title>Economics-Based Risk Management of Distributed Denial of Service Attacks: A Distance Learning Case Study</article-title>
          ,
          <source>in ICCWS 2018 13th International Conference on Cyber Warfare and Security</source>
          , vol.
          <volume>343</volume>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          , et al.,
          <article-title>Methodology for Placing Components of a Video Surveillance System for Smart City Based on a Composite Cost Optimization Model</article-title>
          ,
          <source>Lecture Notes in Networks and Systems</source>
          , vol.
          <volume>501</volume>
          ,
          <year>2022</year>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          , et al.,
          <source>Modeling and Optimization of Discrete Evolutionary Systems of Information Security Management in a Random Environment</source>
          ,
          <source>Smart Innovation, Systems and Technologies</source>
          , vol.
          <volume>269</volume>
          ,
          <year>2022</year>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>