<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2019-5-4-114-123</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-103</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATICS, COMPUTER ENGINEERING AND MANAGEMENT</subject></subj-group></article-categories><title-group><article-title>Комплексная модель защищенных киберфизических систем для их проектирования и верификации</article-title><trans-title-group xml:lang="en"><trans-title>A Comprehensive Model of Secure Cyber-Physical Systems for their Design and Verification</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Левшун</surname><given-names>Д. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Levshun</surname><given-names>D. ..</given-names></name></name-alternatives><email xlink:type="simple">levshun@comsec.spb.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Чечулин</surname><given-names>А. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Chechulin</surname><given-names>A. ..</given-names></name></name-alternatives><email xlink:type="simple">noemail@neicon.ru</email><xref ref-type="aff" rid="aff-2"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Котенко</surname><given-names>И. В.</given-names></name><name name-style="western" xml:lang="en"><surname>Kotenko</surname><given-names>I. ..</given-names></name></name-alternatives><email xlink:type="simple">noemail@neicon.ru</email><xref ref-type="aff" rid="aff-2"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский институт информатики и автоматизации Российской академии наук; Санкт-Петербургский национальный исследовательский университет информационных технологий, механики и оптики<country>Россия</country></aff><aff xml:lang="en">St. Petersburg Institute for Informatics and Automation of the Russian Academy of Science; St. Petersburg National Research University of Information Technologies, Mechanics and Optics<country>Russian Federation</country></aff></aff-alternatives><aff-alternatives id="aff-2"><aff xml:lang="ru">Санкт-Петербургский институт информатики и автоматизации Российской академии наук; Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">St. Petersburg Institute for Informatics and Automation of the Russian Academy of Science; The Bonch-Bruevich Saint-Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2019</year></pub-date><pub-date pub-type="epub"><day>13</day><month>04</month><year>2021</year></pub-date><volume>5</volume><issue>4</issue><fpage>114</fpage><lpage>123</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Левшун Д.С., Чечулин А.А., Котенко И.В., 2021</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="ru">Левшун Д.С., Чечулин А.А., Котенко И.В.</copyright-holder><copyright-holder xml:lang="en">Levshun D..., Chechulin A..., Kotenko I...</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/103">https://tuzs.sut.ru/jour/article/view/103</self-uri><abstract><p>В статье предложена комплексная модель защищенных киберфизических систем, предназначенная для их проектирования и верификации. В рамках данной модели киберфизическая система представляется в виде множества блоков с различными свойствами и связями между ними. Основная сложность при построении подобной модели заключается в объединении различных подходов к моделированию киберфизических систем (или их элементов) в рамках единого подхода. Основная цель предлагаемого подхода к моделированию заключается в обеспечении возможности преобразования различных моделей друг в друга без потери значимых данных о блоках системы, а также учете эмерджентных свойств, возникающих в процессе их взаимодействия. Корректность предложенной модели обоснована на примере ее использования для проектирования и верификации системы контроля и управления доступом.</p></abstract><trans-abstract xml:lang="en"><p>In this paper a combined model of secure cyber-physical systems for their design and verification is proposed. Within the framework of this model, a cyber-physical system is represented as a set of blocks with various properties and relationships between them. The main challenge in such model construction is to combine various approaches to the modeling of cyber-physical systems (or their elements) within a single approach. The main goal of the proposed modeling approach is to provide the ability to convert various models into each other without losing significant data about the elements of the system, as well as taking into account the emergent properties that arise in the process of their interaction. The correctness of the proposed model is validated by the example of its use for design and verification of access control system.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>безопасность на основе проектирования</kwd><kwd>киберфизическая система</kwd><kwd>верификация безопасности</kwd><kwd>моделирование систем</kwd><kwd>модель атакующего</kwd><kwd>модель атакующих действий</kwd><kwd>комплексная модель</kwd></kwd-group><kwd-group xml:lang="en"><kwd>security by design</kwd><kwd>cyber-physical system</kwd><kwd>security verification</kwd><kwd>system modeling</kwd><kwd>attacker model</kwd><kwd>attack actions model</kwd><kwd>comprehensive model</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Левшун Д.С., Чечулин А.А., Котенко И.В. Проектирование безопасной среды передачи данных на примере протокола I2C // Защита информации. Инсайд. 2018. № 4 (82). С.54-62.</mixed-citation><mixed-citation xml:lang="en">Левшун Д.С., Чечулин А.А., Котенко И.В. Проектирование безопасной среды передачи данных на примере протокола I2C // Защита информации. Инсайд. 2018. № 4 (82). С.54-62.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Hu F., Lu Y., Vasilakos A.V., Hao Q., Ma R., Patil Y., et al. Robust Cyber-Physical Systems: Concept, Models, and Implementation // Future Generation Computer Systems. 2016. Vol. 56. PP. 449-475. DOI:10.1016/j.future.2015.06.006</mixed-citation><mixed-citation xml:lang="en">Hu F., Lu Y., Vasilakos A.V., Hao Q., Ma R., Patil Y., et al. Robust Cyber-Physical Systems: Concept, Models, and Implementation // Future Generation Computer Systems. 2016. Vol. 56. PP. 449-475. DOI:10.1016/j.future.2015.06.006</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Canedo A., Schwarzenbach E., Faruque M.A.A. Context-sensitive synthesis of executable functional models of cyber-physical systems // Proceeding of the International Conference on Cyber-Physical Systems (ICCPS, Philadelphia, USA, 8-11 April 2013). Piscataway, NJ: IEEE, 2013. PP. 99-108. DOI:10.1145/2502524.2502539</mixed-citation><mixed-citation xml:lang="en">Canedo A., Schwarzenbach E., Faruque M.A.A. Context-sensitive synthesis of executable functional models of cyber-physical systems // Proceeding of the International Conference on Cyber-Physical Systems (ICCPS, Philadelphia, USA, 8-11 April 2013). Piscataway, NJ: IEEE, 2013. PP. 99-108. DOI:10.1145/2502524.2502539</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Srivastava A., Morris T., Ernster T., Vellaithurai C., Pan S., Adhikari U. Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information // IEEE Transactions on Smart Grid. 2013. Vol. 4. Iss. 1. PP. 235-244. DOI:10.1109/TSG.2012.2232318</mixed-citation><mixed-citation xml:lang="en">Srivastava A., Morris T., Ernster T., Vellaithurai C., Pan S., Adhikari U. Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information // IEEE Transactions on Smart Grid. 2013. Vol. 4. Iss. 1. PP. 235-244. DOI:10.1109/TSG.2012.2232318</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Xinyu C., Huiqun Y., Xin X. Verification of Hybrid Chi Model for Cyber-Physical Systems Using PHAVer // Proceeding of Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (Taichung, Taiwan, 3- 5 July 2013). Piscataway, NJ: IEEE, 2013. PP. 122-128. DOI:10.1109/IMIS.2013.29</mixed-citation><mixed-citation xml:lang="en">Xinyu C., Huiqun Y., Xin X. Verification of Hybrid Chi Model for Cyber-Physical Systems Using PHAVer // Proceeding of Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (Taichung, Taiwan, 3- 5 July 2013). Piscataway, NJ: IEEE, 2013. PP. 122-128. DOI:10.1109/IMIS.2013.29</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Nuzzo P., Sangiovanni-Vincentelli A.L., Bresolin D., Geretti L., Villa T. A Platform-Based Design Methodology With Contracts and Related Tools for the Design of Cyber-Physical Systems // Proceedings of the IEEE. 2015. Vol. 103. Iss. 11. PP. 2104-2132. DOI:10.1109/JPROC.2015.2453253</mixed-citation><mixed-citation xml:lang="en">Nuzzo P., Sangiovanni-Vincentelli A.L., Bresolin D., Geretti L., Villa T. A Platform-Based Design Methodology With Contracts and Related Tools for the Design of Cyber-Physical Systems // Proceedings of the IEEE. 2015. Vol. 103. Iss. 11. PP. 2104-2132. DOI:10.1109/JPROC.2015.2453253</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Selic B. The pragmatics of model-driven development // IEEE Software. 2003. Vol. 20. Iss. 5. PP. 19-25. DOI:10.1109/MS.2003.1231146</mixed-citation><mixed-citation xml:lang="en">Selic B. The pragmatics of model-driven development // IEEE Software. 2003. Vol. 20. Iss. 5. PP. 19-25. DOI:10.1109/MS.2003.1231146</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Sztipanovits J., Karsai G. Model-integrated computing // Computer. 1997. Vol. 30. Iss. 4. PP. 110-111. DOI:10.1109/2.585163</mixed-citation><mixed-citation xml:lang="en">Sztipanovits J., Karsai G. Model-integrated computing // Computer. 1997. Vol. 30. Iss. 4. PP. 110-111. DOI:10.1109/2.585163</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Kelly S., Tolvanen J.-P. Domain-Specific Modeling: Enabling Full Code Generation. Hoboken: John Wiley &amp; Sons, 2008.</mixed-citation><mixed-citation xml:lang="en">Kelly S., Tolvanen J.-P. Domain-Specific Modeling: Enabling Full Code Generation. Hoboken: John Wiley &amp; Sons, 2008.</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Hehenberger P., Vogel-Heuser B., Bradley D., Eynard B., Tomiyama T., Achiche S. Design, modelling, simulation and integration of cyber physical systems: Methods and applications // Computers in Industry. 2016. Vol. 82. PP. 273-289. DOI:10.1016/j.compind.2016.05.006</mixed-citation><mixed-citation xml:lang="en">Hehenberger P., Vogel-Heuser B., Bradley D., Eynard B., Tomiyama T., Achiche S. Design, modelling, simulation and integration of cyber physical systems: Methods and applications // Computers in Industry. 2016. Vol. 82. PP. 273-289. DOI:10.1016/j.compind.2016.05.006</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Fritzson P. Principles of Object-Oriented Modeling and Simulation with Modelica 2.1. Hoboken: John Wiley &amp; Sons, 2010.</mixed-citation><mixed-citation xml:lang="en">Fritzson P. Principles of Object-Oriented Modeling and Simulation with Modelica 2.1. Hoboken: John Wiley &amp; Sons, 2010.</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Penas O., Plateaux R., Patalano S., Hammadi M. Multi-scale approach from mechatronic to Cyber-Physical Systems for the design of manufacturing systems // Computers in Industry. 2017. Vol. 86. PP. 52-69. DOI:10.1016/j.compind.2016.12.001</mixed-citation><mixed-citation xml:lang="en">Penas O., Plateaux R., Patalano S., Hammadi M. Multi-scale approach from mechatronic to Cyber-Physical Systems for the design of manufacturing systems // Computers in Industry. 2017. Vol. 86. PP. 52-69. DOI:10.1016/j.compind.2016.12.001</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Friedenthal S., Alan M. and Rick S. A Practical Guide to SysML: The Systems Modeling Language. Burlington: Morgan Kaufmann, 2014.</mixed-citation><mixed-citation xml:lang="en">Friedenthal S., Alan M. and Rick S. A Practical Guide to SysML: The Systems Modeling Language. Burlington: Morgan Kaufmann, 2014.</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Brück D., Elmqvist H., Olsson H., Mattsson S.E. Dymola for Multi-Engineering Modeling and Simulation. Proceedings of the 2nd International Modelica Conference (Oberphaffenhofen, Germany, 18-19 March 2002). 2002.</mixed-citation><mixed-citation xml:lang="en">Brück D., Elmqvist H., Olsson H., Mattsson S.E. Dymola for Multi-Engineering Modeling and Simulation. Proceedings of the 2nd International Modelica Conference (Oberphaffenhofen, Germany, 18-19 March 2002). 2002.</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Estefan J.A. Survey of Model-Based Systems Engineering (MBSE) Methodologies. URL: http://www.omgsysml.org/MBSE_Methodology_Survey_RevB.pdf (Accessed 21 November 2019)</mixed-citation><mixed-citation xml:lang="en">Estefan J.A. Survey of Model-Based Systems Engineering (MBSE) Methodologies. URL: http://www.omgsysml.org/MBSE_Methodology_Survey_RevB.pdf (Accessed 21 November 2019)</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Rumbaugh J., Blaha M., Premerlani M., Eddy F., Lorensen W. Object-Oriented Modeling and Design. Englewood Cliffs: Prentice-Hall, 1991.</mixed-citation><mixed-citation xml:lang="en">Rumbaugh J., Blaha M., Premerlani M., Eddy F., Lorensen W. Object-Oriented Modeling and Design. Englewood Cliffs: Prentice-Hall, 1991.</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">McGuinness D.L., van Harmelen F. OWL Web Ontology Language Overview // W3C recommendation. 2004.</mixed-citation><mixed-citation xml:lang="en">McGuinness D.L., van Harmelen F. OWL Web Ontology Language Overview // W3C recommendation. 2004.</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Balasubramaniyan S., Srinivasan S., Buonopane F., Subathra B., Vain J., Ramaswamy S. Design and verification of Cyber- Physical Systems using TrueTime, evolutionary optimization and UPPAAL // Microprocessors and microsystems. 2016. Vol. 42. PP. 37-48. DOI:10.1016/j.micpro.2015.12.006</mixed-citation><mixed-citation xml:lang="en">Balasubramaniyan S., Srinivasan S., Buonopane F., Subathra B., Vain J., Ramaswamy S. Design and verification of Cyber- Physical Systems using TrueTime, evolutionary optimization and UPPAAL // Microprocessors and microsystems. 2016. Vol. 42. PP. 37-48. DOI:10.1016/j.micpro.2015.12.006</mixed-citation></citation-alternatives></ref><ref id="cit19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Ohlin M., Henriksson D., Cervin A. TrueTime 1.5 - Reference Manual. Department of Automatic Control, Lund Institute of Technology, Lund University, 2007.</mixed-citation><mixed-citation xml:lang="en">Ohlin M., Henriksson D., Cervin A. TrueTime 1.5 - Reference Manual. Department of Automatic Control, Lund Institute of Technology, Lund University, 2007.</mixed-citation></citation-alternatives></ref><ref id="cit20"><label>20</label><citation-alternatives><mixed-citation xml:lang="ru">Larsen K.G., Pettersson P., Yi W. UPPAAL in a nutshell // International Journal on Software Tools for Technology Transfer (STTT). 1997. Vol. 1. Iss. 1. PP. 134-152.</mixed-citation><mixed-citation xml:lang="en">Larsen K.G., Pettersson P., Yi W. UPPAAL in a nutshell // International Journal on Software Tools for Technology Transfer (STTT). 1997. Vol. 1. Iss. 1. PP. 134-152.</mixed-citation></citation-alternatives></ref><ref id="cit21"><label>21</label><citation-alternatives><mixed-citation xml:lang="ru">Seiger R., Keller C., Niebling F., Schlegel T. Modelling complex and flexible processes for smart cyber-physical environments // Journal of Computational Science. 2015. Vol. 10. PP. 137-148. DOI:10.1016/j.jocs.2014.07.001</mixed-citation><mixed-citation xml:lang="en">Seiger R., Keller C., Niebling F., Schlegel T. Modelling complex and flexible processes for smart cyber-physical environments // Journal of Computational Science. 2015. Vol. 10. PP. 137-148. DOI:10.1016/j.jocs.2014.07.001</mixed-citation></citation-alternatives></ref><ref id="cit22"><label>22</label><citation-alternatives><mixed-citation xml:lang="ru">Steinberg D., Budinsky F., Merks E., Paternostro M. EMF: Eclipse Modeling Framework. London: Pearson Education, 2008.</mixed-citation><mixed-citation xml:lang="en">Steinberg D., Budinsky F., Merks E., Paternostro M. EMF: Eclipse Modeling Framework. London: Pearson Education, 2008.</mixed-citation></citation-alternatives></ref><ref id="cit23"><label>23</label><citation-alternatives><mixed-citation xml:lang="ru">Srinivasan S., Buonopane F., Vain J., Ramaswamy S. Model checking response times in Networked Automation Systems using jitter bounds // Computers in Industry. 2015. Vol. 74. PP. 186-200. DOI:10.1016/j.compind.2015.06.012</mixed-citation><mixed-citation xml:lang="en">Srinivasan S., Buonopane F., Vain J., Ramaswamy S. Model checking response times in Networked Automation Systems using jitter bounds // Computers in Industry. 2015. Vol. 74. PP. 186-200. DOI:10.1016/j.compind.2015.06.012</mixed-citation></citation-alternatives></ref><ref id="cit24"><label>24</label><citation-alternatives><mixed-citation xml:lang="ru">Goldblatt R. Logics of Time and Computation. Stanford: Center for the Study of Language and Information, 1992.</mixed-citation><mixed-citation xml:lang="en">Goldblatt R. Logics of Time and Computation. Stanford: Center for the Study of Language and Information, 1992.</mixed-citation></citation-alternatives></ref><ref id="cit25"><label>25</label><citation-alternatives><mixed-citation xml:lang="ru">Zainalabedin N. VHDL: Analysis and Modeling of Digital Systems. New York: McGraw-Hill, 1997.</mixed-citation><mixed-citation xml:lang="en">Zainalabedin N. VHDL: Analysis and Modeling of Digital Systems. New York: McGraw-Hill, 1997.</mixed-citation></citation-alternatives></ref><ref id="cit26"><label>26</label><citation-alternatives><mixed-citation xml:lang="ru">Fowler M., Scott K. UML Distilled: a Brief Guide to the Standard Object Modeling Language. Boston: Addison-Wesley Professional, 2004.</mixed-citation><mixed-citation xml:lang="en">Fowler M., Scott K. UML Distilled: a Brief Guide to the Standard Object Modeling Language. Boston: Addison-Wesley Professional, 2004.</mixed-citation></citation-alternatives></ref><ref id="cit27"><label>27</label><citation-alternatives><mixed-citation xml:lang="ru">Solovyev A., Mikheev M., Zhou L., Dutta-Moscato J., Ziraldo C., An G., et al. SPARK: a framework for multi-scale agentbased biomedical modeling // Proceedings of the Spring Simulation Multiconference (Orlando, USA, 11-15 April 2010). San Diego: Society for Computer Simulation International, 2010. DOI:10.1145/1878537.1878541</mixed-citation><mixed-citation xml:lang="en">Solovyev A., Mikheev M., Zhou L., Dutta-Moscato J., Ziraldo C., An G., et al. SPARK: a framework for multi-scale agentbased biomedical modeling // Proceedings of the Spring Simulation Multiconference (Orlando, USA, 11-15 April 2010). San Diego: Society for Computer Simulation International, 2010. DOI:10.1145/1878537.1878541</mixed-citation></citation-alternatives></ref><ref id="cit28"><label>28</label><citation-alternatives><mixed-citation xml:lang="ru">Torti L., Wuillemin P. O3PRM Language Specification. Technical report UPMC. 2013.</mixed-citation><mixed-citation xml:lang="en">Torti L., Wuillemin P. O3PRM Language Specification. Technical report UPMC. 2013.</mixed-citation></citation-alternatives></ref><ref id="cit29"><label>29</label><citation-alternatives><mixed-citation xml:lang="ru">Schruben L.W. SIGMA - A graphical approach to teaching simulation // Journal of Computing in Higher Education. 1992. Vol. 4. DOI:10.1007/BF02940978</mixed-citation><mixed-citation xml:lang="en">Schruben L.W. SIGMA - A graphical approach to teaching simulation // Journal of Computing in Higher Education. 1992. Vol. 4. DOI:10.1007/BF02940978</mixed-citation></citation-alternatives></ref><ref id="cit30"><label>30</label><citation-alternatives><mixed-citation xml:lang="ru">Десницкий В.А., Чечулин А.А., Котенко И.В., Левшун Д.C., Коломеец М.В. Комбинированная методика проектирования защищенных встроенных устройств на примере системы охраны периметра // Труды СПИИРАН. 2016. № 5(48). C. 5-31. DOI:10.15622/sp.48.1</mixed-citation><mixed-citation xml:lang="en">Десницкий В.А., Чечулин А.А., Котенко И.В., Левшун Д.C., Коломеец М.В. Комбинированная методика проектирования защищенных встроенных устройств на примере системы охраны периметра // Труды СПИИРАН. 2016. № 5(48). C. 5-31. DOI:10.15622/sp.48.1</mixed-citation></citation-alternatives></ref><ref id="cit31"><label>31</label><citation-alternatives><mixed-citation xml:lang="ru">Левшун Д.С., Чечулин А.А., Котенко И.В. Жизненный цикл разработки защищенных систем на основе встроенных устройств // Защита информации. Инсайд. 2017. № 4(76). С. 53-59.</mixed-citation><mixed-citation xml:lang="en">Левшун Д.С., Чечулин А.А., Котенко И.В. Жизненный цикл разработки защищенных систем на основе встроенных устройств // Защита информации. Инсайд. 2017. № 4(76). С. 53-59.</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
