{"id":108,"date":"2014-09-16T00:39:05","date_gmt":"2014-09-15T20:39:05","guid":{"rendered":"http:\/\/kaf44-mephi.rhcloud.com\/?page_id=108"},"modified":"2024-04-27T14:13:48","modified_gmt":"2024-04-27T11:13:48","slug":"scopus-and-web-of-science","status":"publish","type":"page","link":"https:\/\/kaf44.mephi.ru\/?page_id=108","title":{"rendered":"Scopus \u0438 Web of Science"},"content":{"rendered":"<ol>\n<li>Chekhovskoy Y., Plaksiy K., Nikiforov A., Miloslavskaya N. The Use of Virtual Reality Technologies in the Specialists\u2019 Training in the Field of Information Security. In: F\u00e9lix Francisco Ramos Corchado and Alexei V. Samsonovich (Eds.). 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence: The 13th Annual Meeting of the BICA Society. Procedia Computer Science, Vol. 213. P\u0440. 223-231. DOI: DOI: 10.1016\/j.procs.2022.11.060. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Stodelov D., Miloslavskaya N. Open Source INTelligence Tools. In: F\u00e9lix Francisco Ramos Corchado and Alexei V. Samsonovich (Eds.). 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence: The 13th Annual Meeting of the BICA Society. Procedia Computer Science, Vol. 213. P\u0440. 83-88. DOI: DOI: 10.1016\/procs.2022.11.041. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Stodelov M., Malakhov M., Marachyova A. Security Architecture of Network Security Centers as Part of Modern Intranets. In: F\u00e9lix Francisco Ramos Corchado and Alexei V. Samsonovich (Eds.). 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence: The 13th Annual Meeting of the BICA Society. Procedia Computer Science, Vol. 213. P\u0440. 58-63. DOI: 10.1016\/j.procs.2022.11.038. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstaya S. Information Security Management Maturity Models. In: F\u00e9lix Francisco Ramos Corchado and Alexei V. Samsonovich (Eds.). 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence: The 13th Annual Meeting of the BICA Society. Procedia Computer Science, Vol. 213. P\u0440. 49-57. DOI: 10.1016\/j.procs.2022.11.037. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya, N., Tolstoy, A. (2022). How to Overcome Staff Shortage in Professionals for SOCs and NSICs. In: Drevin, L., Miloslavskaya, N., Leung, W.S., von Solms, S. (eds) Information Security Education \u2013 Adapting to the Fourth Industrial Revolution. WISE 2022. IFIP Advances in Information and Communication Technology, vol. 650. Chapter 3. Pp. 31-45. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-08172-9_3. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya, N., Mesengiser, Y. (2022). Blockchain Redacting Algorithm with Storing Votes Inside the Chain. In: Rocha, A., Adeli, H., Dzemyda, G., Moreira, F. (eds) Information Systems and Technologies. WorldCIST 2022. Lecture Notes in Networks and Systems, vol. 468. V.I, Chapter 17. P\u0440. 171-181. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-04826-5_17. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya, N., Tolstaya, S. (2022). Maturity Concept and Model Review. In: Rocha, A., Adeli, H., Dzemyda, G., Moreira, F. (eds) Information Systems and Technologies. WorldCIST 2022. Lecture Notes in Networks and Systems, vol 468. V.I, Chapter 18. P\u0440. 182-191. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-04826-5_18. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Network Protection Tools for Network Security Intelligence Centers. 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence: Eleventh Annual Meeting of the BICA Society. Procedia Computer Science. 2021. Vol. 190, \u0440\u0440. 597-603. DOI: 10.1016\/j.procs.2021.06.070. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Brief Evolution of Network Protection Tools and Methods. 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence: Eleventh Annual Meeting of the BICA Society. Procedia Computer Science. 2021. Vol. 190, \u0440\u0440. 590-596. DOI: 10.1016\/j.procs.2021.06.069. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Mesengiser Y., Miloslavskaya N. Problems of Using Redactable Blockchain Technology. 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence: Eleventh Annual Meeting of the BICA Society. Procedia Computer Science. 2021. Vol. 190, \u0440\u0440. 582-589. DOI: 10.1016\/j.procs.2021.06.068. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Drevin L., Miloslavskaya N., Leung W.S., Solms S.V. Preface. 2021. In: Drevin L., Miloslavskaya N., Leung W.S., von Solms S. (eds) Information Security Education for Cyber Resilience. WISE 2021. IFIP Advances in Information and Communication Technology, vol 615. Springer, Cham. Pp. V. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Formation of General Professional Competencies in Academic Training of Information Security Professionals. 2021. In: Drevin L., Miloslavskaya N., Leung W.S., von Solms S. (eds) Information Security Education for Cyber Resilience. WISE 2021. IFIP Advances in Information and Communication Technology, vol 615. Springer, Cham. Pp. 13-26. DOI: 10.1007\/978-3-030-80865-5_2. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Bishop M., Drevin L., Futcher L., Leung W.S., Miloslavskaya N., Moore E.L., Ophoff, Solms S.V. A Brief History and Overview of WISE. 2021. In: Drevin L., Miloslavskaya N., Leung W.S., von Solms S. (eds) Information Security Education for Cyber Resilience. WISE 2021. IFIP Advances in Information and Communication Technology, vol 615. Springer, Cham. Pp. 3-9. DOI: 10.1007\/978-3-030-80865-5_1. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Cyber Polygon Site Project in the Framework of the MEPhI Network Security Intelligence Center. Proccedtings of the Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence (BICA*AI 2020). Natal, Brazi, November 10-15. Springer. 2021. Vol. 1310. Pp. 295-308. DOI: 1007\/978-3-030-65596-9_36. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Furnell S. Network Security Intelligence Centres for Information Security Incident Management. Proccedtings of the Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence (BICA*AI 2020). Natal, Brazi, November 10-15. Springer. 2021. Vol. 1310. Pp. 270-282. DOI: 10.1007\/978-3-030-65596-9_34. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Nikiforov A. and Plaksiy K. Block Formation for Storing Data on Information Security Incidents for Digital Investigations. Proccedtings of the Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence (BICA*AI 2020). Natal, Brazi, November 10-15. Springer. 2021. Vol. 1310. Pp. 283-294. DOI: 1007\/978-3-030-65596-9_35. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Vybornov A., Miloslavskaya N., Tolstoy A. Designing Competency Models for Cybersecurity Professionals for the Banking Sector. In: Drevin L., Von Solms S., Theocharidou M. (eds) Information Security Education. Information Security in Action. WISE 2020. IFIP Advances in Information and Communication Technology. 2020. Vol 579. Pp. 81\u201395. Springer, Cham. DOI: 10.1007\/978-3-030-59291-2_6. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. IoTBlockSIEM for Information Security Incident Management in the Internet of Things Ecosystem. Cluster Computing. Springer. 1 September 2020. Volume 23, Issue 3. Pp. 1911-1925. DOI: 10.1007\/s10586-020-03110-5. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstaya S. On the Assessment of Compliance with the Requirements of Regulatory Documents to Ensure Information Security. \u00c1. Rocha et al. (Eds.): Proceedings of the 8th World Conference on Information Systems and Technologies (WorldCist&#8217;20). Advances in Intelligent Systems and Computing 1160, pp. 789-795. Springer Nature AG 2020. DOI: 10.1007\/978-3-030-45691-7_74. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Morozov V., Miloslavskaya N. Technical to Psychological Aspects Ratio in the Specialized Information Security Training Content. In: Postproceedings of the 10th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2019 (Tenth Annual Meeting of the BICA Society), ed. by A.V. Samsonovich and V.V. Klimov. Procedia Computer Science. April 15, 2020. Vol. 169. Pp. 90-95. ISSN 1877-0509. DOI: 10.1016\/j.procs.2020.02.119. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Stream Data Analytics for Network Attacks&#8217; Prediction. In: Postproceedings of the 10th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2019 (Tenth Annual Meeting of the BICA Society), ed. by A.V. Samsonovich and V.V. Klimov. Procedia Computer Science. April 15, 2020. Vol. 169. Pp. 57-62. ISSN 1877-0509. DOI: 10.1016\/j.procs.2020.02.114. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Security Zone Infrastructure for Network Security Intelligence Centers. In: Postproceedings of the 10th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2019 (Tenth Annual Meeting of the BICA Society), ed. by A.V. Samsonovich and V.V. Klimov. Procedia Computer Science, 2020, pp. 36-41. ISSN 1877-0509. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Stream Data Analytics for Network Attacks&#8217; Prediction. In: Postproceedings of the 10th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2019 (Tenth Annual Meeting of the BICA Society), ed. by A.V. Samsonovich and V.V. Klimov. Procedia Computer Science, 2020, pp. 42-47. ISSN 1877-0509. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Morozov V., Miloslavskaya N. Technical to Psychological Aspects Ratio in the Specialized Information Security Training Content. In: Postproceedings of the 10th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2019 (Tenth Annual Meeting of the BICA Society), ed. by A.V. Samsonovich and V.V. Klimov. Procedia Computer Science, 2020, pp. 74-79. ISSN 1877-0509. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A., Budzko V. and Das M. Blockchain Application for IoT Security Management. Chapter 7. In: Essentials of Blockchain Technology. CRC Press, Taylor &amp; Francis Group, USA. 2019. 141-168.<\/li>\n<li>Miloslavskaya N., Nikiforov A., Plaksiy K., Tolstoy A. Applying Graph Theory to Detect Cases of Money Laundering and Terrorism Financing. Chapter 12. In: Handbook of research on advanced applications of graph theory in modern society \/ Madhumangal Pal, Sovan Samanta, and Anita Pal, editors. IGI Global, USA. 2020. DOI: 10.4018\/978-1-5225-9380-5.ch012. Pp. 267-319.\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Plaksiy K., Nikiforov A., Miloslavskaya N. (2019) Big Data Analytics for Financial Crime Typologies. In: Younas M., Awan I., Benbernou S. (eds) Big Data Innovations and Applications. Innovate-Data 2019. Communications in Computer and Information Science, vol 1054. Springer, Cham. Pp. 165-178. DOI: 10.1007\/978-3-030-27355-2_13\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. and Tolstoy A. New SIEM System for the Internet of Things. A. Rocha et al. (eds.), New Knowledge in Information Systems and Technologies, Advances in Intelligent Systems and Computing 931, pp. 317-327. Springer International Publishing AG 2019. WorldCIST\u201919, La Toja Island, Galicia, Spain, 16-19 April 2019. DOI:10.1007\/978-3-030-16184-2_31. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Nikiforov A., Plaksiy K. and Tolstoy A. Standardization Issues for the Internet of Things. A. Rocha et al. (eds.), New Knowledge in Information Systems and Technologies, Advances in Intelligent Systems and Computing 931, pp. 328-338. Springer International Publishing AG 2019. WorldCIST\u201919, La Toja Island, Galicia, Spain, 16-19 April 2019. DOI: 10.1007\/978-3-030-16184-2_32 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Andragogy as a Scientific Basis for Training Professionals in Information Security. L. Drevin and M. Theocharidou (Eds.): WISE 2019, IFIP AICT 557, pp. 72\u201385, 2019. Published by Springer Nature Switzerland AG 2019. DOI: 10.1007\/978-3-030-23451-5_6 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Blockchain and Its Security: Ignore or Insert into Academic Training? L. Drevin and M. Theocharidou (Eds.): WISE 2019, IFIP AICT 557, pp. 102\u2013113, 2019. Published by Springer Nature Switzerland AG 2019. DOI: 10.1007\/978-3-030-23451-5_8 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Network Security Intelligence Center as a combination of SIC and NOC. Postproceedings of the 9th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2018 (Ninth Annual Meeting of the BICA Society). Procedia Computer Science. 2018. Vol. 145, pp. 354-358. DOI: 10.1016\/j.procs.2018.11.084 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Developing a Network Security Intelligence Center. Postproceedings of the 9th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2018 (Ninth Annual Meeting of the BICA Society). Procedia Computer Science. 2018. Vol. 145, pp. 359-364. DOI: 10.1016\/j.procs.2018.11.085 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Designing Blockchain-based SIEM 3.0 System. Information and Computer Security (UK). Emerald Publishing. September 2018<em>.\u00a0<\/em>Vol.\u00a0 26, issue 4.\u00a0Pp. 491-512. DOI:\u00a010.1108\/ics-10-2017-0075\u00a0<span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Information Security Management in SOCs and SICs. Journal of Intelligent &amp; Fuzzy Systems. IOS Press.\u00a0Netherlands. 2018. Vol. 35, N 3, pp. 2637-2647. DOI: 10.3233\/JIFS-169615 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Internet of Things: information security challenges and solutions. Cluster Computing. Springer. 2018. Pp. 1-17. DOI: 10.1007\/s10586-018-2823-6\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. (2018) Developing Hands-On Laboratory Works for the \u201cInformation Security Incident Management\u201d Discipline. In: Drevin L., Theocharidou M. (eds) Information Security Education \u2013 Towards a Cybersecure Society. WISE 2018. IFIP Advances in Information and Communication Technology, vol 531. Springer, Cham. 28-39. DOI: 10.1007\/978-3-319-99734-6_3\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Budzko V., Miloslavskaya N., Tolstoy A. (2018) Forming the Abilities of Designing Information Security Maintenance Systems in the Implementation of Educational Programmes in Information Security. In: Drevin L., Theocharidou M. (eds) Information Security Education \u2013 Towards a Cybersecure Society. WISE 2018. IFIP Advances in Information and Communication Technology, vol 531. Springer, Cham. 108-120. DOI: 10.1007\/978-3-319-99734-6_9\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Nikiforov A., Budzko V. Standardization of Ensuring Information Security for Big Data Technologies. Proceedings of 2018 6th International Conference on Future Internet of Things and Cloud (FiCloud2018). Barcelona (Spain), 6-8 August 2018. Pp. 56-63. DOI 10.1109\/W-FiCloud.2018.00015 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Plaksiy K., Nikiforov A., Miloslavskaya N. Applying Big Data Technologies to Detect Cases of Money Laundering and Counter Financing of Terrorism. Proceedings of 2018 6th International Conference on Future Internet of Things and Cloud (FiCloud2018). Barcelona (Spain), 6-8 August 2018. Pp. 70-77. DOI 10.1109\/W-FiCloud.2018.00017 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Remote Attacks Taxonomy and their Key Verbal Indicators. Proceedings of the 8<sup>th<\/sup> Annual International Conference on Biologically Inspired Cognitive Architectures (BICA 2017). Moscow (Russia), 1-6 August 2017. Procedia Computer Science. 2018. Vol. 123. Pp. 278-284. DOI: 10.1016\/j.procs.2018.01.043\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. (2018) Analysis of SIEM Systems and Their Usage in Security Operations and Security Intelligence Centers. In: Samsonovich A., Klimov V. (eds) Biologically Inspired Cognitive Architectures (BICA) for Young Scientists. BICA 2017. Advances in Intelligent Systems and Computing, 2018, vol 636. Springer, Cham. 282-288. DOI: 10.1007\/978-3-319-63940-6_40 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstaya S. (2018) Organization\u2019s Business Continuity in Cyberspace. In: Samsonovich A., Klimov V. (eds) Biologically Inspired Cognitive Architectures (BICA) for Young Scientists. BICA 2017. Advances in Intelligent Systems and Computing, 2018, vol 636. Springer, Cham. 289-295. DOI: 10.1007\/978-3-319-63940-6_41 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Morozov V., Miloslavskaya N. (2018) DLP Systems as a Modern Information Security Control. In: Samsonovich A., Klimov V. (eds) Biologically Inspired Cognitive Architectures (BICA) for Young Scientists. BICA 2017. Advances in Intelligent Systems and Computing, 2018, vol 636. Springer, Cham. 296-301. DOI: 10.1007\/978-3-319-63940-6_42 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Security Intelligence Centers for Big Data Processing. Proceedings of 2017 5th International Conference on Future Internet of Things and Cloud Workshops. The 4th International Symposium on Big Data Research and Innovation (BigR&amp;I-2017). Prague (Czech Republic), 21-23 August 2017. Springer. 2018. Pp. 7-13. DOI 10.1109\/W-FiCloud.2017.7 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Visualization of Information Security Management Processes (article). Scientific Visualization. Vol. 9, Iss. 5, 2017, Pp. 117-136\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., A.Tolstoy. Ensuring Information Security for Internet of Things. Proceedings of 2017 5th International Conference on Future Internet of Things and Cloud (FiCloud2017). Prague (Czech Republic), 21-23 August 2017. Pp. 62-69. DOI 10.1109\/FiCloud.2017.17 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Zaytsev A., Malyuk A., Miloslavskaya N. Critical Analysis in the Research Area of Insider Threats. Proceedings of 2017 5th International Conference on Future Internet of Things and Cloud (FiCloud2017). Prague (Czech Republic), 21-23 August 2017. Pp. 288-296. DOI 10.1109\/FiCloud.2017.16 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya, V.Morozov, A.Tolstoy, D.Khassan. DLP as an Integral Part of Network Security Intelligence Center. Proceedings of 2017 5th International Conference on Future Internet of Things and Cloud (FiCloud2017). Prague (Czech Republic), 21-23 August 2017. Pp. 297-304. DOI 10.1109\/FiCloud.2017.15 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Bishop M., Futcher L., Miloslavskaya N., Theocharidou M. Preface. In: Bishop M., Futcher L., Miloslavskaya N., Theocharidou M. (eds) Information Security Education for a Global Digital Society. WISE 2017. IFIP Advances in Information and Communication Technology, Vol. 503. Springer <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Designing Degree Programmes for Bachelors and Masters in Information Security. . In: Bishop M., Futcher L., Miloslavskaya N., Theocharidou M. (eds) Information Security Education for a Global Digital Society. WISE 2017. IFIP Advances in Information and Communication Technology, Vol. 503. Springer. Pp. 14-26. DOI: 10.1007\/978-3-319-58553-6_2 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. ISO\/IEC Competence Requirements for Information Security Professionals. . In: Bishop M., Futcher L., Miloslavskaya N., Theocharidou M. (eds) Information Security Education for a Global Digital Society. WISE 2017. IFIP Advances in Information and Communication Technology, Vol. 503. Springer. Pp. 135-146. DOI: 10.1007\/978-3-319-58553-6_12 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A., Migalin A. \u201cNetwork Security Intelligence\u201d Educational and Research Center. In: Bishop M., Futcher L., Miloslavskaya N., Theocharidou M. (eds) Information Security Education for a Global Digital Society. WISE 2017. IFIP Advances in Information and Communication Technology, Vol. 503. Springer. Pp. 157-168. DOI: 10.1007\/978-3-319-58553-6_14 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N. SOC- and SIC-Based Information Security Monitoring. A. Rocha et al. (eds.), Recent Advances in Information Systems and Technologies, Advances in Intelligent Systems and Computing 570, Springer International Publishing AG 2017. Pp. 364-374. DOI: 10.1007\/978-3-319-56538-5_37 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Zaytsev A., Malyuk A., Miloslavskaya N. Analysis of Research on Specific Insider Information Security Threats. A. Rocha et al. (eds.), Recent Advances in Information Systems and Technologies, Advances in Intelligent Systems and Computing 570, Springer International Publishing AG 2017. Pp. 725-735. DOI: 10.1007\/978-3-319-56538-5_73 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Malyuk \u0410., Miloslavskaya N. Information Security and Expert\u2019s Knowledge Autoformalization. 7th Annual International Conference on Biologically Inspired Cognitive Architectures (BICA 2016). July 2016, NY, USA. Procedia Computer Science. Elsevier. 2016. Vol. 88. Pp. 288-293. DOI: 10.1016\/j.procs.2016.07.437 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Big Data, Fast Data and Data Lake Concepts. 7th Annual International Conference on Biologically Inspired Cognitive Architectures (BICA 2016). July 2016, NY, USA. Procedia Computer Science. Elsevier. 2016. Vol. 88. Pp. 300-305. DOI: 10.1016\/j.procs.2016.07.439 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N. Security Operations Centers for Information Security Incident Management. Proceedings of the 4th International Conference\u00a0\u00abFuture Internet of Things and Cloud\u00bb (FiCloud 2016). Vienna (Austria), 22-24 August 2016. Pp. 131-138. DOI: 10.1109\/FiCloud.2016.26 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. State-Level Views on Professional Competencies in the Field of IoT and Cloud Information Security. Proceedings of 2016 4th International Conference on Future Internet of Things and Cloud Workshops. The 3rd International Symposium on Intercloud and IoT (ICI 2016). Vienna (Austria), 22-24 August 2016. Pp. 83-90. DOI: 10.1109\/W-FiCloud.2016.31 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Makhmudova A. Survey of Big Data Information Security. Proceedings of 2016 4th International Conference on Future Internet of Things and Cloud Workshops. The 3rd International Symposium on Big Data Research and Innovation (BigR&amp;I 2016). Vienna (Austria), 22-24 August 2016. Pp. 133-138. DOI: 10.1109\/W-FiCloud.2016.38 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Application of Big Data, Fast Data and Data Lake Concepts to Information Security Issues. Proceedings of 2016 4th International Conference on Future Internet of Things and Cloud Workshops. The 3rd International Symposium on Big Data Research and Innovation (BigR&amp;I 2016). Vienna (Austria), 22-24 August 2016. Pp. 148-153. DOI: 10.1109\/W-FiCloud.2016.41 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A., Zapechnikov S. Taxonomy for Unsecure Big Data Processing in Security Operations Centers. Proceedings of 2016 4th International Conference on Future Internet of Things and Cloud Workshops. The 3rd International Symposium on Big Data Research and Innovation (BigR&amp;I 2016). Vienna (Austria), 22-24 August 2016. Pp. 154-159. DOI: \u00a0 10.1109\/W-FiCloud.2016.42 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A., Zapechnikov S. Taxonomy for Unsecure Digital Information Processing. Proceedings of the 3rd International Conference on Digital Information Processing, Data Mining and Wireless Communications (DIPDMWC2016). Moscow, Russia, July 6-8, 2016. Pp. 81-86. DOI: 10.1109\/DIPDMWC.2016.7529368 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Staffing Policy for Information Security Maintenance Tasks Solution. Proceedings of the 3rd International Conference on Digital Information Processing, Data Mining and Wireless Communications (DIPDMWC2016). 1st International Workshop on Education for Secure Digital Information Processing, Data Mining and Wireless Communications (ESDIPDMWC2016). Moscow, Russia, July 6-8, 2016. Pp. 256-261. DOI: 10.1109\/DIPDMWC.2016.7529399 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Malyuk A., Miloslavskaya N. Cybersecurity Culture as an Element of IT Professional Training. Proceedings of the 3rd International Conference on Digital Information Processing, Data Mining and Wireless Communications (DIPDMWC2016). 1st International Workshop on Education for Secure Digital Information Processing, Data Mining and Wireless Communications (ESDIPDMWC2016). Moscow, Russia, July 6-8, 2016. Pp. 205-210. DOI: 10.1109\/DIPDMWC.2016.7529390 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Ismukhamedova A., Satimova Y., Nikiforov A., Miloslavskaya N. Practical Studying of Wi-Fi Network Vulnerabilities. Proceedings of the 3rd International Conference on Digital Information Processing, Data Mining and Wireless Communications (DIPDMWC2016). 1st International Workshop on Education for Secure Digital Information Processing, Data Mining and Wireless Communications (ESDIPDMWC2016). Moscow, Russia, July 6-8, 2016. Pp. 227-232. DOI: 10.1109\/DIPDMWC.2016.7529394 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Melnikov D., Petrov V., Miloslavskaya N., Durakovskiy A., Kondratieva T. Cybertrust in E-Learning Environment based on Network Time Synchronization. Proceedings of the 8th International Conference on Computer Supported Education (CSEDU 2016), 21-23 April 2016. Rome (Italy). Pp. 402-407. DOI: 10.5220\/0005874904020407 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Zapechnikov S., Miloslavskaya N., Tolstoy A. Analysis of Intrusion Detection and Prevention Systems as Queueing Services. Proceedings of the 30<sup>th<\/sup> IEEE International Conference on Advanced Information Networking and Applications (AINA-2016), the 1-st International Workshop on Security, Trust, Privacy and Analytics (STPA-2016). Le R\u00e9gent Congress Centre, Crans-Montana, Switzerland, March 23-25, 2016. DOI: 10.1109\/WAINA.2016.53. Pp. 855-860. <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A., Petrov V. Secure e-Learning Portal for Teaching Business Continuity and Information Security Management. Proceedings of the 8th International Conference on Security of Information and Networks (SIN2015), Sochi, Russia, 8-10 September 2015. ACM ISBN: 978-1-4503-3453-2. Pp. 38-41. DOI: 10.1145\/2799979.2800020 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Zapechnikov S., Miloslavskaya N., Tolstoy A. Modeling of Next-Generation Firewalls as Queueing Services. Proceedings of the 8th International Conference on Security of Information and Networks (SIN2015), Sochi, Russia, 8-10 September 2015. ACM ISBN: 978-1-4503-3453-2. Pp. 250-257. DOI: 10.1145\/2799979.2799997 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Malyuk A., Miloslavskaya N.\u00a0Information Security Theory for the Future Internet. Proceedings of the 3rd international conference\u00a0\u00abFuture Internet of Things and Cloud\u00bb (FiCloud 2015). Rome (Italy), 24-26 August 2015. Pp. 150-157. DOI: 10.1109\/FiCloud.2015.12\u00a0<span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Zapechnikov S., Miloslavskaya N., Tolstoy A. Analysis of Hypoexponential Computing Services for Big Data Processing. Proceedings\u00a0of the 2nd international symposium\u00a0\u00abBig Data Research and Innovation\u00bb (BigR&amp;I 2015).\u00a0 Rome (Italy), 24-26 August 2015. Pp. 579-584. DOI:10.1109\/FiCloud.2015.57 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Stupnikov S., Miloslavskaya N., Budzko V. Unification of Graph Data Models for Heterogeneous Security Information Resources\u2019 Integration. Proceedings of the 2nd international conference\u00a0 \u00abOpen and Big Data Research and Innovations\u00bb (OBD 2015). Rome (Italy), 24-26 August 2015. Pp. 457-464. DOI:10.1109\/FiCloud.2015.13 <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Zapechnikov S., Miloslavskaya N., Budzko V. On Experience of Using Distance Learning Technologies for Teaching Cryptology. In book: Information Security Education Across the Curriculum. IFIP Advances in Information and Communication Technology. 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings. ISBN 978-3-319-18499-9. ISSN 1868-4238. Springer International Publishing. Volume 453, 2015, pp 111-121. DOI:10.1007\/978-3-319-18500-2_10. <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Tolstoy A., Miloslavskaya N. Professional Competencies Level Assessment for Training of Masters in Information Security. In book: Information Security Education Across the Curriculum. IFIP Advances in Information and Communication Technology. 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings. ISBN 978-3-319-18499-9. ISSN 1868-4238. Springer International Publishing. Volume 453, 2015, pp. 135-145. DOI:10.1007\/978-3-319-18500-2_12. <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Bishop, M., Miloslavskaya, N., Theocharidou, M. Information Security Education Across the Curriculum: 9th IFIP WG 11.8 World Conference, WISE9 Hamburg, Germany, May 26-28, 2015 Proceedings. ISBN 978-3-319-18499-9. ISSN 1868-4238. Springer International Publishing. Volume 453, 2015. DOI: 10.1007\/978-3-319-18500-2. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Bishop, M., Miloslavskaya, N., Theocharidou, M. Preface (Editorial). In book: Information Security Education Across the Curriculum. IFIP Advances in Information and Communication Technology. 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings. ISBN 978-3-319-18499-9. ISSN 1868-4238. Springer International Publishing. Volume 453, 2015, page V. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Zapechnikov S., Tolstoy A., Nagibin S. History of Cryptography in Syllabus on Information Security Training. In book: Information Security Education Across the Curriculum. IFIP Advances in Information and Communication Technology. 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings. ISBN 978-3-319-18499-9. ISSN 1868-4238. Springer International Publishing. Volume 453, 2015, pp. 146-157. DOI:10.1007\/978-3-319-18500-2_13.\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Petrov V., Miloslavskaya N., Durakovskiy A., Gorbatov V. Problem of Trust in E-Learning Environment. Proceedings of the 7th International Conference on Computer Supported Education (CSEDU 2015), 23-25 May 2015, Lisboa (Portugal). \u2013 Vol. 1. Pp. 424-429.\u00a0DOI: 10.5220\/0005477604240429\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Chernyavskiy D., Miloslavskaya N. An Approach to Information Security Policy Modeling for Enterprise Networks. Proceedings of the 15th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2014), 25-26 September 2014, Aveiro (Portugal). Lecture Notes in Computer Science. Volume 8735, 2014. Pp. 118-127. DOI: 0.1007\/978-3-662-44885-4_10 <span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Senatorov \u041c., Tolstoy \u0410, Zapechnikov S. Information Security Maintenance Issues for Big Security-Related Data. Proceedings of 2014 International Conference on Future Internet of Things and Cloud FiCloud 2014. International Simposium on Big Data Research and Innovation (BigR&amp;I). 27-29 August 2014. Barcelona (Spain).\u00a0Pp. 361-366. ISBN: 978-1-4799-4357-9\/14. DOI:10.1109\/ FiCloud.2014.64\u00a0<span style=\"color: #993366;\"><i><em>(Scopus\/WebofKnowledge)<\/em><\/i><\/span><\/li>\n<li>Miloslavskaya N., Senatorov \u041c., Tolstoy \u0410, Zapechnikov S. Big Data Information Security Maintenance. Proceedings of the 7th International Conference on Security of Information and Networks (SIN2014), 9-11 September 2014, Glasgow (UK). Pp. 89-94.\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Malyuk A., Miloslavskaya N. Information Security Theory Development. Proceedings of the 7th International Conference on Security of Information and Networks (SIN2014), 9-11 September 2014, Glasgow (UK). Pp. 52-55. <span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A., Birjukov A. Information Visualization in Information Security Management for Enterprises\u2019s Information Infrastructure. \u2013 Scientific Visualization. \u2013 Moscow, NRNU MEPhI, 2014. Vol. 6, No 2. Pp. 74-91.\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Petrov V., Tolstoy A. Security Aspects for E-Learning Portals. Proceedings of the 6th International Conference on Computer Supported Education (CSEDU 2014), 1-3 April 2014.\u00a0Barselona (Spain).\u00a0\u0420p. 427-432.\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergei Zapechnikov: &#8220;Business Continuity and Information Security Maintenance&#8221; Masters&#8217; Training Program. IFIP Advances in Information and Communication Technology ISBN 978-3-642-39376-1. Ronald C. Dodge Jr., Lynn Futcher (Eds.): Information Assurance and Security Education and Training &#8211; 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, 8-10 July 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10 2011, and WISE 6, Bento Gon\u00e7alves, RS, Brazil, 27-31 July 2009, Revised Selected Papers. Springer 2013. Vol. 406. Pp. 95-102. DOI: 10.1007\/978-3-642-39377-8_10\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Natalia G. Miloslavskaya, Alexander I. Tolstoy: Information Security Specialist Training on the Basis of ISO\/IEC 27002. IFIP Advances in Information and Communication Technology ISBN 978-3-642-39376-1. Ronald C. Dodge Jr., Lynn Futcher (Eds.): Information Assurance and Security Education and Training &#8211; 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, 8-10 July 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10 2011, and WISE 6, Bento Gon\u00e7alves, RS, Brazil, 27-31 July 2009, Revised Selected Papers. Springer 2013. Vol. 406. Pp. 273-279. DOI: 10.1007\/978-3-642-39377-8_32\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Chernyavskiy D., Miloslavskaya N. A Concept of Unification of Network Security Policies. Proceedings of the 5th International Conference on Security of Information and Networks (SIN2012), Jaipur, India, 22-27 October 2012. Pp.27-32.<span style=\"color: #993366;\">\u00a0<em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Bachelor of Information Security (\u2015Automated Systems SecurityProfile). Proceedings of the 3rd International Conference on Security of Information and Networks. 7-11 September 2010, Taganrog, Russia. Pp. 32-37.\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Kostina A., Miloslavskaya N., Tolstoy \u0410. Information Security Incident Management Process. Proceedings of the 2nd International Conference on Security of Information and Networks. 6-10 October 2009, Famagusta, North Cyprus. by Elci, A., Orgun, M.A., &amp; Chefranov, A. (eds.) Association for Computing Machinery, New York, USA, 2009. ISBN: 978-1-60558-412-6. Pp. 93-97.\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Kurilo A., Miloslavskaya N., Tolstaya S. Ensuring Information Security Controls for the Russian Banking Organizations. Proceedings of the 2nd International Conference on Security of Information and Networks. 6-10 October 2009, Famagusta, North Cyprus. by Elci, A., Orgun, M.A., &amp; Chefranov, A. (eds.) Association for Computing Machinery, New York, USA, 2009. ISBN: 978-1-60558-412-6. Pp. 56-60.<span style=\"color: #993366;\"><em>\u00a0(Scopus)<\/em><\/span><\/li>\n<li>Kostina A., Miloslavskaya N., Tolstoy \u0410. Information Security Incident Management. Proceedings of the 3rd International Conference on Internet Technologies and Applications.\u00a08-11 Sept 2009, Wrexham, UK. Pp.27-34.\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Kurilo A.P., Miloslavskaya N.G., Tolstoy A.I. Information Security Specialist Training for the Banking Sphere. Proceedings of the 5th World Conference on Information Security Education WISE5. USA, US Military Academy at West Point, 19-21 June 2007. Pp. 87-93.\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy \u0410., Ushakov D. Protocol of Secure Mutual Authentication. Proceedings of the 8th IEEE SMC Information Assurance Workshop. West Point, New York, USA, 20-22 June 2007. Pp. 43-48.\u00a0<span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Tolstoy A., Miloslavskaya N., Nikolaenko D., Veligodskiy S. Intranet Portal Security. Proceedings of the 1st International Conference on Internet Technologies and Applications. 7-9 Sept 2005, Wrexham, UK. Pp. 318-328.\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Ushakov D. Authentication Protocol in Information Systems. Proceedings of the 1st\u00a0International Conference on Internet Technologies and Applications. 7-9 September 2005, Wrexham, UK. Pp. 329-339.\u00a0<span style=\"color: #993366;\"><em>(Scopus)<\/em><\/span><\/li>\n<li>Gorbatov V., Maluk A., Miloslavskaya N., Tolstoy A. Highly Qualified Information Security Personnel Training in Russia. Proceedings of the 8th\u00a0IFIP World Computer Congress&#8221;, 19th\u00a0International Workshop on Information Security. Toulouse (France), 22-27 August 2004. &#8220;Information Security Management, Education and Privacy&#8221; Volume. Kluwer Academic Publishers. Pp.141-146.\u00a0<span style=\"color: #993366;\"><em>(WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A., Ushakov D. Laboratory Support for Information Security Education. Proceedings of the 8th\u00a0IFIP World Computer Congress&#8221;, 19th International\u00a0Workshop on Information Security. Toulouse (France), 22-27 August 2004. &#8220;Information Security Management, Education and Privacy&#8221; Volume. Kluwer Academic Publishers. Pp.101-115.\u00a0<span style=\"color: #993366;\"><em>(Scopus\/WebofKnowledge)<\/em><\/span><\/li>\n<li>Miloslavskaya N., Tolstoy A. Network Security Scientific and Research Laboratory. Proceedings of the 3st World Conference on Information Security Education WISE3. USA, Monterey, 2003. <span style=\"color: #993366;\"><em>(<span style=\"color: #993366;\">Scopus\/WebofKnowledge<\/span>)<\/em><\/span><\/li>\n<li>Maluk A., Miloslavskaya N., Tolstoy A. Teaching Undergraduate Information Assurance in Russia. Proceedings of the 3st World Conference on Information Security Education WISE3. USA, Monterey, 2003. <span style=\"color: #993366;\"><em>(<span style=\"color: #993366;\">Scopus\/WebofKnowledge<\/span>)<\/em><\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Chekhovskoy Y., Plaksiy K., Nikiforov A., Miloslavskaya N. The Use of Virtual Reality Technologies in the Specialists\u2019 Training in the Field of Information Security. In: F\u00e9lix Francisco Ramos Corchado and Alexei V. Samsonovich (Eds.). 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence: The 13th Annual Meeting of the BICA Society. Procedia Computer &#8230; <a title=\"Scopus \u0438 Web of Science\" class=\"read-more\" href=\"https:\/\/kaf44.mephi.ru\/?page_id=108\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":91,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/pages\/108"}],"collection":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=108"}],"version-history":[{"count":124,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/pages\/108\/revisions"}],"predecessor-version":[{"id":2213,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/pages\/108\/revisions\/2213"}],"up":[{"embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/pages\/91"}],"wp:attachment":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}