Bibliography: 1. Korobets B. N., Minaev V. A., Sychev M. P. Information operations and modern information security culture challenges. Sistemy vysokoy dostupnosti. 2017, vol. 13, no. 3, pp. 38–46. [In Russ].
2. Lachikhina A. B., Petrakov A. A. Approaches and methods of information security control in industrial management. Voprosy radioelektroniki. 2017, no. 11, pp. 48–51. [In Russ].
3. Chen L., Xu L., Gao Z. On security analysis of proof-of-elapsed-time (PoET). International Symposium on Stabilization, Safety and Security of Distributed Systems. Springer, 2017, pp. 282–297. DOI: 10.1007/978-3-319-69084-1_19.
4. Zebari R. R., Zeebaree S. R. M., Jacksi K. Impact analysis of HTTP and SYN Flood DDoS Attacks on Apache 2 and IIS 10.0 Web Servers. International Conference on Advanced Science and Engineering (ICOASE). Duhok, Iraq, 2018, pp. 156–161.
5. Jucker A. H., Hausendorf H., Dürscheid C., Frick K., Hottiger C., Kesselheim W., Linke A., Meyer N., Steger A. Doing space in face-to-face interaction and on interactive multimodal platforms. Journal of Pragmatics. 2018, vol. 134, pp. 85–101.
6. Jiewu Leng, Hao Zhang, Douxi Yan, Qiang Liu, Xin Chen, Ding Zhang Digital twin-driven manufacturing cyber-physical system for parallel controlling of smart workshop. Journal of Ambient Intelligence and Humanized Computing. 2019, vol. 10, no. 3, pp. 1155–1166.
7. Nasir Q., Qasse I. A., Manar Abu Talib, Ali Bou Nassif Performance analysis of hyperledger fabric platforms. Security and Communication Networks. 2018, vol. 2018, article 3976093.
8. Vacca J. R. Computer and Information Security Handbook. Elsevier, 2017, 1280 p.
9. Samsonovich A., Klimov V., Miloslavskaya N. Stream data analytics for network attacks' prediction. Procedia Computer Science. 2020, vol. 169, pp. 57–62. DOI: 10.1016/j.procs.2020.02.114.
10. Miloslavskaya N. Information security management in SOCs and SICs. Journal of Intelligent & Fuzzy Systems. 2018, vol. 35, no. 3, pp. 2637– 2647. DOI: 10.3233/JIFS-169615.
11. Samsonovich A., Klimov V., Miloslavskaya N. Security zone infrastructure for network security intelligence centers. Procedia Computer Science. 2020, vol. 169, pp. 51–56. DOI: 10.1016/j.procs.2020.02.113.
12. Levonevskiy D. K., Vatamanyuk I. V., Malov D. A. Assurance of corporate intelligence services via the input data flow control. Programmnaya inzheneriya. 2019, vol. 10, no. 1, pp. 20—29. [In Russ]. DOI: 10.17587/рпп.10.20-29.