{"id":11359,"date":"2022-03-19T02:41:28","date_gmt":"2022-03-19T00:41:28","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=11359"},"modified":"2022-03-19T02:41:28","modified_gmt":"2022-03-19T00:41:28","slug":"imitaczijne-modelyuvannya-roboty-grupy-reaguvannya-na-inczydenty-informaczijnoyi-bezpeky-pry-kiberatakah","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=11359","title":{"rendered":"\u0406\u043c\u0456\u0442\u0430\u0446\u0456\u0439\u043d\u0435 \u043c\u043e\u0434\u0435\u043b\u044e\u0432\u0430\u043d\u043d\u044f \u0440\u043e\u0431\u043e\u0442\u0438 \u0433\u0440\u0443\u043f\u0438 \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043f\u0440\u0438 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430\u0445"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0406\u041c\u0406\u0422\u0410\u0426\u0406\u0419\u041d\u0415 \u041c\u041e\u0414\u0415\u041b\u042e\u0412\u0410\u041d\u041d\u042f \u0420\u041e\u0411\u041e\u0422\u0418 \u0413\u0420\u0423\u041f\u0418 \u0420\u0415\u0410\u0413\u0423\u0412\u0410\u041d\u041d\u042f \u041d\u0410 \u0406\u041d\u0426\u0418\u0414\u0415\u041d\u0422\u0418 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u041e\u0407 \u0411\u0415\u0417\u041f\u0415\u041a\u0418 \u041f\u0420\u0418 \u041a\u0406\u0411\u0415\u0420\u0410\u0422\u0410\u041a\u0410\u0425<\/p>\n<p style=\"text-align: center;\">SIMULATION OF THE WORK OF THE INFORMATION SECURITY INCIDENT RESPONSE TEAM DURING CYBERATTACKS<\/p>\n<p><strong>\u00a0<\/strong><strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 115-123. \u041d\u043e\u043c\u0435\u0440: \u21166, 2021 (303)<\/strong> <a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2022\/03\/vknu-ts-2021-n6-303-115-123.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438<\/strong>:<br \/>\n\u0414\u042c\u041e\u0413\u0422\u0404\u0412\u0410 \u0406. \u041e.<br \/>\n\u0412\u0456\u043d\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID ID: 0000-0002-8567-6952<br \/>\ne-mail: <a href=\"mailto:iryna.djogtjeva@gmail.com\">iryna.djogtjeva@gmail.com<\/a><br \/>\n\u0428\u0418\u042f\u041d \u0410. \u0410.<br \/>\n\u0412\u0456\u043d\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID ID: 0000-0002-5418-1498<br \/>\ne-mail: <a href=\"mailto:anatoliy.a.shiyan@gmail.com\">anatoliy.a.shiyan@gmail.com<\/a><br \/>\nIryna DOHTIEVA, Anatoii SHYIAN<br \/>\nVinnytsia National Technical University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2021-303-6-115-123\">https:\/\/www.doi.org\/10.31891\/2307-5732-2021-303-6-115-123<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : <\/strong>05.11.2021 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430<\/strong><strong>\/<\/strong><strong>Printed<\/strong><strong> :<\/strong> 30.12.2021 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u041c\u0435\u0442\u043e\u044e \u0440\u043e\u0431\u043e\u0442\u0438 \u0454 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u0438\u0439 \u0430\u043d\u0430\u043b\u0456\u0437 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0456\u0432 \u0456\u043c\u0456\u0442\u0430\u0446\u0456\u0439\u043d\u043e\u0433\u043e \u043c\u043e\u0434\u0435\u043b\u044e\u0432\u0430\u043d\u043d\u044f \u0434\u0456\u044f\u043b\u044c\u043d\u043e\u0441\u0442\u0456 \u0433\u0440\u0443\u043f\u043e\u044e \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 (\u0413\u0420\u0406\u0406\u0411) \u0437\u0430\u043b\u0435\u0436\u043d\u043e \u0432\u0456\u0434 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0443 \u043f\u0456\u0434\u0432\u0438\u0449\u0435\u043d\u043d\u044f \u0456\u043d\u0442\u0435\u043d\u0441\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u043f\u043e\u0442\u043e\u043a\u0443 \u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0456\u0432 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438. \u0413\u0420\u0406\u0406\u0411 \u0440\u043e\u0437\u0433\u043b\u044f\u0434\u0430\u0454\u0442\u044c\u0441\u044f \u044f\u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043c\u0430\u0441\u043e\u0432\u043e\u0433\u043e \u043e\u0431\u0441\u043b\u0443\u0433\u043e\u0432\u0443\u0432\u0430\u043d\u043d\u044f \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u0437\u0440\u043e\u0441\u0442\u0430\u043d\u043d\u044f \u0456\u043d\u0442\u0435\u043d\u0441\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u043d\u0430\u0432\u0430\u043d\u0442\u0430\u0436\u0435\u043d\u043d\u044f. \u0412 \u044f\u043a\u043e\u0441\u0442\u0456 \u0432\u0445\u0456\u0434\u043d\u0438\u0445 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0456\u0432 \u0434\u043b\u044f \u0456\u043c\u0456\u0442\u0430\u0446\u0456\u0439\u043d\u043e\u0433\u043e \u043c\u043e\u0434\u0435\u043b\u044e\u0432\u0430\u043d\u043d\u044f \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043e \u0456\u043d\u0442\u0435\u043d\u0441\u0438\u0432\u043d\u0456\u0441\u0442\u044c \u043d\u0430\u0434\u0445\u043e\u0434\u0436\u0435\u043d\u043d\u044f \u0437\u0430\u044f\u0432\u043e\u043a, \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a\u0438 \u043d\u0430\u0440\u043e\u0441\u0442\u0430\u043d\u043d\u044f \u0456\u043d\u0442\u0435\u043d\u0441\u0438\u0432\u043d\u043e\u0441\u0442\u0456, \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a\u0438 \u043e\u0431\u0441\u043b\u0443\u0433\u043e\u0432\u0443\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u044f\u0432\u043e\u043a \u0413\u0420\u0406\u0406\u0411. \u0420\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u0430 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0430 \u0437\u0430\u0434\u0430\u0454 \u0432\u0438\u043f\u0430\u0434\u043a\u043e\u0432\u0456 \u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044f \u0446\u0438\u0445 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0456\u0432, \u0440\u043e\u0437\u043f\u043e\u0434\u0456\u043b\u0435\u043d\u0456 \u0437\u0430 \u043f\u043e\u043a\u0430\u0437\u043d\u0438\u043a\u043e\u0432\u0438\u043c \u0437\u0430\u043a\u043e\u043d\u043e\u043c. \u0414\u043b\u044f \u043a\u043e\u0436\u043d\u043e\u0433\u043e \u043d\u0430\u0431\u043e\u0440\u0443 \u0437\u043d\u0430\u0447\u0435\u043d\u044c \u0440\u043e\u0437\u0440\u0430\u0445\u043e\u0432\u0443\u0454\u0442\u044c\u0441\u044f \u043d\u0430\u0431\u0456\u0440 \u0441\u0442\u0430\u0446\u0456\u043e\u043d\u0430\u0440\u043d\u0438\u0445 \u0437\u043d\u0430\u0447\u0435\u043d\u044c, \u0449\u043e \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0437\u0443\u0454 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0456\u0441\u0442\u044c \u0440\u043e\u0431\u043e\u0442\u0438 \u0413\u0420\u0406\u0406\u0411, \u0432 \u044f\u043a\u043e\u0441\u0442\u0456 \u044f\u043a\u0438\u0445 \u0432\u0438\u0431\u0440\u0430\u043d\u043e \u0439\u043c\u043e\u0432\u0456\u0440\u043d\u043e\u0441\u0442\u0456 \u0440\u0435\u0436\u0438\u043c\u0456\u0432 \u0440\u043e\u0431\u043e\u0442\u0438 \u0442\u0430 \u043e\u0447\u0456\u043a\u0443\u0432\u0430\u043d\u043d\u044f. \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u0430 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u0438\u0439 \u0430\u043d\u0430\u043b\u0456\u0437 \u043e\u0442\u0440\u0438\u043c\u0430\u043d\u0438\u0445 \u0437\u043d\u0430\u0447\u0435\u043d\u044c. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0456 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043e\u0433\u043e \u0456\u043c\u0456\u0442\u0430\u0446\u0456\u0439\u043d\u043e\u0433\u043e \u043c\u043e\u0434\u0435\u043b\u044e\u0432\u0430\u043d\u043d\u044f \u043e\u0442\u0440\u0438\u043c\u0430\u043d\u0456 \u043a\u0456\u043b\u044c\u043a\u0456\u0441\u043d\u0456 \u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044f \u044f\u043a \u0434\u043b\u044f \u0441\u0435\u0440\u0435\u0434\u043d\u0456\u0445 \u0437\u043d\u0430\u0447\u0435\u043d\u044c, \u0442\u0430\u043a \u0456 \u0434\u043b\u044f \u043f\u043e\u043a\u0430\u0437\u043d\u0438\u043a\u0456\u0432 \u0432\u0430\u0440\u0456\u0430\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a, \u044f\u043a\u0456 \u043e\u043f\u0438\u0441\u0443\u044e\u0442\u044c \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0456\u0441\u0442\u044c \u0440\u043e\u0431\u043e\u0442\u0438 \u0413\u0420\u0406\u0406\u0411. \u041f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0435 \u0456\u043c\u0456\u0442\u0430\u0446\u0456\u0439\u043d\u0435 \u043c\u043e\u0434\u0435\u043b\u044e\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u0441\u0432\u0456\u0434\u0447\u0438\u043b\u043e \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0443\u0432\u0430\u0442\u0438 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u0438\u0445 \u0437\u0430\u043a\u043e\u043d\u043e\u043c\u0456\u0440\u043d\u043e\u0441\u0442\u0435\u0439 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a \u043d\u0430 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0456\u0441\u0442\u044c \u0440\u043e\u0431\u043e\u0442\u0438 \u0413\u0420\u0406\u0406\u0411.\u00a0 \u0412\u0456\u0434\u0441\u043b\u0456\u0434\u043a\u043e\u0432\u0443\u044e\u0447\u0438 \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u0456 \u0440\u043e\u0437\u0433\u043e\u0440\u0442\u0430\u043d\u043d\u044f \u043f\u043e\u0442\u043e\u0447\u043d\u043e\u0457 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u0456 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a\u0438 \u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0456\u0432, \u043c\u043e\u0436\u043d\u0430 \u0432\u0436\u0435 \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u0456 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043d\u044f \u043a\u0456\u0431\u0435\u0440\u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0437\u0430\u043c\u0456\u043d\u044e\u0432\u0430\u0442\u0438 \u043e\u0434\u043d\u0443 \u0413\u0420\u0406\u0406\u0411 \u043d\u0430 \u0456\u043d\u0448\u0443, \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u0456 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a\u0438 \u044f\u043a\u043e\u0457 \u0431\u0443\u0434\u0443\u0442\u044c \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0432\u0430\u0442\u0438 \u043f\u043e\u0442\u0440\u0456\u0431\u043d\u0438\u0439 \u0440\u0456\u0432\u0435\u043d\u044c \u0437\u0430\u0445\u0438\u0441\u0442\u0443. \u0414\u043b\u044f \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u0442\u0430\u043a\u043e\u0433\u043e \u043f\u0456\u0434\u0445\u043e\u0434\u0443 \u043c\u043e\u0436\u0435 \u0431\u0443\u0442\u0438 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043e \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u0438\u0439 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0438\u0439 \u0437\u0430\u0441\u0456\u0431.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430, \u0456\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u0433\u0440\u0443\u043f\u0430 \u0440\u0435\u0430\u0433\u0443\u0432\u0430\u043d\u043d\u044f, \u0441\u0442\u0430\u0446\u0456\u043e\u043d\u0430\u0440\u043d\u0438\u0439 \u0440\u0435\u0436\u0438\u043c, \u043f\u043e\u043a\u0430\u0437\u043d\u0438\u043a\u0438 \u0432\u0430\u0440\u0456\u0430\u0446\u0456\u0457.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The aim of the work is statistical analysis of the results of simulation modeling of the information security incident response team (ISIRT) depending on the parameter of increasing the intensity of the flow of information security incidents. ISIRT is considered as a queuing system in conditions of increasing load intensity. As input parameters for simulation the intensity of receipt of applications, characteristics of increase of intensity, characteristics of service of applications of ISIRT are used. The developed computer program sets random values of these parameters, distributed according to the indicator law. For each set of values, a set of stationary values is calculated, which characterizes the efficiency of ISIRT, as selected probabilities of operating modes and expectations. The program performs statistical analysis of the obtained values. As a result of the simulation, quantitative values were obtained both for the average values \u200b\u200band for the indicators of variability of characteristics that describe the effectiveness of ISIRT. The simulation showed the ability to predict the statistical patterns of cyber-attacks on the effectiveness of ISIRT. Tracking the statistical characteristics of incidents in the process of deploying the current cyber-attack, it is possible in the process of cyber defense to replace one ISIRT with another, the statistical characteristics of which will provide the required level of protection. To implement this approach, the developed software can be used.<br \/>\n<strong>Key words:<\/strong> cyber-attack, information security incident, response group, stationary mode, indicators of variation.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Report on the results of the system of vulnerability detection and response to cyber incidents and cyber attacks. Operational Center for Cyber Incident Response of the State Center for Cyber Defense and Counteraction to Cyber Threats. 2021. Available at: https:\/\/cert.gov.ua\/files\/pdf\/SOC_Annual_Report_2022.pdf (Accessed: 12 January 2022). (In Ukrainian).<\/li>\n<li>Oleksyuk L.V. Best practices of cybersecurity management. Review report. 2019. 130 p. Available at: file:\/\/\/C:\/Users\/User\/Downloads\/ Report_on_Cybersecurity_04.pdf. (Accessed: 12 January 2022). (In Ukrainian).<\/li>\n<li>On the decision of the National Security and Defense Council of Ukraine of May 14, 2021 \u201cOn the Cyber Security Strategy of Ukraine\u201d: Decree of the President of Ukraine; Strategy from 26.08.2021 \u2116 447\/2021 \/\/ Database \u201cLegislation of Ukraine\u201d. The Verkhovna Rada of Ukraine. Available at: https:\/\/zakon.rada.gov.ua\/go\/447\/2021. (Accessed: 12 January 2022). (In Ukrainian).<\/li>\n<li>Carley K.M.: Social cybersecurity: an emerging science. <em>Computational and Mathematical Organization Theory<\/em>, 2020, vol. 26(4), pp. 365\u2013381.<\/li>\n<li>Eltantawy N., Wiest J. The Arab Spring. Social Media in the Egyptian Revolution: Reconsidering resource mobilization theory. <em> J. Commun<\/em>, 2011, vol. 5, pp.1207\u20131224.<\/li>\n<li>Wolfsfeld G, Segev E, Sheafer T. Social media and the Arab Spring: Politics comes \ufb01rst. <em> J. Press\/Politics<\/em>, 2013, vol. 18, pp. 115\u2013137.<\/li>\n<li>Toraman C., \u015eahinu\u00e7 F., Yilmaz E. H. What Happened in Social Media during the 2020 BLM Movement? An Analysis of Deleted and Suspended Users in Twitter. \u00a02021. Available at: arXiv:2110.00070v1[cs.SI]. (Accessed: 12 January 2022).<\/li>\n<li>Ross B., Pilz L., Cabrera B.et al. Are social bots a real threat? An agent-based model of the spiral of silence to analyse the impact of manipulative actors in social networks. <em>European Journal of Information Systems<\/em>, 2019. vol. 28(4), pp. 394\u2013412.<\/li>\n<li>Ventsel\u2019 E.S., Ovcharov L.A. Teoriya sluchaynykh protsessov i yeyo inzhenernyye prilozheniya [Theory of random processes and its engineering applications]. Moscow, Nauka, 1991. 384 p.<\/li>\n<li>Holoskokov O.YE., Holoskokova A.O., Moshko YE.O. Osnovy teoriyi eksponentsial\u00a2nykh system masovoho obsluhovuvannya [Fundamentals of the theory of exponential queuing systems]. Kharkiv : NTU \u201cKhPI\u201d,, 2017. 312 p.<\/li>\n<li>Matalytskiy M., Khatskevich G. Teoriya veroyatnosti i matematicheskaya statistika [Probability theory and mathematical statistics]. LitRes, 2021. 350 p.<\/li>\n<li>Kel\u2019ton V., Lou A. Imitatsionnoye modelirovaniye. Klassika CS [Simulation modeling. CS classic]. Kiyev : Izdatel\u2019skaya gruppa BHV, 2004. 847 p.<\/li>\n<li>Kopey V.B. Mova prohramuvannya Python dlya inzheneriv i naukovtsiv [Python programming language for engineers and scientists]. Ivano-Frankivs\u2019k : IFNTUNH, 2019. 272 p.<\/li>\n<li>Lozhkovs\u2019kyy A.H. Teoriya masovoho obsluhovuvannya v telekomunikatsiyakh [Theory of queuing in telecommunications]. Odesa : ONAZ im. O.S. Popova, 2010. 112 p.<\/li>\n<li>Kononyuk A.Ye. Obobshchennaya teoriya modelirovaniya. Nachala. K1. CH.3. K.4 [Generalized modeling theory]. \u201cOsvita Ukrayiny\u201d, 2012. 568 p.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/11359"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11359"}],"version-history":[{"count":1,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/11359\/revisions"}],"predecessor-version":[{"id":11362,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/11359\/revisions\/11362"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}