Научная статья на тему 'Approach to Determining the Parameters of Physical Security Units for a Critical Infrastructure Facility'

Approach to Determining the Parameters of Physical Security Units for a Critical Infrastructure Facility Текст научной статьи по специальности «Математика»

CC BY
214
65
i Надоели баннеры? Вы всегда можете отключить рекламу.
Область наук
Ключевые слова
security object / queuing system (QS) / nonordinary stream of malefactor groups / random number of malefactors in the group / non-Markov type QS / security personnel

Аннотация научной статьи по математике, автор научной работы — M.D. Katsman, V.K. Myronenko, V.I. Matsiuk, P.V. Lapin

The article discusses some common mathematical models of counterterrorism and acts of unlawful interference with protected objects. The use of methods of queuing theory of Markov and nonMarkov types for modeling the counteraction of security personnel by a malicious group with a random number of criminals in a group and different ways of organizing the actions of such personnel is proposed.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «Approach to Determining the Parameters of Physical Security Units for a Critical Infrastructure Facility»

M. Katsman, V. Myronenko, V. Matsyuk, P. Lapin RT&A, No 1 (61)

APPROACH TO DETERMINING THE PARAMETERS... Volume 16, March 2021

Approach to Determining the Parameters of Physical Security Units for a Critical Infrastructure Facility

M.D. Katsman

Doctor of Sci., Associate Professor, Security Department of JSC "Ukrainian Railways", Iezhy Hedroitsa str. 5, 03680, Kyiv, Ukraine, e-mail: [email protected]

V.K. Myronenko

Doctor of Sci., Professor, Head of Department of Railway commercial activities management, Faculty of Railway transport management, State University of infrastructure and technologies, 04071, Kyiv, Ukraine, e-mail: [email protected]

V.I. Matsiuk

Doctor of Sci., Professor, Department of transport technology and traffic process control, Faculty of Railway Transport Operation, State University of Infrastructure and Technology, Ivan Ogienko str., 19, Kyiv, 03049, Ukraine, e-mail: [email protected]

P.V. Lapin

M.D., PhD, MPH, Security Department of JSC "Ukrainian Railways", Iezhy Hedroitsa str. 5, 03680, Kyiv, Ukraine, e-mail: [email protected]

Abstract

The article discusses some common mathematical models of counterterrorism and acts of unlawful interference with protected objects. The use of methods of queuing theory of Markov and non-Markov types for modeling the counteraction of security personnel by a malicious group with a random number of criminals in a group and different ways of organizing the actions of such personnel is proposed.

Keywords: security object, queuing system (QS), nonordinary stream of malefactor groups, random number of malefactors in the group, non-Markov type QS, security personnel.

I. Introduction

Many scientific works are currently devoted to the problem of counter-terrorism and acts of illegal interference in the activities of critical infrastructure.

The classification of counter-terrorism models is reflected in [1], which provides an overview of current work on modeling the counter-terrorism system and proposes a classification of terrorism

and counter-terrorism models.

According to this paper the conceptual models include models developed by specialists in the subject area, political scientists, psychologists, sociologists. As an example, work is given [2], which provides empirical data on the decision-making patterns of members of terrorist organizations at different levels: strategic, tactical and operational, as well as at the level of the individual terrorist.

Models of analysis and synthesis are usually mathematical or physical models. In the review [3] more such works are characterized. In particular, in [4] the basis for the development of classification of terrorist groups using chemical, biological, radiological and nuclear weapons the heuristic method of pattern recognition, the method of classification trees and discriminant analysis were proposed. With regard to transport safety systems, a number of works are devoted to the analysis of devices to increase the probability of detection and reduce the intensity of false alarms. In [5], using Bayesian analysis, a method of threat ranking and prioritization of security measures for facilities is presented.

The complexity of real-world security situations requires the universality of the mathematical models used.

These requirements inevitably contradict the commonality and validity of the simulation results, so when solving models in the form of hierarchy (usually lower levels of hierarchy corresponds to a higher level of detail of the modeled systems description) or a horizontal chain, each element of which is approximately the same [6].

In [1] the levels of modeling (hierarchy of models) of counteraction to terrorism are considered in detail. Theoretical game models of counter-terrorism are presented in [7,8,9]. In [10], an approach to creating a mathematical model of the physical protection systems functioning of objects as a process of interaction of sets based on the theory of ordinary sets, fuzzy set theory and the analysis of hierarchies.

In [11], a mathematical model of describing the nature of the interaction between the components of the "defender - attacker" system as components of the "predator - victim" system is proposed. The model is a modified classic model of Lotki-Volterra competition, which allows you to assess changes in the level of danger for the object with a change in its security.

The use of fuzzy cognitive modeling to prevent risk situations in conditions of fuzzy source data at critical infrastructure facilities is considered in [12]. It proposes the management structure of NPPs in the form of a fuzzy cognitive model, scenarios of risk situations and their analysis.

In [13] the possibilities of application of models of operations research methods for planning of protection of objects of critical infrastructure are considered. Adaptation of these models includes taking into account the stochastic, informational and behavioral uncertainties of terrorists. In this paper, in particular, the generalizations of the tasks of the antagonistic game of attack and defense and the optimal distribution of protective resources are considered.

An example of the use of complex models with parameters measured on different scales is the game-theoretic model for security at Los Angeles international airport, on the basis of which the automated system "Assistant for randomized route control" (ARMOR) was developed and put into operation. [14]. Security is a very important factor in the protection of this facility, given the terrorist threat. However, limited resources do not allow security forces to monitor all facilities and routes around the clock. Terrorists are able to monitor and select unprotected routes and targets if security forces do not use randomized monitoring and patrol tactics.

II. Results and discussion

The authors formulate the basic requirements for ARMOR:

1. The system must take into account the weight of the protected objects. If an attack on the first object leads to economic damage and on the second to human casualties, more weight is given

to the second object. Weights are evaluated by experts and expressed on an ordinal scale.

2. The system must take into account all information about the enemy that is in the security

service.

3. The system should not offer a strict service schedule, taking into account additional information, the security service may make adjustments to this schedule. In [15] presented is a description of tests for ARMOR testing, which has been in operation since 2007. Such tests include:

- analysis on the basis of game theory (type of test Mathematic): with known matrices of winnings, the gain of the attacker and the probability of refusal to attempt an offense is calculated;

- resource allocation (test type - Mathematic): game theory helps to find the expected gain of the attacker in different security strategies;

- cost of protection (type of test - Mathematic): game theory helps to find the expected gain of the parties at change of security technologies (due to introduction of new technical means of protection, new technology of check of passengers and luggage);

- simulation of the attack (test type - Simulation): the use of additional simulation models;

- conducting exercises using "educational" criminals;

- Expert assessment (type of test - Qualitative): security specialists are able to assess many factors for their further consideration in the model as their parameters.

Since 2009, ARMOR has been used to plan air patrol services with the task of optimal distribution of 3000-4000 patrols on 29000 daily flights.

Thus, a wide range of mathematical models are used to model the physical security systems of objects.

In our opinion, in order to determine the effectiveness of the actions of the unit of protection of critical infrastructure, it is advisable to use the mathematical tools of the queuing theory.

Consider an object guarded by a security unit of n people as a queuing system. Groups of intruders with an intensity of A try to enter the object in order to endanger its safe operation. In general, the number of a group of attackers can be random, in other words, with a probability of as, the group can consist of s attackers.

That is, the n-channel queuing system (QS) receives a stream of A [groups / units of time] of group demands with a random number of demands in the group.

Such QS have found their application in mathematical models of information technology, which is reflected in the works [16-18].

One of the features of the QS under consideration is that the time tint of intruders on the

object is limited, it is a random variable that is subject to the exponential law with the parameter

i

tint

The parameter n is the intensity of demands leaving the QS service channel due to the restriction of their stay in the system.

1

The parameter ^ characterizes the system of counteraction = — [malefactor / unit of

tca

time], where tca is the average time of the guard's use of counteraction means to the malefactor.

Counteraction to intruders by the security unit can be organized in different ways, which determines the type of queuing system. The first group of QS includes:

1. M / M / n / m type QS with restriction (n * 0), without mutual assistance (h = n, g = 1), non-ordinary demands and a random number of demands in the group. Here, h is a value equal to the ratio of the total number of n guards (service channels) to the number of g guards, which are combined into a group to counter one attacker, ie n = n / g.

2. M / M / n / m type QS with restriction (n * 0), full mutual assistance (h = 1; g = n), non -ordinary demands and random number of demands in the group.

3. M / M / n / m type QS with restriction (n * 0), with partial mutual assistance (h = n / g), non-ordinary demands and a random number of demands in the group.

The second group includes QSs of the non-Markov type, which simulate the conditions

when the forces and means of protection are not on the site, for example, when it is necessary to

concentrate additional forces and means. That is, the counteraction process consists of two phases

lasting respectively tx - concentration time and tgr - time of counteraction means application,

_ 1 _

where tx has an exponential distribution with the parameter = — [guard / unit time], and t2 -

1

with parameter |i2 = — [malefactor / unit time].

tgr

That is, the total resistance time has a generalized Erlang distribution with parameters

and |j2.

Such QS have limitations n * 0, can be with different characteristics of mutual assistance, there is a queuing system with heterogeneous demands and a random number of demands in the group.

Some aspects of mathematical models of these QS are considered in [19-22]. Consider in more detail the QS of the first group.

1.1 M / M / n / m type QS with restriction (n * 0), without mutual assistance (h = n, g = 1), non-ordinary applications and random number of applications in the group.

Kolmogorov differential equations for the probabilities of states of these QS are:

dP0(t)

-P|(t) = -APo(t) + (^ + n)Pi(t); dP0(t)

= -(A + ^ + n)Pi(t) + AaiPo(t) + 2(^ + n)P2(t);

-P2O)

(1)

= -(X + 2^ + 2n)P2(t) + x/ sas P2-S(t) + 3(^ + n)P2(t);

(X ■ 2^ . 2n)P2(L)+X/ SaSP2-S(

S = 1 k

dPk(t)

.. . . . . . sa,

= -(X + k^ + kn)Pk(t) + X/ sas Pk-s(k + 1)(^ + n)Pk+i(t);

dt

s=1

At 1< k < n dPk(t)

n

= -(X + n^ + kn)Pk(t) + X/sas P(t)n-s(t) + [n^ + (k + 1)n]Pk+i(t);

dt

s=1

At k > n.

For stationary conditions the system of linear equations will be: 0 = -XPo + (^ + n)Pi; 0 = -(X + ^ + n)Pi + XaiPo + 2(^ + n)P2;

k

0 = -(X + k^) + kn)Pk + X/sas Pk-s + (k + 1)(^ + n)Pk+i (2)

s k-s

s=1

At 1< k < n;

k

0 = -(X + n^) + kn)Pk + X/sas Pk-s + [n^+)k + 1)n]p.

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

s=1

At k > n

Normalizing condition

//pk = 1.

k=0

1.2. M / M / n / m type QS with restriction (n * 0), full interaction (h = 1, g = n), non-ordinary demands and random number of demands in the group.

The peculiarities of this QMS functioning, and hence the organization of counteraction is:

- the first demand is served by all service channels with intensity ^ = n^ + n;

- the next demand is served by part of the service channels, others continue to service the previous demand, if it was not completed;

- after the completion of the service of any demand, the group of channels that has been vacated is connected to the service of demands that are in the system;

- in the Markov (Poisson) QS, the characteristics of the service do not depend on the distribution of channels between demands, only it would be uniform and all channels would participate in the service simultaneously [20];

- if there are already n applications in the system, then (n + 1) application stands in the queue. The system of differential equations of states probabilities has the form:

dP0(t)

^ = -MUt) + ^Pi(t); dPi(t)

= -(X + ^)Pi(t) + MaiPo(t) + 2^*P2(t);

2

dP2 (t) v1

= -(X + 2^(9 + sas P2-S(t) + 3^*P3(t); (3)

s=1

dPk(t)

= -(X + k^)Pk(t) + X^ sas Pk-s(t) + (k+ lKPk+i(t);

s=i

npu 1 < k < n;

dPk(t)

dt = -(X + n^* + kn)Pk(t) + sas Pn-s(t) + [n^ + (k + 1)n]Pk+i(t);

s=i

At k > n.

1.3. M / M / n / m type QS with restriction (n * 0), partial interaction (h = n / g), extraordinary applications and random number of applications in the group.

The system of differential equations of probabilities of states of the system will be as

follows: dP0(t)

^ = -XPo(t) + MgPi(t);

^g = g^ + n;

dPi(t)

= -(X + Mg)Pi(t) + XaiPo(t) + 2^(t);

2

dP2(t)

dt

= -(X + 2^g)P2(t) + X^ sas P2-s(t) + 3^0);

dP(t) = -(X + iMg)Px(t) + X^ sas Pi-s(t) + (i + 1)MgPi+n

s=i

At 0 < i < h

= -(X + iMg)Pi(t) + X^ sas Pi-s(t) + (i + 1)MgPi+i(t); (4)

dPh(t) V1

= -(X + n^)Ph(t) + X^ sas Ph-s(t) + (n^ +(h + 1)n)Ph+i(t);

s=i

h+i

dPh+i(t) V

h+t = -(X + h^g + n)Ph+i(t) +X^ sas P(h+i)-s(t) + (h^g + 2n)Ph+2(t)

s=i

k

s=i

M. Katsman, V. Myronenko, V. Matsyuk, P. Lapin RT&A, No 1 (61)

APPROACH TO DETERMINING THE PARAMETERS... Volume 16, March 2021

dp(t) = -(Я + - h)n)Pj(t) + Я^ sas Pj-s(t) + (h^g + (j - h + 1)n)Pj+i(t)

dt

s=1

At h < j < n dPk(t)

dt = -(Я + n^g)Pn(t) + sas Pn-s(t) + (n^g + n)Pn+i(t)

s=1

At k > n.

The probability of intruders entering the object due to the fact that the guards do not have time to counter intruders can be calculated from the formula:

Pint = Mj=i kak (5)

The probability that the intruders will be neutralized will be:

Pneut = 1 — Pint. (6)

We will consider the QS of the second type on the example of the queuing system M / E2 / n / m with restriction (n * 0), without mutual assistance, with non-ordinary demands and a random number of demands in the group.

The system of differential equations of probabilities of states of these QS has the form:

-Poo 00

= -APoo(t) + ^(t);

-P1-1t(t)

= -(A + ^)Pn(t) + AaiPoo(t) + 2^0);

-P2i(t)

dt =-(X+^2)P2i(t) + MlPii(t);

dP12(t)

= — (Я + 2^i)Pi2(t) + XaiPii(t) + 2Xa2Poo(t) + З^ЪзО) + X^t);

dt dP22(t)

-' ' ^ '^2)p22(l) + 2^Lri2

dt

= -(X + 2^2)P22(t) + 2^1Pi2(t); (7)

k

k

dPik(t) v

= - (Я + k^l)Pik(t) + Я^ sasPi(k-s) (t) +

s=i

+ [(k + 1)^2 + n]P2(k+i)(t) + XP2(k-i)(t) dP2k(t)

= — (Я + k^2)P2k(t) + k^1Pik(t); At k = n

= -(Я + пцЦ + kn)Pik(t) +X^sasPi(k-s)(t) +XP2(k-i)(t) +

k

dPik(t)

dt = -(Я + ПЙ + kn)Pik(t) +X^sasri(k-s)(

s=i

+ (w2 +kn)P2(k+i) dP2k(t)

= - (Я + n^l + kn)P2k(t) + (n^l + kn)Pik(t)

At k > n

The mathematical model of SMO M / E2 / n / m is considered in detail in [22]. The queuing system, which consists of QS of the first and second types, simulates a multi-stage counteraction to groups of attackers.

The probabilities of penetration and neutralization of attackers can be calculated from the formulas (5) and (6). A multistage counteraction QS structure is shown in Fig.1.

Figure 1: Multistage counteraction QS

The following equations will take place in stationary mode: A1= A01; A2= A02;

A2 = A01(1- Pneut) = A(1- Pneut1)= APintl; A01 = A01(1- Pneut1)^P1-nit2= APinthP-!,; A2 = A02(1- Pneut2)=A(1- Pneutl) (1- Pneut2)- Pneut2

1 = APintl • APint2 •P"1„

(8)

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

Conditions of QS stationary work:

X

toi =

ni(^i +ni)

< 1;

XPint1 ^ .

= —;-t < 1;

^(^2 +n2)

(9)

Total mathematical expectation of the demand staying in the QS:

t = (tQS1 + tQS2)P

int2 •

Consider an example.

An object guarded by a three-person security unit (n = 3) is attacked by a group of intruders with a rate of A = 1 [group / unit time]. Each group with a probability of as can have a different number of attackers. The distribution law of the number of malefactors in the group is uniform, i.e. with a probability of 0.2 in the group there can be 1,2,3,4 or 5 malefactors: a1 = a2 = a3

= a4 = a5 = 0.2. The time spent by intruders on the object tint is a limited random variable that is

i

subject to the exponential law with the parameter n = -—.

tint

i

Intensity of counteraction by guards is n = — [malefactors neutralized by guard / unit of

tgr

time].

It is necessary to determine the probability of neutralizing intruders/ malefactors by protecting the object at different ratios A: |j: n.

Figure 2 shows the object protection QS for the example under consideration.

3|* + 2^

Figure 3: Object protection QS for the example under consideration

Kolmogorov's differential equations for the probabilities of the states of these QS will be: dPi(t)

dt dp (t) dt dP2(t) dt dP,(t) dt dP4(t) dt dP5(t) dt

= -X^(t) + ^p(t)

= -(X+^')p(t)+^aPo(t)+2|P2(t) = -(X + 2| + 2^)P2(t) + Xa,P,(t) + 2Xa2P0(t) + 3|*P3(t)

= -(X + 3| + 3^)P3(t) + XaP(t) + 2Xa2P(t) + 3Xa3P(t) + 3Xa3P0(t) + (3| + 4n)p(t) = -(X + 3| + 4^)P4(t) + XaP(t) + 2Xa2P2(t) + 3X^p(t) + 4Xa4P0(t) + (3| + 5^)P5(t) = -(X + 3| + 5^)P5 + XaP(t) + 2Xa2P3(t) + 3Xa3P2(t) + 4Xa4P(t) + 5Xa5P0(t) + (3| + 6^)P6(t)

(10)

Normalizing condition ££=0 = 1;^* = |j+n. For stationary operating conditions of these QS, the linear equations have the form

0 = -XP0(t) +

0 = -(X + ^*)P + Xa,P0 + 2|TP2

0 = -(X + 2|)P2 + Xa,P, + 2Xa2P0 + 3|*P3 _ (11)

0 = -(X+3|)P3 + XatP2 + 2Xa2Pt + 3Xa3Pt + 3Xa3P0 + (3|+r|)P4 _ 0 = -(X + 3| + r|)P4 + Xa,P3 + 2Xa2P2 + 3Xa3P, + 4Xa4P0 + (3| + 2^)P5 _ 0 = -(X+3| + 2r|)P5 + Xa,P4+2Xa2P3+3Xa3P2 + 4Xa4P, + 5Xa5P0 + (3|+3r|)P6

The Pntr probability was determined from formulas (5,6). Figure 3 shows the graph of the dependence of the Pntr probability at different values of ^ and n.

1,00 — X = 1

= 0.05

0,95 — = 0.15

0,90 — = 0.25

10,85 —

Ch

0,80

0,75 —

0,70 —

n = 0.05 n = 0.15 n = 0.25

Figure 3: Probability of attackers' neutralization against the counteraction intensity

From Figure 3 it is seen that with increasing the counteraction intensity, the value of the Pntr probability increases even with a decrease in the time spent by intruders on the protected object.

III. Conclusion

The use of models of protection of critical infrastructure from unauthorized interference acts will determine the rational ratios of the quantitative composition of security units, the intensity of countermeasures and concentration of additional security forces against the intensity of penetration of malicious groups with a random number of attackers, ensuring an acceptable probability of detection, prevention and neutralization of such groups.

References

[1] Shumov V.V. Models against terrorism: classification. Trudy ISA RAN. Vol 62, 3/2012, pp.106-115 (In Russian).

[2] Social Science for Counterterrorism. Putting the Pieces Together/Davis P.K., Cragin K., Editors. RAND Corporation, 2009.

[3] Wright P.D, Liberatore M.I., Nydick R.L, A Survey of Operations Reserch Models and Application in Homeland Security/Interfaces, 2006.V.36, №6, pp.514-529.

[4] Sullivan T.J., Perry W.L. Identifying indicators of chemical, biological, radiological and nuclear (CBRN) Weapons development activity in sub-national terrorist group/ J. Oper. Res. Soc. 2004, N 55 (4), PP. 361-374.

[5] Pate-Cornell E. Fusion of intelligence information: A Bayesian approach/ Risk Anal. 2002, N 22(3), pp. 445-454.

[6] Novikov D.A. Hierarchical models of military action/ Management of Large systems. Vol. 37. Moscow: Institute for Management Problems of Russian Academy of Sciences, 2012, C.25-62 (In Russian).

[7] Bachrach Y., Draief V., Goyal S. Security games with contagion/University of Cambridge, 2011.

[8] Bier V., Oliveros S., Samuelson L. Choosing what to protect: Strategic defensive allocation against an unknown attacker//Journal of Public Economic Theory, 2006, N9, pp. 1-25.

[9] Kiekintveld C., Tambe M., Marecki J. Robust Bayesian Methods for Stackelberg Security Games//Conference: Autonomous Agents & Multiage Systems/Agent Theories, Architectures and Languages - ATAL, pp. 1467-1468, 2010.

[10] Borovsky A.S., Tarasov A.D. An integrated approach to the development of a general model for the functioning of physical protection systems of objects // Trudy ISA RAN. Vol. 61. 1/2011, pp. 3-13 (In Russian).

[11] Dormidontov A.V., Mironova L.V., Mironov V.S. On the possibility of applying the countermeasures model to assessing the security level of transport infrastructure facilities // Naichny Vestnik MGTU. Vol 21, № 03, 2018, pp.67-77 (In Russian).

[12] Ginis L.A., Kolodenkova A.Ye. Fuzzy modeling to prevent risk situations at critical infrastructure facilities / Vestnik UGATU, Vol. 21, № 4(78), 2017, pp. 113-1120 (In Russian).

[13] Norkin V.I., Gaivoronsky A.A., Zaslavsky V.A., Knopov P.S. Optimal Resource Allocation Models for Critical Infrastructure Protection / Cybernetic I and System Analysis. Vol. 54 № 5, 2018, pp.13-26 (in Russian).

[14] Pita J., Jain M., Western C., Portway C., Tambe M., Ordonez F., Kraus S., Paruchuri P. Deployed ARMOR protection: The application of a games theoretic model for security at the

M. Katsman, V. Myronenko, V. Matsyuk, P. Lapin RT&A, No 1 (61) APPROACH TO DETERMINING THE PARAMETERS._Volume 16, March 2021

Los Angeles International Airport/In Proc. Of AAMAS,2008.

[15] Taylor M.E., Kiekintveld C., Western C., Tambe M. Beyond Runtimes and Optimality: Challenges and Opportunities in Evaluating Deployed Security Sistems/ In Proceeding of the AAMAS - 09 Workshop on Agent Design: Advancing from Practice to Theory, May 2009.

[16] Ryzhikov Yu.I. Simulation modeling. Theory and technology. S.-Petersburg: Korona Print, 2004, 384 p. (In Russian).

[17] Ryzhikov Yu.I. Calculation of service systems with group arrival of requests /Information and Control systems № 2. 2007, pp.39-49 (In Russian).

[18] Monsik V.B., Skrypnikov A.A., Fedotov A.Yu. Queuing systems for indivisible group claims with a queue of unlimited length / Nauchnyi Vestnik MGTU GA № 184, 2012, p. 108 -112 (In Russian).

[19] Gnedenko B.V., Kovalenko I.N. Introduction to queuing theory. - Moscow: Nauka, 1987. -336 p (In Russian).

[20] Shuenkin V.A., Donchenko V.S. Applied models of queuing theory. Kyiv: NMKVO, 1992, 398 p (In Russian).

[21] Ventsel E.S., Ovcharov L.A. The theory of stochastic processes and its engineering applications. - 2nd edition., Moscow: Vysshaya Shkola, 2000. — 383 p (In Russian).

[22] Katsman M. D., Mathematical models of ecologically hazardous rail traffic accidents / M. D. Katsman, V. K., Myronenko, V. I. Matsiuk // Reliability: theory&applications. - Vol. 10, № 1(36). - San Diego, USA - 2015. - P. 28-39.

i Надоели баннеры? Вы всегда можете отключить рекламу.