[1]
О. В. Кіреєнко, “Information security violator model with general and specialized information”, Bezpeka ìnf., vol. 25, no. 1, pp. 24–29, Apr. 2019.