1.
Кіреєнко ОВ. Information security violator model with general and specialized information. Bezpeka ìnf. [Internet]. 2019 Apr. 25 [cited 2026 Feb. 26];25(1):24-9. Available from: https://jrnl.nau.edu.ua/index.php/Infosecurity/article/view/13198