(1)
Бучик, С. С.; Юдін, О. К.; Нетребко, Р. В. The Analysis of Methods of Determination of Functional Types of Security of the Information-Telecommunication System from an Unauthorized Access. PIC 2016, 4, 15-21.