[1]
С. С. Бучик, О. К. Юдін, and Р. В. Нетребко, “The analysis of methods of determination of functional types of security of the information-telecommunication system from an unauthorized access”, PIC, vol. 4, no. 56, pp. 15–21, Dec. 2016.