1.
Бучик СС, Юдін ОК, Нетребко РВ. The analysis of methods of determination of functional types of security of the information-telecommunication system from an unauthorized access. PIC [Internet]. 2016 Dec. 21 [cited 2026 Feb. 15];4(56):15-21. Available from: https://jrnl.nau.edu.ua/index.php/PIU/article/view/13135