(1)
Zhukov, K. A. The Methodology of Detection of Internal Infringers in the Information System. KEG 2018, 3, 49–54.