[1]
K. A. Zhukov, “The Methodology of Detection of Internal Infringers in the Information System”, KEG, vol. 3, no. 6, pp. 49–54, Oct. 2018.