1.
Zhukov KA. The Methodology of Detection of Internal Infringers in the Information System. KEG [Internet]. 2018Oct.8 [cited 2024May1];3(6):49–54. Available from: https://knepublishing.com/index.php/KnE-Engineering/article/view/2970