[1]
S. Ramanauskaitė, E. Radvilė, and D. Olifer, “Use of ontologies in mapping of information security requirements”, MLA, vol. 5, no. 2, pp. 88–91, May 2013, doi: 10.3846/mla.2013.15.