[1]
L. Gulbinovič, “Techniques for modelling network security”, MLA, vol. 4, no. 1, pp. 27–30, Apr. 2012, doi: 10.3846/mla.2012.06.