[1]
S. Ramanauskaitė, E. Radvilė, and D. Olifer, “Use of ontologies in mapping of information security requirements”, MLA, vol. 5, no. 2, pp. 88-91, May 2013.