[1]
Danyk, Y., Sokolov, K. and Hudyma, O. 2019. The approach to automated detection of destructive cyber influences. Collection "Information Technology and Security". 7, 2 (Dec. 2019), 149–160. DOI:https://doi.org/10.20535/2411-1031.2019.7.2.190561.