[1]
V. Mokhor, O. Bakalynskyi, and V. Tsurkan, “Аnalysis of information security risk assessment representation methods”, ITS, vol. 6, no. 1, pp. 75–84, Jun. 2018.