[1]
Y. Danyk, K. Sokolov, and O. Hudyma, “The approach to automated detection of destructive cyber influences”, ITS, vol. 7, no. 2, pp. 149–160, Dec. 2019.