1.
Danyk Y, Sokolov K, Hudyma O. The approach to automated detection of destructive cyber influences. ITS [Internet]. 2019Dec.30 [cited 2024Apr.18];7(2):149-60. Available from: https://its.iszzi.kpi.ua/article/view/190561