[1]
A. Zhylin, O. Bakakynskyi, and A. Kuzmich, “Analysis of methods of proactive protection of information in information and telecommunication systems”, ITS, vol. 9, no. 1, pp. 53–66, Jun. 2021.