[1]
I. Yakoviv, “Model of four cyber attack information environments”, ITS, vol. 11, no. 2, pp. 175–192, Dec. 2023.