[1]
V. Mokhor, “Use of entropy approach for information security risks assessment”, ITS, vol. 4, no. 2, pp. 255–261, Dec. 2016.