1.
RamanauskaitÄ— S, RadvilÄ— E, Olifer D. Use of ontologies in mapping of information security requirements. MLA [Internet]. 2013May24 [cited 2024Nov.16];5(2):88-91. Available from: https://jcem.vgtu.lt/index.php/MLA/article/view/3797