1.
Gulbinovič L. Techniques for modelling network security. MLA [Internet]. 2012Apr.23 [cited 2024Nov.16];4(1):27-30. Available from: https://jcem.vgtu.lt/index.php/MLA/article/view/4482