1.
Gulbinovič L. Techniques for modelling network security. MLA [Internet]. 2012Apr.23 [cited 2024Nov.23];4(1):27-30. Available from: https://jbem.vgtu.lt/index.php/MLA/article/view/4482