1.
Gulbinovič L. Techniques for modelling network security. MLA [Internet]. 2012Apr.23 [cited 2024Sep.29];4(1):27-30. Available from: https://jbem.vgtu.lt/index.php/MLA/article/view/4482