[1]
2019. THE METHOD OF CALCULATION OF PROBABILITY OF REALIZATION OF THREATS OF INFORMATION WITH THE LIMITED ACCESS FROM AN INTERNAL USER VIOLATOR. Information systems and technologies security. 1, 1 (Sep. 2019), 19–26. DOI:https://doi.org/10.17721/ISTS.2019.1.19-26.