THE METHOD OF CALCULATION OF PROBABILITY OF REALIZATION OF THREATS OF INFORMATION WITH THE LIMITED ACCESS FROM AN INTERNAL USER VIOLATOR. Information systems and technologies security, [S. l.], v. 1, n. 1, p. 19–26, 2019. DOI: 10.17721/ISTS.2019.1.19-26. Disponível em: https://ists.knu.ua//article/view/2657. Acesso em: 16 feb. 2026.