“THE METHOD OF CALCULATION OF PROBABILITY OF REALIZATION OF THREATS OF INFORMATION WITH THE LIMITED ACCESS FROM AN INTERNAL USER VIOLATOR” (2019) Information systems and technologies security, 1(1), pp. 19–26. doi:10.17721/ISTS.2019.1.19-26.