“METHODS OF EXTRACTING CYBERSECURITY OBJECTS FROM ELECTRONIC SOURCES USING ARTIFICIAL INTELLIGENCE” (2025) Information systems and technologies security, 2(8), pp. 34–41. doi:10.17721/ISTS.2024.8.34-41.