“THE METHOD OF CALCULATION OF PROBABILITY OF REALIZATION OF THREATS OF INFORMATION WITH THE LIMITED ACCESS FROM AN INTERNAL USER VIOLATOR”. Information systems and technologies security 1, no. 1 (September 25, 2019): 19–26. Accessed February 16, 2026. https://ists.knu.ua//article/view/2657.