1.
RamanauskaitÄ— S, RadvilÄ— E, Olifer D. Use of ontologies in mapping of information security requirements. MLA [Internet]. 2013May24 [cited 2024Jul.7];5(2):88-91. Available from: https://jeelm.vgtu.lt/index.php/MLA/article/view/3797