1.
Gulbinovič L. Techniques for modelling network security. MLA [Internet]. 2012Apr.23 [cited 2024Jul.7];4(1):27-30. Available from: https://jeelm.vgtu.lt/index.php/MLA/article/view/4482