1.
Gulbinovič L. Techniques for modelling network security. MLA [Internet]. 2012Apr.23 [cited 2024Jul.7];4(1):27-30. Available from: https://btp.vilniustech.lt/index.php/MLA/article/view/4482