[1]
L. Gulbinovič, “Techniques for modelling network security”, MLA, vol. 4, no. 1, pp. 27-30, Apr. 2012.