[1]
I. Tyshyk, “TESTING THE ORGANIZATION’S CORPORATE NETWORK FOR UNAUTHORIZED ACCESS”, Кібербезпека: освіта, наука, техніка, vol. 2, no. 18, pp. 39–48, Dec. 2022.