[1]
R. . Kyrychok, Z. Brzhevska, H. . Hulak, A. Bessalov, and V. . Astapenya, “RULES FOR THE IMPLEMENTATION OF EXPLOITS DURING AN ACTIVE ANALYSIS OF THE CORPORATE NETWORKS` SECURITY BASED ON A FUZZY ASSESSMENT OF THE QUALITY OF THE VULNERABILITY VALIDATION MECHANISM”, Кібербезпека: освіта, наука, техніка, vol. 2, no. 14, pp. 148–157, Dec. 2021.