[1]
O. Potii, D. Golubnychiy, Y. Vasiliev, and M. Yesina, “The process of declaring information security profiles”, RT, vol. 2, no. 217, pp. 7–22, Jun. 2024.