[1]
P. Pitkevich, “Principles of protection against unauthorized access to resources of the cloud computing system.”, cit, no. 44, pp. 120-126, Oct. 2021.