[1]
O. Kaganyuk, N. Chernyashchuk, and Burchak І., “Analysis of hardware and software methods for protecting information from unauthorized access to the information channel of data transmission. ”,
cit
, no. 47, pp. 76-82, Jul. 2022.