1.
Kaganyuk O, Chernyashchuk N, Burchak І. Analysis of hardware and software methods for protecting information from unauthorized access to the information channel of data transmission. . cit [Internet]. 2022Jul.1 [cited 2025Apr.12];(47):76-2. Available from: https://cit.lntu.edu.ua/index.php/cit/article/view/353