[1]
Kyrychok, R., Shuklin, H., Barabash, O. and Gaidur, G. 2020. Modeling the vulnerabilities validation mechanism in the active analysis of the security of corporate networks using Bernstein polynomials. Advanced Information Systems. 4, 3 (Oct. 2020), 118–123. DOI:https://doi.org/10.20998/2522-9052.2020.3.17.