[1]
R. Kyrychok, H. Shuklin, O. Barabash, and G. Gaidur, “Modeling the vulnerabilities validation mechanism in the active analysis of the security of corporate networks using Bernstein polynomials”, A.I.S., vol. 4, no. 3, pp. 118–123, Oct. 2020.