1.
Kyrychok R, Shuklin H, Barabash O, Gaidur G. Modeling the vulnerabilities validation mechanism in the active analysis of the security of corporate networks using Bernstein polynomials. A.I.S. [Internet]. 2020Oct.5 [cited 2024Nov.23];4(3):118-23. Available from: http://ais.khpi.edu.ua/article/view/2522-9052.2020.3.17