[1]
“THE METHODS OF ENSURING FAULT TOLERANCE, SURVIVABILITY AND PROTECTION OF INFORMATION OF SPECIALIZED INFORMATION TECHNOLOGIES UNDER THE INFLUENCE OF MALICIOUS SOFTWARE”, CSIT, no. 1, pp. 36–44, Apr. 2022, doi: 10.31891/CSIT-2022-1-5.