(1)
Azibek, B.; Kusdavletov, S.; Dadlani, A.; Pham, Q.-V.; Maham, B. DEFENDER-ATTACKER MODELS FOR RESOURCE ALLOCATION IN INFORMATION SECURITY. sjaitu 2022, 4-11.