[1]
B. Azibek, S. Kusdavletov, A. Dadlani, Q.-V. Pham, and B. Maham, “DEFENDER-ATTACKER MODELS FOR RESOURCE ALLOCATION IN INFORMATION SECURITY”, sjaitu, pp. 4–11, Dec. 2022.