1.
Azibek B, Kusdavletov S, Dadlani A, Pham Q-V, Maham B. DEFENDER-ATTACKER MODELS FOR RESOURCE ALLOCATION IN INFORMATION SECURITY. sjaitu [Internet]. 2022 Dec. 30 [cited 2024 Nov. 21];:4-11. Available from: https://journal.astanait.edu.kz/index.php/ojs/article/view/132