Application of Systems Theory Laws for Investigating Information Security Problems
Crossref DOI link: https://doi.org/10.3103/S0146411618080424
Published Online: 2019-03-07
Published Print: 2018-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Volkova, V. N.
Chernyi, Yu. Yu.
Text and Data Mining valid from 2018-12-01
Article History
Received: 12 August 2016
First Online: 7 March 2019