[1]
R. Kyrychok, O. Laptiev, R. Lisnevskyi, V. Kozlovskyi, and V. Klobukov, “Development of a method for checking vulnerabilities of a corporate network using Bernstein transformations”, EEJET, vol. 1, no. 9(115), pp. 93–101, Feb. 2022.