[1]
Sadikov Sh.M., “Comparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity”, Texa.Jour. of Engg. and Tech., vol. 23, pp. 14–19, Aug. 2023.