The Procedure for Forming a List of Sources of Attack in the Information System | IEEE Conference Publication | IEEE Xplore