[1]
A. Skurativskyi, “A Method of Cybersecurity Requirements Management During Software Implementation in Business”, Bezpeka ìnf., vol. 31, no. 3, pp. 135–141, Dec. 2025.