[1]
S. Gnatyuk, V. Sydorenko, and A. Skurativskyi, “Analysis of modern approaches to cybersecurity requirements management during soft-ware implementation”, PIC, vol. 2, no. 82, pp. 5–18, Aug. 2025.