1. A. M. Fal’, “Standardization in information security management,” Cybern. Syst. Analysis, Vol. 46, No. 3, 512–515 (2010).
2. ISO/IEC JTC 1/SC 27 Standing Document 11, Overview of the Work of SC27.
3. Yu. I. Gorbenko, Construction and Analysis of Systems, Protocols, and Methods of Cryptographic Information Protection. Pt. 1, Methods of Construction and Analysis, Standardization and Application of Cryptographic Systems [in Ukrainian], Fort, Kharkiv (2015).