1. E. Akinlade and E. Adeleye, “Designing a secure interactive system: Balancing the conflict between security, usability, and functionality” (2022). URL: https://www.researchgate.net/publication/366252638_Designing_a_secure_interactive_system_balancing_the_conflict_between_security_usability_and_functionality (Last accessed: 03 Jun 2023).
2. L. Rainie, J. Anderson, and J. Connolly, “Cyber attacks likely to increase” (2014). URL: https://www.pewresearch.org/internet/2014/10/29/cyber-attacks-likely-to-increase/ (Last accessed: 03 Jun 2023).
3. On Basic Principles of Cyber Security in Ukraine: the Law of Ukraine of October 5, 2017 1 2163-VIII, The Official Gazette of Ukraine, Issue No. 91, 2765 (2017). URL: https://zakon.rada.gov.ua/laws/show/2163-19.
4. O. Letychevskyi, Y. Hryniuk, V. Yakovlev, V. Peschanenko, and V. Radchenko, “Algebraic matching of vulnerabilities in a low-level code.” The ISC Intern. J. of Inform. Security, Vol. 11, Iss. 3, 1–7 (2019). https://doi.org/10.22042/isecure.2019.11.0.1.
5. O. Letychevskyi and T. Polhul, “Detection of fraudulent behavior using the combined algebraic and machine learning approach,” in: Proc. 2019 IEEE Intern. Conf. on Big Data (09-12 December 2019, Los Angeles, CA, USA), Los Angeles (2019), pp. 4289–4293. https://doi.org/10.1109/BigData47090.2019.9006546.