1. Vasenin V.A. To the creation of an international system for monitoring and analyzing the information space for the prevention and cessation of cyber conflicts// IT 2012 No. 9 2--10 pp. Vasenin V.A. To the creation of an international system for monitoring and analyzing the information space for the prevention and cessation of cyber conflicts// IT 2012 No. 9 2--10 pp.
2. Mirzagitov A.A. etal Methods of developing an ontology for information security based on the precedent approach Vestn. Novosib. state. un-ta. Series: Information technology 2013 vol.11 No. 3 37--46 pp. Mirzagitov A.A. et al. Methods of developing an ontology for information security based on the precedent approach Vestn. Novosib. state. un-ta. Series: Information technology 2013 vol.11 No. 3 37--46 pp.
3. Domarev V.V. The security of information technology. Systems approach. K: DiaSoft 2004 992 pp. Domarev V.V. The security of information technology. Systems approach. K: DiaSoft 2004 992 pp.
4. Aktayeva Al. & etc. - Technique of identification of users of social networks on ontologies // International scientific journal "Modern IT and IT - education" vol.12 No. 2 2016 26--34 pp. Aktayeva Al. & etc. - Technique of identification of users of social networks on ontologies // International scientific journal "Modern IT and IT - education" vol.12 No. 2 2016 26--34 pp.
5. Aktayeva Al. & etc. - Cognitive Ontology of information security priorities in social networks // International Scientific and Practical Conference Open Semantic Technologies for Intelligent Systems - OSTIS-2017 365--376 pp. http://proc.ostis.net/eng/main.html Aktayeva Al. & etc. - Cognitive Ontology of information security priorities in social networks // International Scientific and Practical Conference Open Semantic Technologies for Intelligent Systems - OSTIS-2017 365--376 pp. http://proc.ostis.net/eng/main.html