1. Modeling of security systems for critical infrastructure facilities;Yevseiev;PC Technology Center,2022
2. Kurii, Y., & Opirskyy, I. (2021). Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001:2013. In Cybersecurity Providing in Information and Telecommunication Systems, 3288, 21-32.
3. 2023 CWE Top 25 Most Dangerous Software Weaknesses. (2023). Cybersecurity & Infrastructure Security Agency. https://www.cisa.gov/news-events/alerts/2023/06/29/2023-cwe-top-25-most-dangerous-software -weaknesses
4. Nadeau, J. (2023). The top 10 API security risks OWASP list for 2023. Security Intelligence. https://securityintelligence.com/articles/the-top-10-api-security-risks-owasp-list-for-2023
5. Common Weakness Enumeration (CWE) Top 25. (2023). Common Weakness Enumeration https://cwe.mitre.org/top25/archive/2023/2023_top25_list.html