1. Kietzmann J., Lee L. W., McCarthy I. P., and Kietzmann T. C., Deepfakes: Trick or treat? Business Horizons, vol. 63(2), pp. 135-146, 2020. DOI: 10.1016/j.bushor.2019.11.006
2. Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, p.188, 2021. DOI: https://doi.org/10.15587/978-617-7319-31-2
3. Стратегія кібербезпеки України (2021-2025), [Електронний ресурс] Available at: https://www.rnbo.gov.ua/files/2021/STRATEGIYA%20KYBERBEZPEKI/proekt%20strategii_kyberbezpeki_Ukr.pdf. (Accessed: 19 March 2024)
4. Karpinski M, Khoma V., Dudvkevych V., Khoma Y. and Sabodashko D., "Autoencoder Neural Networks for Outlier Correction in ECG- Based Biometric Identification", 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), pp. 210-215, 2018. DOI: 10.1109/IDAACS-SWS.2018.8525836
5. Rybalskyi O. V., Soloviev V. Y., “On the development of the theory, methods and means of conducting the examination of digital photo, video and sound recording materials, methods and means of conducting the examination of digital photo, video and sound recording materials”. Modern Special Technique, vol. 3 (30), pp. 119–121, 2012, (in Russian). Available at: http://nbuv.gov.ua/UJRN/sstt_2012_3_19 (Accessed on 19 March 2024)