Return to Article Details the METHOD OF CONSTRUCTING MODELS OF INFORMATION ATTACKS Download Download PDF