[1]
R. Safin, A. Abdiraman, A. Nurusheva, and L. Aldasheva, “Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication”, bultechenukz, vol. 140, no. 3, pp. 114–124, Sep. 2022.