To see the other types of publications on this topic, follow the link: Security analysis.

Journal articles on the topic 'Security analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Antonov, Petar, and Nikoleta Georgieva. "Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276–82. http://dx.doi.org/10.11610/isij.4719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Petkova, Lilyana, and Vasilisa Pavlova. "Security Analysis on Content Management Systems." Mathematics and Informatics LXV, no. 5 (October 28, 2022): 423–34. http://dx.doi.org/10.53656/math2022-5-2-sec.

Full text
Abstract:
This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS like Umbraco, Sitecore, WordPress and Drupal categorized in two groups defined by the technology used for development. And as the IT world changes a lot these brings one constant battle against threats. Therefore, this article will add some vulnerabilities analysis of the selected systems since 2014. Results were grouped by common vulnerabilities of the selected platforms and such specific ones.
APA, Harvard, Vancouver, ISO, and other styles
3

COMȘA, Andreea-Cristina. "Security Standards Analysis." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 25–30. http://dx.doi.org/10.19107/ijisc.2012.02.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

MIHAI, Ioan-Cosmin. "Security Standards Analysis." International Journal of Information Security and Cybercrime 2, no. 2 (December 28, 2013): 27–34. http://dx.doi.org/10.19107/ijisc.2013.02.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pandya, Vaibhav Ranchhoddas, and Mark Stamp. "iPhone Security Analysis." Journal of Information Security 01, no. 02 (2010): 74–87. http://dx.doi.org/10.4236/jis.2010.12009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Wei-Yu, Shing-Han Li, Mann-Jung Hsiao, Chung-Chiang Hu, and Kuo-Ching Tu. "Network Security Analysis by Using Business Intelligence." International Journal of Machine Learning and Computing 5, no. 6 (December 2015): 431–38. http://dx.doi.org/10.18178/ijmlc.2015.5.6.547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

YUM, D. H., J. H. SHIN, and P. J. LEE. "Security Analysis of Yeh-Tsai Security Mechanism." IEICE Transactions on Information and Systems E91-D, no. 5 (May 1, 2008): 1477–80. http://dx.doi.org/10.1093/ietisy/e91-d.5.1477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

rof. Dr. S.D. Joshi, Prof Y. C. Kulkarni, P. "Incorporating Security into SDLC Phases Using Security Analysis." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 07 (July 30, 2015): 6423–31. http://dx.doi.org/10.15680/ijircce.2015.0307010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Xiaochao, Cuicui Zhao, Kun Pan, Shuqiang Lin, Xiurong Chen, Benbin Chen, Deguang Le, Donghui Guo, and Xiaochao Li. "On the Security Analysis of PBKDF2 in OpenOffice." Journal of Software 10, no. 2 (February 2015): 116–26. http://dx.doi.org/10.17706/jsw.10.2.116-126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

CIOACĂ, Cătălin, Alexandru BRATU, and Daniel ȘTEFĂNESCU. "THE ANALYSIS OF BENCHMARKING APPLICATION IN CYBER SECURITY." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 2 (July 31, 2017): 57–62. http://dx.doi.org/10.19062/2247-3173.2017.19.2.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hamdani, Farhaan Noor. "Comparative Analysis of Wireless Security Protocols and Issues." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (August 31, 2018): 1591–96. http://dx.doi.org/10.31142/ijtsrd17130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

G. San Jose, Christine Charmaine. "Comparative and Security Performance Analysis of SHA-3." Journal of Advanced Research in Dynamical and Control Systems 11, no. 11-SPECIAL ISSUE (November 20, 2019): 960–66. http://dx.doi.org/10.5373/jardcs/v11sp11/20193121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Garasym, Y. R. "Survivable security systems analysis." Military Technical Collection, no. 4 (May 4, 2011): 87–95. http://dx.doi.org/10.33577/2312-4458.4.2011.87-95.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Singh, Sahib. "Security Analysis of MongoDB." International Journal for Digital Society 10, no. 4 (December 30, 2019): 1556–61. http://dx.doi.org/10.20533/ijds.2040.2570.2019.0193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Edmonds, Martin, and Julian Palmore. "Defence and security analysis." Defense & Security Analysis 32, no. 1 (January 2, 2016): 1–3. http://dx.doi.org/10.1080/14751798.2015.1133163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Stott, B., O. Alsac, and A. J. Monticelli. "Security analysis and optimization." Proceedings of the IEEE 75, no. 12 (1987): 1623–44. http://dx.doi.org/10.1109/proc.1987.13931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ryoo, Jungwoo, Rick Kazman, and Priya Anand. "Architectural Analysis for Security." IEEE Security & Privacy 13, no. 6 (November 2015): 52–59. http://dx.doi.org/10.1109/msp.2015.126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Mekhaznia, Tahar, and Abdelmadjid Zidani. "Wi-Fi Security Analysis." Procedia Computer Science 73 (2015): 172–78. http://dx.doi.org/10.1016/j.procs.2015.12.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Richards, Justin, and Giovanni Vigna. "The Analysis of Security." ITNOW 60, no. 4 (2018): 38–40. http://dx.doi.org/10.1093/itnow/bwy100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chess, B., and G. McGraw. "Static analysis for security." IEEE Security and Privacy Magazine 2, no. 6 (November 2004): 76–79. http://dx.doi.org/10.1109/msp.2004.111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Bau, Jason, and John C. Mitchell. "Security Modeling and Analysis." IEEE Security & Privacy Magazine 9, no. 3 (May 2011): 18–25. http://dx.doi.org/10.1109/msp.2011.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Narayana, K. E., and K. Jayashree. "Security Analysis of Storage, Virtualization, Infrastructure and Standardization in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 8 (August 1, 2020): 3754–58. http://dx.doi.org/10.1166/jctn.2020.9315.

Full text
Abstract:
Nowadays the cloud computing grows in high rate with the help of recent technological advancement. It provides the on demand and low cost services to the customer. Cloud computing distributes the services to various location based on the demand. The services can cross various layers and location which leads the security problem. The existing security system provides reliable solutions which are not enough to secure the resource and services from unauthorized access. Three types of security is available in the cloud namely Infrastructure security, Platform security and application security. The proposed analysis gives the complete information about these security and its issues. Data security management process has various steps for securing the data around the cloud network with reliable access. Virtualization level security is analyzed with different parameter based on the number issues present in the cloud. Authentication types are also identified and analyzed over security level. Various types of cloud framework and vulnerabilities are assessed in order to achieve better security.
APA, Harvard, Vancouver, ISO, and other styles
23

Ntshabele, Koketso, Bassey Isong, Naison Gasela, and Adnan M. Abu-Mahfouz. "A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis." Journal of Sensor and Actuator Networks 11, no. 3 (September 5, 2022): 52. http://dx.doi.org/10.3390/jsan11030052.

Full text
Abstract:
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally accepted and resilient LoRaWAN security model is challenging. Although several security models to maximize the security efficiency in LoRaWAN exist using the trusted key server to securely manage the keys, designing an optimum LoRaWAN security model is yet to be fully realized. Therefore, in this paper, we proposed two LoRaWAN security algorithms, A and B, for a trusted key management server (TKMS) to securely manage and distribute the keys amongst the entities. Algorithm B is an enhanced version of Algorithm A, which utilizes the security shortcomings of Algorithm A. We employed two formal analysis methods in the modelling, results analysis, and verification. The Scyther security verification tool was used for algorithm modelling and analysis against all possible attacks, while BAN logic was used to prove the logical correctness of the proposed algorithms. The results indicate that BAN logic feasibly proves the model logic correctness and the security claims employed in Scyther are reliable metrics for assessing the algorithms’ security efficiency. The security claims proved that the security algorithm is more secure and reliable as no attacks were detected across all entities in the enhanced-Algorithm B, unlike in Algorithm A. Moreover, the application of hashing minimizes computation cost and time for authentication and message integrity as compared to symmetric and asymmetric encryption. However, the proposed algorithm is yet to be verified as completely lightweight.
APA, Harvard, Vancouver, ISO, and other styles
24

Park, Youngseok, Hyunsang Choi, Sanghyun Cho, and Young-Gab Kim. "Security Analysis of Smart Speaker: Security Attacks and Mitigation." Computers, Materials & Continua 61, no. 3 (2019): 1075–90. http://dx.doi.org/10.32604/cmc.2019.08520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Jiang, Qing Chao. "Analysis on Wireless LAN Security Issues and Security Implementation." Advanced Materials Research 1030-1032 (September 2014): 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.

Full text
Abstract:
With the global population of informatization and digitization, network technology is playing a very important role in people's lives. The role of wireless LAN applications is especially significant. People's daily lives and work are no longer confined to paper or wired connection, but gradually extend to the use of radio. Although it brought a lot of convenience to people's lives, wireless LAN security problems also frequently occurred. This paper mainly aims to analyze the security risk and at the same time offer some preventive measures.
APA, Harvard, Vancouver, ISO, and other styles
26

Thapliyal, Sangeeta. "Water Security or Security of Water? A Conceptual Analysis." India Quarterly: A Journal of International Affairs 67, no. 1 (March 2011): 19–35. http://dx.doi.org/10.1177/097492841006700102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Kim, Kyung-Shin. "Security Analysis and Improvement of Integrated Security Management System." Journal of the Institute of Webcasting, Internet and Telecommunication 15, no. 1 (February 28, 2015): 15–23. http://dx.doi.org/10.7236/jiibc.2015.15.1.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hong, Jin B., and Dong Seong Kim. "Towards scalable security analysis using multi-layered security models." Journal of Network and Computer Applications 75 (November 2016): 156–68. http://dx.doi.org/10.1016/j.jnca.2016.08.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Harsan, H., N. Hadjsaid, and P. Pruvot. "Cyclic security analysis for security constrained optimal power flow." IEEE Transactions on Power Systems 12, no. 2 (May 1997): 948–53. http://dx.doi.org/10.1109/59.589787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Joo, Il-Yeob. "Analysis on Security Business Areas of Electronics Security Companies." Korean Security Science Review 73 (December 31, 2022): 47–70. http://dx.doi.org/10.36623/kssr.2022.73.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Mashchenko, Maryna. "Analysis of the approaches to evaluate environmental security of enterprises." Economics of Development 17, no. 4 (December 10, 2018): 13–19. http://dx.doi.org/10.21511/ed.17(4).2018.02.

Full text
Abstract:
Proved that to achieve socio-economic development of state it is necessary to ensure not only invarionmental security of state, but also of enterprise. There are a sufficiently large number of methods to evaluate the economic and ecological security of enterprise and, at the same time, there aren’t any practical methods to evaluate its environmental security. This confirms the necessity to analyse this issue in a more detailed way. The aim of the article is to analyse and identify the drawbacks of existing methods to evaluate the environmental security of enterprise and develop a system of indicators for environmental security of industrial enterprises. The following research methods were used in the article: method of analysis and synthesis to determine the drawbacks of existing methods to establish the level of environmental security, the graph analytic method to build a scheme of the process to develop the system of indicators for environmental security of industrial enterprise. It is determined that the process to develop the system of indicators for environmental security of industrial enterprise is a process of successive stages of determining the purpose and tasks to diagnose the state of environmental security of industrial enterprise, to select and process the necessary information and, directly, to develop a system of indicators of environmental security of industrial enterprise. The practical significance of this study is to determine the level of environmental security of industrial enterprise as an integral indicator. Its core is a set of social and economic, technical and technological, scientific and innovative, managerial and organizational indicators which have to account the criteria related to the external and internal environment of the enterprise activity. The proposed process to develop the system of indicators for environmental security of industrial enterprise allows determining the level of environmental security.
APA, Harvard, Vancouver, ISO, and other styles
32

Rana, Muhammad Ehsan. "Common Security Protocols for Wireless Networks: A Comparative Analysis." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 3887–96. http://dx.doi.org/10.37200/ijpr/v24i5/pr202097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Dr. J.P. Sabannavar, Dr J. P. Sabannavar, and DR P. L. HARALE Dr. P.L.HARALE. "Food Security and Public Distribution System – A Macro Analysis." Indian Journal of Applied Research 4, no. 8 (October 1, 2011): 81–83. http://dx.doi.org/10.15373/2249555x/august2014/21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Yifan, Yuan. "Analysis of Security Vulnerabilities Using Misuse Pattern Testing Approach." Journal of Software 10, no. 5 (May 2015): 650–58. http://dx.doi.org/10.17706/jsw.10.5.650-658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Tarasenko, Iryna Oleksiivna, Julia Andriivna Bondarchuk, and Oleksiy Serhiiovych Tarasenko. "ECONOMIC SECURITY OF HIGHER EDUCATION: OPPORTUNITIES AND THREATS ANALYSIS." SCIENTIFIC BULLETIN OF POLISSIA 1, no. 4(12) (2017): 40–43. http://dx.doi.org/10.25140/2410-9576-2017-1-4(12)-40-43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

GUPTA, SHIVANI. "Nutritional Status and Food Security: An Analysis for India." Paripex - Indian Journal Of Research 3, no. 2 (January 15, 2012): 50–53. http://dx.doi.org/10.15373/22501991/feb2014/14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Pati, Sharanappa. "Isms Framework in Design and Analysis of Information Security." Paripex - Indian Journal Of Research 3, no. 7 (January 1, 2012): 215–17. http://dx.doi.org/10.15373/22501991/july2014/86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Maity, Soumya, P. Bera, Soumya K. Ghosh, and Ehab Al‐Shaer. "Formal integrated network security analysis tool: formal query‐based network security configuration analysis." IET Networks 4, no. 2 (March 2015): 137–47. http://dx.doi.org/10.1049/iet-net.2013.0090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Ratan, Ram, and Arvind Yadav. "Security Analysis of Bit plane Level Image Encryption Schemes." Defence Science Journal 71, no. 2 (March 10, 2021): 209–21. http://dx.doi.org/10.14429/dsj.71.15643.

Full text
Abstract:
A selective bit-plane encryption scheme was proposed for securing the transmission of image data in mobile environments with a claim that it provides a high security viz. the encryption of the four most significant bit-planes is sufficient for a high image data security. This paper presents the security analysis of the said encryption scheme and reports new important results. We perform the security analysis of the bit-level encryption by considering the normal images and their histogram equalised enhanced images. We consider different bit-plane aspects to analyse the security of the image encryption, and show that the encryption of the four most significant bit-planes is not adequate. The contents of the images can be obtained even when all the bit-planes except one least significant bit-plane are encrypted in the histogram equalised images as shown in the results. The bit-plane level security analysis seems very useful for the analysis of the bit-plane level image encryption schemes.
APA, Harvard, Vancouver, ISO, and other styles
40

Sathiyapriya.S. "Comparison Analysis of Two Fish and Blow Fish Algorithm." INTERNATIONAL JOURNAL OF SCIENCE TECHNOLOGY AND HUMANITIES 2, no. 2 (October 30, 2015): 82–85. http://dx.doi.org/10.26524/ijsth61.

Full text
Abstract:
Steganography is a technique that allows one to hide binary data within an image while adding few noticeable changes. There are many security algorithms are available in steganography, but in particular the algorithm Blowfish and Twofish both are used to secure information in telemedicine. Thisresearch aspires to compare both these algorithms how work well in securing information while transmitting the telemedicine data. This study focuses which algorithm can use for hiding information in health care domain. This research also aims to find out how much in-depth both algorithms hiding the information with securely.
APA, Harvard, Vancouver, ISO, and other styles
41

Feofilova, Tatyana Yur'evna, Evgenii Vladimirovich Radygin, David Zurabovich Amirbegi, and Ul'yana Dmitrievna Bezdelova. "National security management: retrospective analysis." Национальная безопасность / nota bene, no. 6 (June 2020): 19–27. http://dx.doi.org/10.7256/2454-0668.2020.6.34786.

Full text
Abstract:
The subject of this research is the key changes in the institutional provision of national security. The object of this research is the national security management. Provision of national security is an inextricable element of state administration. The article examines the system of views that reflect state’s position on the question of national security protection, presented in the legislative acts, conceptual and strategic documents considering amendments thereto. The goal of this study consists in determination of transformation of approach of the government of the Russian Federation towards ensuring national security. Federal laws, conceptual and strategic documents of the Russian Federation served as the information base for this research. The scientific novelty consists in systematization of approaches of the state towards understanding of boundaries and organization of national security protection of the Russian Federation. The conducted retrospective analysis allows tracing the changes in approaches of the states towards ensuring national security, observing the transformation of government’s priorities within and outside the country, as well as determining interdependence of the system of national security protection and its structure on the power of state’s authority and the status of development of administration in the Russian Federation. The overall conclusion of this research lies in the statement that the system of national security management is dynamic; its transformation depends on the international relations and factors outside the Russian Federation, as well as on the level of development and stability of the national system of administration.
APA, Harvard, Vancouver, ISO, and other styles
42

Bin Tauqeer, Omer, Sadeeq Jan, Alaa Omar Khadidos, Adil Omar Khadidos, Fazal Qudus Khan, and Sana Khattak. "Analysis of Security Testing Techniques." Intelligent Automation & Soft Computing 29, no. 1 (2021): 291–306. http://dx.doi.org/10.32604/iasc.2021.017260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Cho, Kwang-Rae. "Classification Analysis on Private Security." Korean Security Science Review 51 (June 30, 2017): 101–24. http://dx.doi.org/10.36623/kssa.2017.51.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Cho, Kwang-Rae. "Classification Analysis on Private Security." Korean Security Science Review 51 (June 30, 2017): 101–24. http://dx.doi.org/10.36623/kssa.2019.51.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Widayatno, Rudy Laksmono, Arwin Datumaya W, and Zaenal Abidin. "Analysis Bioavtur for Energy Security." Jurnal Pertahanan 2, no. 3 (December 29, 2016): 243. http://dx.doi.org/10.33172/jp.v2i3.102.

Full text
Abstract:
In 2014, Avtur commodities in Indonesia, recorded a deficit of 0.9 million kiloliters. This situation are not profitable for the country, both economically and energy security. This aim of research is exposing clearly about the condition of national energy resources, the development of biofuels (especially bioavtur) and policies that support the production and use of bioavtur. This study used a qualitative approach with descriptive analysis. Data sources obtained from in-depth interviews with the institutions related to the energy field, air transport, the biofuels industry (bioavtur) and farmer groups/associations of oil palm plantations. The results is there are a variety of biological sources in Indonesia that can be used bioavtur such as algae, pecans, coconut, and palm oil. Opportunities and prospects bioavtur market in Indonesia is promising. Future studies are necessary to improve the economics of the plant-based oil bioavtur because Indonesia has large oil supply source.
APA, Harvard, Vancouver, ISO, and other styles
46

Mironova, O. A. "TAX SECURITY: TRANSFORMATION-TYPOLOGICAL ANALYSIS." Развитие и безопасность, no. 4 (2019): 105–14. http://dx.doi.org/10.46960/74159_2019_4_105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Degtyarev, N. Yu, G. P. Zhigulin, R. A. Shakirova, and S. A. Bondarev. "ANALYSIS OF CLOUD SECURITY CHALLENGES." Scientific and Technical Volga region Bulletin 6, no. 3 (June 2016): 104–6. http://dx.doi.org/10.24153/2079-5920-2016-6-3-104-106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tong, Xiaofei, Jingguo Bi, Yufei Duan, Lixiang Li, and Licheng Wang. "Security Analysis of DBTRU Cryptosystem." Entropy 24, no. 10 (September 23, 2022): 1349. http://dx.doi.org/10.3390/e24101349.

Full text
Abstract:
DBTRU was proposed by Thang and Binh in 2015. As a variant of NTRU, the integer polynomial ring is replaced by two binary truncated polynomial rings GF(2)[x]/(xn+1). DBTRU has some advantages over NTRU in terms of security and performance. In this paper, we propose a polynomial-time linear algebra attack against the DBTRU cryptosystem, which can break DBTRU for all recommended parameter choices. The paper shows that the plaintext can be achieved in less than 1 s via the linear algebra attack on a single PC.
APA, Harvard, Vancouver, ISO, and other styles
49

Fogler, H. Russell. "Security Analysis, DDMs, and Probability." ICFA Continuing Education Series 1988, no. 2 (January 1988): 51–55. http://dx.doi.org/10.2469/cp.v1988.n2.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Manojlovic, Dragan. "Intelligence analysis in corporate security." Megatrend revija 11, no. 4 (2014): 301–20. http://dx.doi.org/10.5937/megrev1404301m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography