[1]
Лахно, В.А., Петренко, Т.А. and Пирог, М.В. 2016. Modeling of adaptive recognition of cyberattacks in a non-uniform flow of requests in e-business modules. Ukrainian Scientific Journal of Information Security. 22, 2 (Jul. 2016), 135–142. DOI:https://doi.org/10.18372/2225-5036.22.10706.