[1]
В. А. Лахно, Т. А. Петренко, and М. В. Пирог, “Modeling of adaptive recognition of cyberattacks in a non-uniform flow of requests in e-business modules”, Bezpeka ìnf., vol. 22, no. 2, pp. 135–142, Jul. 2016.