1.
Лахно ВА, Петренко ТА, Пирог МВ. Modeling of adaptive recognition of cyberattacks in a non-uniform flow of requests in e-business modules. Bezpeka ìnf. [Internet]. 2016 Jul. 6 [cited 2026 Apr. 29];22(2):135-42. Available from: http://jrnl.kai.edu.ua/index.php/Infosecurity/article/view/10706