[1]
А. В. Чунарьова and А. В. Чунарьов, “Methods and systems for the detection of unauthorized access to modern information and communication systems and networks”, Bezpeka ìnf., vol. 17, no. 1, pp. 45–49, Jun. 2012.