[1]
Gavrylenko, S., Chelack, V. and Bilogorskiy, N. 2017. Investigation of intrusion in computer systems based on the Hurst exponent. Advanced Information Systems. 1, 2 (Dec. 2017), 58–61. DOI:https://doi.org/10.20998/2522-9052.2017.2.10.