[1]
S. Gavrylenko, V. Chelack, and N. Bilogorskiy, “Investigation of intrusion in computer systems based on the Hurst exponent”, A.I.S., vol. 1, no. 2, pp. 58–61, Dec. 2017.