1.
Gavrylenko S, Chelack V, Bilogorskiy N. Investigation of intrusion in computer systems based on the Hurst exponent. A.I.S. [Internet]. 2017Dec.29 [cited 2024May2];1(2):58-61. Available from: http://ais.khpi.edu.ua/article/view/2522-9052.2017.2.10