[1]
I. Subach, V. Fesokha, and N. Fesokha, “Analysis of existing solutions for preventing invasion in information and telecommunication networks”, ITS, vol. 5, no. 1, pp. 29–41, Jun. 2017.