[1]
A. Barczak and G. Bereza, “Intrusion Detection Systems. Model and implementation of module reacting on intrusion to computer system”, SI, vol. 14, no. 1-2, pp. 5–11, May 2019, Accessed: Nov. 22, 2024. [Online]. Available: https://czasopisma.uph.edu.pl/studiainformatica/article/view/535