[1]
A. Barczak and G. Bereza, “Intrusion Detection Systems. Model and implementation of module reacting on intrusion to computer system”, SI, vol. 14, no. 1-2, pp. 5–11, May 2019.