[1]
G. S. Rajaboevich and G. A. Abdujalilovich, “Methods and models of protecting computer networks from un-wanted network traffic”, IJET, vol. 7, no. 4, pp. 2541–2545, Sep. 2018, doi: 10.14419/ijet.v7i4.14744.