[1]
M. Ekmanis, V. Novikovs, and A. Ruško, “Unauthorized Network Services Detection by Flow Analysis”, ELEKTRON ELEKTROTECH, vol. 85, no. 5, pp. 53–56, May 2008, doi: 10.5755/j02.eie.11161.