[1]
M. Ekmanis, V. Novikovs, and A. Ruško, “Unauthorized Network Services Detection by Flow Analysis”, ELEKTRON ELEKTROTECH, vol. 85, no. 5, pp. 53–56, May 2008, Accessed: Jan. 23, 2026. [Online]. Available: https://eejournal.ktu.lt/index.php/elt/article/view/11161