Article TRACING CHANGES IN NETWORK TOPOLOGY AND SECURITY PROBLEMS DECISION ON THE BASIS OF THE DATA FLOWS ANALYSIS
Article APPLICATION OF MULTICRITERIA PREDICTION METHODS IN SYSTEMS FOR DETECTION OF NETWORK INTRUSIONS