[1]
A. Kozakiewicz, A. Felkner, P. Kijewski, and T. Jordan Kruk, “Application of bioinformatics methods to recognition of network threats”, JTIT, vol. 30, no. 4, pp. 23–27, Dec. 2007, doi: 10.26636/jtit.2007.4.847.