[1]
K. I. Bushmeleva, A. V. Gavrilenko, and A. V. Nikiforov, “Indirect Monitoring of Suspicious Activity on Computer Systems”, УК, vol. 3, no. 4, pp. 41-45, Dec. 2022.