Author:
Maliszewski Michal,Boryczka Urszula
Publisher
Springer Nature Switzerland
Reference18 articles.
1. Barbosa, R., Sadre, R., Pras, A.: Flow whitelisting in SCADA networks. Int. J. Crit. Infrastruct. Prot. 6, 150–158 (2013). https://doi.org/10.1016/j.ijcip.2013.08.003
2. Stouffer, C.: NortonLifeLock: What is a zero-day exploit? https://us.norton.com/internetsecurity-emerging-threats-how-do-zero-day-vulnerabilities-work.html
3. European Association for Secure Transactions: Terminal fraud attacks in Europe drop during the Covid-19 pandemic. https://www.association-secure-transactions.eu/terminal-fraud-attacks-in-europe-drop-during-the-covid-19-pandemic/
4. Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning, 2nd edn. Springer, NY (2009). https://doi.org/10.1007/978-0-387-21606-5
5. Ho, T.: A data complexity analysis of comparative advantages of decision forest constructors. Pattern Anal. Appl. 5, 102–112 (2002). https://doi.org/10.1007/s100440200009