1. Bapiyev, I.M., Aitchanov, B.H., Tereikovskyi, I.A., Tereikovska, L.A., Korchenko, A.A.: Deep neural networks in cyber attack detection systems. Int. J. Civil Eng. Technol. (IJCIET) 8(11), 1086–1092 (2017)
2. Chen, Q.-S., Zhang, X., Xiong, S.-H., Chen, X.-W.: Short-term power load forecasting with least squares support vector machines and wavelet transform. In: International Conference on Machine Learning and Cybernetics, vol. 3, pp. 1425–1429 (2008)
3. Dychka, I., Tereikovskyi, I., Tereikovska, L., Pogorelov, V., Mussiraliyeva, S.: Deobfuscation of computer virus malware code with value state dependence graph. In: Advances in Intelligent Systems and Computing, pp. 370–379 (2018).
https://doi.org/10.1007/978-3-319-91008-6
4. Hu, Z., Tereykovskiy, I.A., Tereykovska, L.O., Pogorelov, V.V.: Determination of structural parameters of multilayer perceptron designed to estimate parameters of technical systems. Int. J. Intell. Syst. Appl. (IJISA) 9(10), 57–62 (2017).
https://doi.org/10.5815/ijisa.2017.10.07
5. Kavitha, K.J., Shan, B.P.: Reversible joint watermarking for medical images and videos. Int. J. Eng. Manuf. (IJEM) 8(5), 10–21 (2018).
https://doi.org/10.5815/ijem.2018.05.02