[1]
Subach, I. and Fesokha, V. 2017. Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules. Collection "Information Technology and Security". 5, 2 (Dec. 2017), 145–152. DOI:https://doi.org/10.20535/2411-1031.2017.5.2.136984.