(1)
Subach, I.; Fesokha, V. Model of Detecting Cybernetic Attacks on Information-Telecommunication Systems Based on Description of Anomalies in Their Work by Weighed Fuzzy Rules. ITS 2017, 5, 145-152.