Subach, I., & Fesokha, V. (2017). Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules. Collection "Information Technology and Security", 5(2), 145–152. https://doi.org/10.20535/2411-1031.2017.5.2.136984