SUBACH, I.; FESOKHA, V. Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules. Information Technology and Security, [S. l.], v. 5, n. 2, p. 145–152, 2017. DOI: 10.20535/2411-1031.2017.5.2.136984. Disponível em: http://its.iszzi.kpi.ua/article/view/136984. Acesso em: 23 sep. 2021.