Subach, I. and Fesokha, V. (2017) “Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules”, Information Technology and Security, 5(2), pp. 145–152. doi: 10.20535/2411-1031.2017.5.2.136984.