[1]
I. Subach and V. Fesokha, “Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules”, ITS, vol. 5, no. 2, pp. 145–152, Dec. 2017.