Subach, Ihor, and Vitalii Fesokha. “Model of Detecting Cybernetic Attacks on Information-Telecommunication Systems Based on Description of Anomalies in Their Work by Weighed Fuzzy Rules”. Information Technology and Security 5, no. 2 (December 31, 2017): 145–152. Accessed September 23, 2021. http://its.iszzi.kpi.ua/article/view/136984.