1.
Subach I, Fesokha V. Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules. ITS [Internet]. 2017Dec.31 [cited 2024Apr.18];5(2):145-52. Available from: https://its.iszzi.kpi.ua/article/view/136984