1.
Subach I, Fesokha V. Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules. ITS [Internet]. 2017Dec.31 [cited 2021Sep.21];5(2):145-52. Available from: http://its.iszzi.kpi.ua/article/view/136984