Return to Article Details Development detection cyberatacs methods in the critical infrastructure objects information systems overview and prospects Download Download PDF