SUBACH, I.; FESOKHA, V. Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules. Collection "Information Technology and Security", [S. l.], v. 5, n. 2, p. 145–152, 2017. DOI: 10.20535/2411-1031.2017.5.2.136984. Disponível em: https://its.iszzi.kpi.ua/article/view/136984. Acesso em: 21 nov. 2024.