Subach, Ihor, and Vitalii Fesokha. “Model of Detecting Cybernetic Attacks on Information-Telecommunication Systems Based on Description of Anomalies in Their Work by Weighed Fuzzy Rules”. Collection "Information Technology and Security" 5, no. 2 (December 31, 2017): 145–152. Accessed November 21, 2024. https://its.iszzi.kpi.ua/article/view/136984.