z-logo
open-access-imgOpen Access
Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules
Author(s) -
Ihor Subach,
Vitalii Fesokha
Publication year - 2017
Publication title -
information technology and security
Language(s) - English
Resource type - Journals
eISSN - 2518-1033
pISSN - 2411-1031
DOI - 10.20535/2411-1031.2017.5.2.136984
Subject(s) - computer science , fuzzy logic , anomaly detection , identification (biology) , cybernetics , data mining , anomaly (physics) , inference , rule of inference , adaptive neuro fuzzy inference system , fuzzy set , artificial intelligence , fuzzy rule , fuzzy set operations , fuzzy control system , botany , physics , biology , condensed matter physics

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here