Return to Issue Details Modeling the Identification of the Profile of Cyber Attacks Based on Analysis of the Device Behavior in the Telecommunication Services Provider Network Download Download PDF