Return to Article Details Construction method of cyber attacks classifier on government information resources Download Download PDF