//-->
On employment of fuzzy sets theory for solving the problem of providing for information security
Čereškin, Dmitry S., (1996)