1. 1. GRAHAM D. (2010). Cyber threats and the law of war. J. Nat'l Sec. L. & Pol'y Т. 4. P. 87.
2. 2. АLGULIEV R. et al. (2014). Analysis of methods for network security monitoring. Problems of Information Technology. P. 60-68.
3. 3. MUZALEVSKIY F. Information security monitoring. (in Russian). Available from: https://rtmtech.ru/articles/monitoring-informatsionnoj- bezopasnosti. [Accessed 14/04/2022].
4. The computer expression recognition toolbox (CERT);LITTLEWORT;IEEE International Conference on Automatic Face & Gesture Recognition (FG),2011
5. 5. Software Engineering Institute. Available from: https://www.sei.cmu.edu/about/divisions/cert/index.cfm [Accessed 04/03/2020].