Return to Issue Details MODEL AND METHODS OF DETECTION OF A LARGE-SCALE ATTACK IN THE IOT ENVIRONMENT Download Download PDF