Return to Article Details Formulation of the scientific tasks for the potentially dangerous patterns of cyber-attacks development Download Download PDF