“…The part of features of the attacks was admitted according to [28,29]. Table 1 Average number of rules, matrices and training steps of ASDCA for detection of typical classes of cyber-attacks in MCCS Note: * -according to data [1,2,15,24,28,29]; ** -features and their information content according to data [28,29]; *** -according to data [1,2,16,24]; **** -according to data [6,8,15,19,24] To test the effectiveness of the proposed model, a series of experiments for main attacks was conducted, shown in Table 1. The example of test results for attacks on SCADA systems is shown in Fig.…”