Comparative Analysis of the Clustering Methods Application for Detecting Anomalies in the Information Processes of ICS Networks Exposed to Cyberattacks | IEEE Conference Publication | IEEE Xplore