[1]
2019. DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM. Iraqi Journal of Information and Communication Technology. 2, 2 (Jun. 2019), 25–43. DOI:https://doi.org/10.31987/ijict.2.2.67.