(1)
DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM. Iraqi Journal of ICT 2019, 2 (2), 25-43. https://doi.org/10.31987/ijict.2.2.67.