1.
DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM. Iraqi Journal of ICT. 2019;2(2):25-43. doi:10.31987/ijict.2.2.67