DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM. Iraqi Journal of Information and Communication Technology, [S. l.], v. 2, n. 2, p. 25–43, 2019. DOI: 10.31987/ijict.2.2.67. Disponível em: https://ijict.edu.iq/index.php/ijict/article/view/67.. Acesso em: 17 apr. 2025.