“DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM” (2019) Iraqi Journal of Information and Communication Technology, 2(2), pp. 25–43. doi:10.31987/ijict.2.2.67.