[1]
“DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM”, Iraqi Journal of ICT, vol. 2, no. 2, pp. 25–43, Jun. 2019, doi: 10.31987/ijict.2.2.67.