“DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM”. Iraqi Journal of Information and Communication Technology, vol. 2, no. 2, Nov. 2019, pp. 25-43, https://doi.org/10.31987/ijict.2.2.67.