“DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM”. Iraqi Journal of Information and Communication Technology 2, no. 2 (November 1, 2019): 25–43. Accessed October 8, 2024. https://ijict.edu.iq/index.php/ijict/article/view/67.