1.
DESIGNING RULES TO IMPLEMENT RECONNAISSANCE AND UNAUTHORIZED ACCESS ATTACKS FOR INTRUSION DETECTION SYSTEM. Iraqi Journal of ICT [Internet]. 2019 Jun. 30 [cited 2025 Mar. 26];2(2):25-43. Available from: https://ijict.edu.iq/index.php/ijict/article/view/67