An optimized model for network intrusion detection in the network operating system environment. Mesopotamian Journal of CyberSecurity, [S. l.], v. 4, n. 3, p. 75–85, 2024. DOI: 10.58496/MJCS/2024/017. Disponível em: https://mesopotamian.press/journals/index.php/CyberSecurity/article/view/583. Acesso em: 29 mar. 2025.