[1]
A. A. Abdulhameed, S. A. H. Alazawi, and G. M. Hassan, “An optimized model for network intrusion detection in the network operating system environment”, Mesopotamian Journal of CyberSecurity, vol. 4, no. 3, pp. 75–85, Nov. 2024.