1. Improvement the schemes and models of detecting network traffic anomalies on computer systems
2. Method of constructing packet filtering rules. International conference on;madjid;Information science and communications technologies applications trends and opportunities (ICISCT),2019
3. Approaches for a Stand-alone Network Attack and Defense Platform Using Yersinia Toolkits;zhang;International Journal of All Research Education and Scientific Methods (IJARESM),2017
4. An Implementation of Firewall System Using MikroTik Router OS;abdulatteef;Journal of University of Anbar for Pure Science,2012
5. Construction of Schemes, Models and Algorithm for Detection Network Attacks in Computer Networks;rajaboevich;International Journal of Innovative Technology and Exploring Engineering (IJITEE),2019