[1]
“Using Information Technology Security to Protect the Network Models ”, مجلة المنصور, vol. 14, no. 1, pp. 164–178, Jan. 2023, Accessed: Nov. 21, 2025. [Online]. Available: https://www.journal.muc.edu.iq/journal/article/view/380