[1]
“Using Information Technology Security to Protect the Network Models ”, مجلة المنصور, vol. 14, no. 1, pp. 164–178, Jan. 2023, Accessed: Oct. 01, 2025. [Online]. Available: https://www.journal.muc.edu.iq/journal/article/view/380