[1]
“Snort Versus Suricata in Intrusion Detection”, Iraqi Journal of ICT, vol. 7, no. 2, pp. 73–88, Aug. 2024, doi: 10.31987/ijict.7.2.290.