1.
Using Information Technology Security to Protect the Network Models . Al-Mansour J. 2023;14(1):164-178. Accessed April 16, 2026. https://journal.muc.edu.iq/journal/article/view/380