أرسل هذا في رسالة قصيرة: A case study on attack detection capabilities between open-source intrusion detection systems

  _  _    __   __    ______     ___     _    _   
 | \| ||  \ \\/ //  /_   _//   / _ \\  | \  / || 
 |  ' ||   \ ` //   `-| |,-   | / \ || |  \/  || 
 | .  ||    | ||      | ||    | \_/ || | .  . || 
 |_|\_||    |_||      |_||     \___//  |_|\/|_|| 
 `-` -`     `-`'      `-`'     `---`   `-`  `-`