[1]
Israa Ezzat Salem et al.trans. 2022. Introduction to The Data Mining Techniques in Cybersecurity . Mesopotamian Journal of CyberSecurity. 2022, (May 2022), 28–37. DOI:https://doi.org/10.58496/MJCS/2022/004.