Login / Signup

Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks.

Bandr Fakiha
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2024)
Keyphrases
  • social networks
  • information security
  • real time
  • data mining
  • data processing
  • cost effective
  • critical infrastructure