Login / Signup
Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks.
Bandr Fakiha
Published in:
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2024)
Keyphrases
</>
social networks
information security
real time
data mining
data processing
cost effective
critical infrastructure