Drupal-Bibcite0<style face="normal" font="default" size="100%">Protecting the Confidentiality of Data Transmission and Receipt at the Security Operations Centre Using Machine-To-Machine (M2M) Communication Methods</style><style face="normal" font="default" size="100%">Protecting the Confidentiality of Data Transmission and Receipt at the Security Operations Centre Using Machine-To-Machine (M2M) Communication Methods</style>