Protecting the Confidentiality of Data Transmission and Receipt at the Security Operations Centre Using Machine-To-Machine (M2M) Communication Methods
Source:
Herald of Khmelnytskyi National University,Volume: 1,
Issue5,
p.66-73
(2023)
2
Views
20th International Conference on Computer Systems and Technologies, CompSysTech 2019
(2019):
8-18.