[1]
S. Kumar Tomar and P. Singh, “Cyber Security Methodologies and Attack Management ”, J. Manage. Serv. Sci., vol. 1, no. 1, pp. 1–8, Mar. 2021.