[1]
Al-Shehri, K. 2022. Optimizing ETL Processes in Data Pipelines for High-Volume Cybersecurity Data Streams. MZ Computing Journal. 3, 2 (Dec. 2022).