(1)
Al-Shehri, K. Optimizing ETL Processes in Data Pipelines for High-Volume Cybersecurity Data Streams. MZCJ 2022, 3.