Al-Shehri, K. (2022) “Optimizing ETL Processes in Data Pipelines for High-Volume Cybersecurity Data Streams”, MZ Computing Journal, 3(2). Available at: http://mzresearch.com/index.php/MZCJ/article/view/299 (Accessed: 18 July 2025).