[1]
K. Al-Shehri, “Optimizing ETL Processes in Data Pipelines for High-Volume Cybersecurity Data Streams”, MZCJ, vol. 3, no. 2, Dec. 2022.