Volume- 9
Issue- 5
Year- 2022

Using Different Methodologies of Data Science to Find Comparison Between Them for Cyber-Security

Sangeeta Devi | Pranjal Maurya | Munish Saran | Rajan Kumar Yadav | Upendra Nath Tripathi

DOI: 10.55524/ijirem.2022.9.5.7 | DOI URL: https://doi.org/10.55524/ijirem.2022.9.5.7 Crossref

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)

Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment

Download Full Paper

Download PDF

No. of Downloads: 27 | No. of Views: 708

Indexed by

Crossref logo