[1]
“Analysis of Cyber Security Methodologies: A Direct Comparison of Current Versus Possible DoD Cyber Assets”, ISER, vol. 6, no. 2, pp. 101–108, Mar. 2019, doi: 10.37266/ISER.2018v6i2.pp101-108.