[1]
“The Use of Automated Techniques in Cybersecurity Operations: Supporting Threat Detection and Information Assurance in Modern Information Systems”, ASETR, vol. 14, no. 11, pp. 1–15, Nov. 2024, Accessed: Jun. 16, 2025. [Online]. Available: https://librasophia.com/index.php/ASETR/article/view/2024-Nov-04