[1]
R. K. Sharma, D. K. Singh, A. kumar, and A. P. Burnwal, “Use of Fuzzy Logic in Cyber Security System: Cyber Threat Intelligence”, ijsrtm, vol. 11, no. 3, pp. 10–19, Aug. 2023.