Posts

Showing posts from May, 2022

Diagram 2

Image
  Data privacy application procedure (Author's work)

Diagram 1

Image
  Recent Malware attacks and their classification. (Author's Work)