Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Managing vulnerabilities during the development of a secure ETL processes
Salma Dammak; Faiza Ghozzi; Asma Sellami; Faiez Gargouri
International Journal of Information and Computer Security (IJICS), 2022 Vol.18 No.1/2, pp.75 - 104
14 - 13 =

Thank you for your feedback.