{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
Alloghani, Mohamed, Dhiya Al-Jumeily, Abir Hussain, Jamila Mustafina, Thar Baker, and Ahmed J. Aljaaf. "\i Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities to Cyber Attacks\i0 ." In \i Nature-Inspired Computation in Data Mining and Machine Learning. Studies in Computational Intelligence\i0 ., 2020.\par \par Alloghani, Mohamed, Dhiya Al-Jumeily, Abir Hussain, Jamila Mustafina, Thar Baker, and Ahmed J. Aljaaf. "\i Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities\i0 ." In \i Nature-Inspired Computation in Data Mining and Machine Learning\i0 . Springer Natur, 2020.\par \par }