Return to Article Details A Survey on Enhanced Approaches for Cyber Security Challenges Based on Deep Fake Technology in Computing Networks Download Download PDF