Return to Article Details Detection of Cyber Extremism Objects Through Utilizing Different Versions of YOLOv8 Model to Determine their Performance Download Download PDF