[1]
2016. An Effective Study on Database Intrusion Using Log Mining. International Journal of Advance Engineering and Research Development (IJAERD). 3, 3 (Mar. 2016), 29–32.