(1)
An Effective Study on Database Intrusion Using Log Mining. IJAERD 2016, 3 (3), 29-32.