1.
An Effective Study on Database Intrusion Using Log Mining. IJAERD. 2016;3(3):29-32. Accessed September 13, 2025. https://ijaerd.org/index.php/IJAERD/article/view/1206