“An Effective Study on Database Intrusion Using Log Mining” (2016) International Journal of Advance Engineering and Research Development (IJAERD), 3(3), pp. 29–32. Available at: https://ijaerd.org/index.php/IJAERD/article/view/1206 (Accessed: 13 September 2025).