[1]
“An Effective Study on Database Intrusion Using Log Mining”, IJAERD, vol. 3, no. 3, pp. 29–32, Mar. 2016, Accessed: Sep. 13, 2025. [Online]. Available: https://ijaerd.org/index.php/IJAERD/article/view/1206