1.
An Effective Study on Database Intrusion Using Log Mining. IJAERD [Internet]. 2016 Mar. 25 [cited 2025 Sep. 13];3(3):29-32. Available from: https://ijaerd.org/index.php/IJAERD/article/view/1206