Return to Article Details Analysis and Detection of Unauthorized Applications by Using Decisions Tree Algorithm Download Download PDF