[1]
Shiny, K.V. et al. 2024. Analysis and Detection of Unauthorized Applications by Using Decisions Tree Algorithm. International Journal of Research in Engineering, Science and Management. 7, 3 (Apr. 2024), 102–106. DOI:https://doi.org/10.5281/zenodo.10908753.