(1)
Shiny, K. V.; Kumar, A.; Kumar, A.; Vardhan, A. H.; Vardhan, B. H. Analysis and Detection of Unauthorized Applications by Using Decisions Tree Algorithm. IJRESM 2024, 7 (3), 102-106. https://doi.org/10.5281/zenodo.10908753.