Shiny, K.V. (2024) “Analysis and Detection of Unauthorized Applications by Using Decisions Tree Algorithm”, International Journal of Research in Engineering, Science and Management, 7(3), pp. 102–106. Available at: https://journal.ijresm.com/index.php/ijresm/article/view/2972 (Accessed: 21 November 2024).