Shiny, K.V. (2024) “Analysis and Detection of Unauthorized Applications by Using Decisions Tree Algorithm”, International Journal of Research in Engineering, Science and Management, 7(3), pp. 102–106. doi:10.5281/zenodo.10908753.