[1]
K. V. Shiny, A. Kumar, A. Kumar, A. H. Vardhan, and B. H. Vardhan, “Analysis and Detection of Unauthorized Applications by Using Decisions Tree Algorithm”, IJRESM, vol. 7, no. 3, pp. 102–106, Apr. 2024, doi: 10.5281/zenodo.10908753.