[1]
K. V. Shiny, A. Kumar, A. Kumar, A. H. Vardhan, and B. H. Vardhan, “Analysis and Detection of Unauthorized Applications by Using Decisions Tree Algorithm”, IJRESM, vol. 7, no. 3, pp. 102–106, Apr. 2024, Accessed: Nov. 23, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/2972