1.
Shiny KV, Kumar A, Kumar A, Vardhan AH, Vardhan BH. Analysis and Detection of Unauthorized Applications by Using Decisions Tree Algorithm. IJRESM [Internet]. 2024 Apr. 2 [cited 2024 Nov. 23];7(3):102-6. Available from: https://journal.ijresm.com/index.php/ijresm/article/view/2972