[1]
I. J. Abed, “Using Machine Learning to Detect Unauthorized Access in Database’s Log Files ”, JLMA, vol. 5, no. 6, pp. 824-832, Dec. 2024.