1.
Abed IJ. Using Machine Learning to Detect Unauthorized Access in Database’s Log Files . JLMA [Internet]. 2024Dec.11 [cited 2025Oct.20];5(6):824-32. Available from: https://newinera.com/index.php/JournalLaMultiapp/article/view/1538