[1]
“Effective Utilization of Data Mining Techniques for Digital Security”, int. jour. eng. com. sci, vol. 5, no. 12, Dec. 2016, Accessed: Dec. 05, 2025. [Online]. Available: http://www.ijecs.in/index.php/ijecs/article/view/3216