[1]
“Security in Data Mining- A Comprehensive Survey”, GJCST, vol. 16, no. C5, pp. 51–72, Oct. 2016, Accessed: Feb. 04, 2026. [Online]. Available: https://testing.computerresearch.org/index.php/computer/article/view/1464