[1]
Sharayu Kadam and Radhika Bhoite, “Security and Identification of Internal Intrusions by Self-Monitoring ”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 11, no. 3, pp. 08–13, May 2025, doi: 10.32628/CSEIT25112861.