“Overview of Database Architecture and Security Measures – Attacks and Control Methods” (2014) Asian Journal of Computer and Information Systems, 2(2). Available at: https://ajouronline.com/index.php/AJCIS/article/view/759 (Accessed: 14 March 2025).