[1]
“Overview of Database Architecture and Security Measures – Attacks and Control Methods”, AJCIS, vol. 2, no. 2, Apr. 2014, Accessed: Mar. 14, 2025. [Online]. Available: https://ajouronline.com/index.php/AJCIS/article/view/759