[1]
“Comparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity”, Texa.Jour. of Engg. and Tech., vol. 23, pp. 14–19, Aug. 2023, Accessed: May 17, 2026. [Online]. Available: https://mail.zienjournals.com/index.php/tjet/article/view/4289