[1]
“Comparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity”, Texa.Jour. of Engg. and Tech., vol. 23, pp. 14–19, Aug. 2023, Accessed: May 18, 2026. [Online]. Available: https://zienjournals.com/index.php/tjet/article/view/4289