1.
Mohammad Jafari, Amir H. Chinaei, Ken Barker, Mohammad Fathian. Role Mining in Access History Logs. ijcisim [Internet]. 2009 Apr. 1 [cited 2024 Sep. 28];1:8. Available from: https://cspub-ijcisim.org/index.php/ijcisim/article/view/17