[1]
H. K. S. A. K., “Removal of Data Vulnerabilities Using SQL (Seqel)”, IJRITCC, vol. 2, no. 5, pp. 1092–1100, May 2014.