1.
HKSAK. Removal of Data Vulnerabilities Using SQL (Seqel). IJRITCC [Internet]. 2014May31 [cited 2026Jan.21];2(5):1092-100. Available from: https://ijritcc.org/index.php/ijritcc/article/view/3118