1.
HKSAK. Removal of Data Vulnerabilities Using SQL (Seqel). IJRITCC [Internet]. 2014May31 [cited 2025Sep.13];2(5):1092-100. Available from: https://ijritcc.org/index.php/ijritcc/article/view/3118