[1]
, H.K.S.A.K. 2014. Removal of Data Vulnerabilities Using SQL (Seqel). International Journal on Recent and Innovation Trends in Computing and Communication. 2, 5 (May 2014), 1092–1100. DOI:https://doi.org/10.17762/ijritcc.v2i5.3118.