[1]
Asha Seshagiri, “METHODS FOR PREVENTING SQL INJECTION IN IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEMS”, tajet, vol. 6, no. 10, pp. 17–22, Oct. 2024.