1.
Asha Seshagiri. METHODS FOR PREVENTING SQL INJECTION IN IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEMS. tajet [Internet]. 2024 Oct. 2 [cited 2025 Aug. 1];6(10):17-22. Available from: https://theamericanjournals.com/index.php/tajet/article/view/5492