[1]
J. Upadhyaya, N. Panda, and A. A. Acharya, “Attack Generation and Vulnerability Discovery in Penetration Testing using Sql Injection”, Int. J. Comp. Sci. Eng., vol. 2, no. 3, pp. 167–173, Mar. 2014.