[1]
“A Review on Various Techniques of women security”, Int. J. Curr. Eng. Technol., vol. 6, no. 5, pp. 1811–1813, Oct. 2016, doi: 10.14741/.