[1]
Auliafitri, D. et al. 2024. Optimalisasi Pengujian Penetrasi: Penerapan Serangan MITM (Man in the Middle Attack) menggunakan Websploit. Journal of Internet and Software Engineering. 1, 3 (Jun. 2024), 12. DOI:https://doi.org/10.47134/pjise.v1i3.2620.