1.
Auliafitri D, RizkiSuro E, Malik MRM, Setiawan A. Optimalisasi Pengujian Penetrasi: Penerapan Serangan MITM (Man in the Middle Attack) menggunakan Websploit. PJISE [Internet]. 2024 Jun. 11 [cited 2025 May 29];1(3):12. Available from: https://journal.pubmedia.id/index.php/pjise/article/view/2620