has been cited by the following article(s):
|
[1]
|
EVALUATION OF TWO-FACTOR AUTHENTICATION METHOD IN IMPROVING AUTHENTICATION SECURITY ON SSL VPN (Case Study of PT. Kanmo Group)
Jurnal Riset Informatika,
2025
DOI:10.34288/jri.v7i3.367
|
|
|
|
|
[2]
|
Reference Module in Social Sciences
2024
DOI:10.1016/B978-0-323-95689-5.00083-3
|
|
|
|
|
[3]
|
Remote Access Penetration Testing Simulation on a Mobile Phone using CamPhish, Storm-Breaker, & Ghost Framework
2023 13th International Conference on Software Technology and Engineering (ICSTE),
2023
DOI:10.1109/ICSTE61649.2023.00011
|
|
|
|