[1]
L. Danuartha, T. Faturrahman, M. Mu’adzarah, A. Bani Rusaji, and S. Wijirahayu, “Strategy Protecting Networking System from Trojan using Firewall and Encryption Data”, FUSION, vol. 1, no. 1, pp. 259–264, Jan. 2025.