[1]
A. Wijayanto, I. Riadi, Y. Prayudi, and T. Sudinugraha, “Network Forensics Against Address Resolution Protocol Spoofing Attacks Using Trigger, Acquire, Analysis, Report, Action Method”, Register: Jurnal Ilmiah Teknologi Sistem Informasi, vol. 8, no. 2, pp. 156–169, Jan. 2023.