[1]
“The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS”, jitk, vol. 7, no. 2, pp. 105–110, Feb. 2022, doi: 10.33480/jitk.v7i2.2786.