[1]
“DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY”, csecurity, vol. 3, no. 2, pp. 22–27, Dec. 2020, doi: 10.14421/csecurity.2020.3.2.2150.