[1]
A. Saputro, N. Saputro, and H. Wijayanto, “DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY”, csecurity, vol. 3, no. 2, pp. 22–27, Dec. 2020.