[1]
F. Firmansyah, B. Wibisana, and M. Jordan, “Analyze Threats in a Virtual Lab Network Using Live Forensic Methods on MetaRouter”, IJECSA, vol. 4, no. 1, pp. 1–12, Mar. 2025, doi: 10.30812/ijecsa.v4i1.4784.