(1)
Akbar Sya’bani, H.; Umam, C.; Handoko, L. B. Forensic Analysis of Podman Container Towards Metasploit Backdoor Using Checkpointctl. Inf. J. Ilm. Bid. Teknol. Inf. dan Komun. 2024, 9, 81-88.