[1]
H. Akbar Sya’bani, C. Umam, and L. B. Handoko, “Forensic Analysis of Podman Container Towards Metasploit Backdoor Using Checkpointctl”, Inf. J. Ilm. Bid. Teknol. Inf. dan Komun., vol. 9, no. 1, pp. 81-88, Feb. 2024.