1.
Akbar Sya’bani H, Umam C, Handoko LB. Forensic Analysis of Podman Container Towards Metasploit Backdoor Using Checkpointctl. Inf. J. Ilm. Bid. Teknol. Inf. dan Komun. [Internet]. 2024Feb.9 [cited 2025Apr.22];9(1):81-8. Available from: https://ejournal.unitomo.ac.id/index.php/inform/article/view/7498