[1]
F. Azmi, T. U. . Kalsum, and H. . Alamsyah, “Analysis and Application of Access Control List (ACL) Methods on Computer Networks”, j.komputer, j.informasi, j.teknologi, vol. 2, no. 1, pp. 81–88, Jun. 2022.