1.
Azmi F, Kalsum TU, Alamsyah H. Analysis and Application of Access Control List (ACL) Methods on Computer Networks. j.komputer, j.informasi, j.teknologi [Internet]. 2022 Jun. 24 [cited 2025 May 9];2(1):81–88. Available from: https://penerbitadm.pubmedia.id/index.php/KOMITEK/article/view/642