[1]
M. Z. S. Mohd Nasharuddin and A. Abubakar, “Analyzing Threat Level of the Backdoor Attack Method for an Organization’s Operation”, IJPCC, vol. 10, no. 2, pp. 51–59, Jul. 2024.