[1]
E. Dolan and R. Widayanti, “Implementation of Authentication Systems on Hotspot Network Users to Improve Computer Network Security”, IJCITSM, vol. 2, no. 1, pp. 88–94, Mar. 2022.