[1]
Y. Rosmansyah, I. L. S. Hendarto, and D. Pratama, “Impersonation Attack-Defense Tree”, Int. J. Emerg. Technol. Learn., vol. 15, no. 19, pp. pp. 239–246, Oct. 2020.