[1]
T. Wahyuningsih, I. Sembiring, A. Setiawan, and I. Setyawan, “Exploring network security threats through text mining techniques: a comprehensive analysis”, Comput Sci Inf Technol, vol. 4, no. 3, pp. 258–267, Nov. 2023.