1.
Wahyuningsih T, Sembiring I, Setiawan A, Setyawan I. Exploring network security threats through text mining techniques: a comprehensive analysis. Comput Sci Inf Technol [Internet]. 2023 Nov. 1 [cited 2026 Apr. 18];4(3):258-67. Available from: http://csit.iaesprime.org/index.php/csit/article/view/25