Author:
Hermawan Angga Fantiya,Renaldi Faiza,Umbara Fajri Rakhmat
Reference42 articles.
1. I. T. Plata and J. L. Calpito, “Application of time-based one time password (TOTP) algorithm for human resource e-leave tracking web app,” Int. J. Sci. Technol. Res., vol. 9, no. 3, pp. 4070–4077, 2020.
2. M. Awad, Z. Al-qudah, S. Idwan, A. H. Jallad, and R. Al Khaimah, “Password Security: Password Behavior Analysis at a Small University,” IEEE Xplore, pp. 1–4, 2016.
3. V. Grover, “An Efficient Brute Force Attack Handling Techniques for Server Virtualization,” Proc. Int. Conf. Innov. Comput. Commun. 2020, pp. 1–4, 2020.
4. D. Buil-Gil, F. Miŕo-Llinares, A. Moneva, S. Kemp, and N. D´ıaz-Casta no, “Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK,” Eur. Soc., vol. 0, no. 0, pp. 1–13, 2020.
5. H. S. Lallie et al., “Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the paandemic,” Comput. Secur., vol. 105, pp. 1–20, 2021.