Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v4i2.2692
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31284/j.adipati.2023.v2i2.4658
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v13i1.5583
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32546/jusin.v5i2.2854
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.1.4555
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4861
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37159/jii.v9i3.106
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v14i1.4396
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51454/decode.v4i3.602
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32409/jikstik.24.1.3691