Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55175/cdk.v43i6.67
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55175/cdk.v41i8.1111
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2020.3.2.2152
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jphtcr.v7i1.22148
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34305/jikbh.v15i01.1045
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/crepido.5.2.174-183
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/crepido.4.1.1-11
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/crepido.3.1.22-32
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60074/ihelis.v1i2.18
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/biomedich.2025.142.943-949