Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v8i2.733
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jpmi.21
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v4i4.2293
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2021.4.1.2379
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37366/jabmas.v3i02.1448
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37034/jsisfotek.v5i1.253
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v10i2.1084
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38204/tematik.v10i1.1335