Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2021.4.1.2379
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37366/jabmas.v3i02.1448
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37034/jsisfotek.v5i1.253
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38204/tematik.v10i1.1335
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34012/jutikomp.v7i1.4761
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55123/jumintal.v2i2.2581
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/tc.v22i1.7049
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v12i1.1325
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v12i1.1322
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v12i1.1214