Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/informatika.v6i3.9419
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (498.113 KB) | DOI: 10.31294/bi.v9i2.11501
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/informatika.v5i4.7575
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/swabumi.v10i1.12294
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/elkom.v14i1.319
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/coscience.v4i1.1996
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/jati.v7i1.6000
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/jati.v7i1.6006
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58794/jekin.v4i2.718
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35457/antivirus.v18i2.3936