Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/visikes.v20i2Supp.5921
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (406.438 KB) | DOI: 10.33633/visikes.v18i2.2773
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/visikes.v20i2Supp.5775
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (784.836 KB) | DOI: 10.33633/visikes.v16i1.1859
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (24.24 KB) | DOI: 10.36987/jes.v9i1.2559
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jkesvo.72216
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33560/jmiki.v9i2.318
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2020.3.2.2152
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25047/jkes.v10i2.322
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/ja.v5i3.692