Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/tc.v20i2.4556
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v8i2.1815
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35457/antivirus.v18i1.3468
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33366/jast.v6i1.3297
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26905/jisad.v1i2.11101
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v12i02.1330
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59188/jurnalsostech.v5i1.31811
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32815/jpm.v5i2.1715
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33366/japi.v9i3.6271
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (216.201 KB) | DOI: 10.28926/briliant.v7i4.1024