Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (606.253 KB) | DOI: 10.30645/j-sakti.v4i1.183
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.219
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.665
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (633.749 KB) | DOI: 10.30645/j-sakti.v4i1.184
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.221
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v9i3.44189
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4861
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.480
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (789.827 KB) | DOI: 10.30645/j-sakti.v5i2.398
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (537.713 KB) | DOI: 10.30645/j-sakti.v3i1.91