Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32531/jelekn.v7i2.400
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (333.496 KB) | DOI: 10.21927/ijubi.v1i1.878
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (24.361 KB) | DOI: 10.21927/ijubi.v2i1.917
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (203.172 KB) | DOI: 10.21927/ijubi.v1i2.890
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.752 KB) | DOI: 10.14421/csecurity.2019.2.2.1455
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2021.4.1.2439
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (536.094 KB) | DOI: 10.30734/j-abdipamas.v3i2.599
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46306/jub.v4i1.155
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38204/darmaabdikarya.v3i2.2093