Found 10 Documents
Search
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.Vol2.No.1.2016.pp.1-7
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (351.704 KB) | DOI: 10.15408/jti.v10i1.6821
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4554.622 KB) | DOI: 10.33369/pseudocode.1.2.90-96
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (548.973 KB) | DOI: 10.33369/pseudocode.4.2.180-189
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (524.559 KB) | DOI: 10.33369/pseudocode.2.1.1-9
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v22i2.2652
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2025.8.1.5004
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37905/jjbm.v6i3.29332
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/fifo.2024.v16i1.010
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v2i1.1050