Found 9 Documents
Search
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2020703326
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2020701928
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v7i1.11913
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (521.944 KB) | DOI: 10.11591/eecsi.v4.1039
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v8i3.76.220-225
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (622.408 KB) | DOI: 10.14421/csecurity.2018.1.1.1237
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v7i2.135
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1735.594 KB) | DOI: 10.30595/juita.v10i2.14490
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/jitk.v10i2.5534