Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/TEKNOSI.v10i1.2024.17-26
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/businta.v6i1.534
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/businta.v8i1.676
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2023.6.2.4180
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56705/ijodas.v4i3.110
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/busiti.v4i1.1611
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36841/integritas.v8i1.3988
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/cerita.v10i1.2989
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70609/gtech.v9i1.5602