Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.425 KB)
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (60.908 KB) | DOI: 10.26555/jifo.v9i2.a2965
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (675.64 KB) | DOI: 10.26555/jifo.v10i2.a5073
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (447.949 KB) | DOI: 10.26555/jifo.v11i2.a5807
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (784.276 KB)
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35799/jmuo.8.3.2019.25584
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (60.908 KB) | DOI: 10.26555/jifo.v9i2.a2965
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jifo.v10i2.a5073
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35329/jiik.v5i2.99
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2020.3.2.2082