Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i2.1686
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i1.1852
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2015
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (537.713 KB) | DOI: 10.30645/j-sakti.v3i1.91
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1078.548 KB) | DOI: 10.30645/j-sakti.v4i1.196
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.520
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (633.749 KB) | DOI: 10.30645/j-sakti.v4i1.184
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jstie.v11i3.26544
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v9i3.44189
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4861