Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v9i3.44189
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4861
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51454/decode.v4i1.308
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (537.713 KB) | DOI: 10.30645/j-sakti.v3i1.91
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i1.196
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.520
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i1.184
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jseci.v2i02.4942
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/skanika.v8i1.3284
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.v8i4.5904