Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/infotekmesin.v12i1.519
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/infotekmesin.v15i1.2074
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47767/sehati_abdimas.v7i1.931
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30743/infotekjar.v6i2.4801
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/jti.v10i2.7027
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/njpi.2023.v3i1-5
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2025.8.2.5113