Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/italic.v1i1.166
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2023.6.2.4075
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v4i1.80
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v5i3.310
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v5i1.159
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v1i1.10
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/mentari.v2i2.487
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v6i2.736
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/ijiis.v7i4.230
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (983.056 KB) | DOI: 10.34306/ijcitsm.v1i1.8