Found 10 Documents
Search
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v4i1.1902
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2021.4.1.2372
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (372.071 KB) | DOI: 10.33050/icit.v8i2.2407
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (346.462 KB) | DOI: 10.35746/bakwan.v2i1.210
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (516.905 KB) | DOI: 10.35746/bakwan.v2i2.269
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v23i2.3371
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v23i2.3371
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v24i2.4485
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v4i2.4980