Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32528/justindo.v6i1.3944
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32528/justindo.v6i1.3801
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32528/justindo.v5i1.3415
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32528/justindo.v6i2.3945
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1000.453 KB) | DOI: 10.14421/csecurity.2018.1.1.1210
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (852.36 KB) | DOI: 10.14421/csecurity.2018.1.1.1235
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1780.98 KB) | DOI: 10.14421/csecurity.2018.1.1.1236
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (622.408 KB) | DOI: 10.14421/csecurity.2018.1.1.1237
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (324.204 KB) | DOI: 10.14421/csecurity.2019.2.1.1388
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (735.904 KB) | DOI: 10.14421/csecurity.2019.2.2.1600