Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (622.408 KB) | DOI: 10.14421/csecurity.2018.1.1.1237
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (324.204 KB) | DOI: 10.14421/csecurity.2019.2.1.1388
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (735.904 KB) | DOI: 10.14421/csecurity.2019.2.2.1600
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (642.451 KB) | DOI: 10.55679/semantik.v4i2.5276
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v9i3.2151
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v9i3.2483
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1735.594 KB) | DOI: 10.30595/juita.v10i2.14490
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4714
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.6.630
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.1.78-89