Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i4.2156
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i1.2321
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.47267
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.47270
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.48157
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/humanitas.v17i2.17045
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2021.4.1.2449
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24002/jik.v21i1.7020
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijeis.97043