Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2022.5.1.3641
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31603/komtika.v6i2.7943
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (816.185 KB) | DOI: 10.28989/compiler.v11i2.1369
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i1.101
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36595/misi.v2i1.65
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2022.5.2.3935
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (537 KB)
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (324.96 KB) | DOI: 10.26798/jiko.v7i1.685
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24076/joism.2023v5i1.1157