Found 9 Documents
Search
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v20i2.398
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i4.3295
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33365/jiiti.v2i1.939
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (589.619 KB) | DOI: 10.31294/simpatik.v1i1.217
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2024.9.3.230-243
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4718
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2025.8.1.5036
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2025.8.1.5107
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47747/ijmhrr.v6i1.2596