Found 9 Documents
Search
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i4.2938
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2023.6.2.4265
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v16i3.2357.371-381
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v12i1.1199
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58602/jima-ilkom.v4i1.52
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58812/wsist.v3i01.1846
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/fifo.2024.v16i2.010
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/cdj.v5i3.28383
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60004/komunita.v4i4.302