Found 9 Documents
Search
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (615.256 KB) | DOI: 10.33096/ilkom.v11i2.442.135-142
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v11i2.442.135-142
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (244.582 KB) | DOI: 10.14421/csecurity.2018.1.2.1370
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36499/jinrpl.v6i1.10143
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2023.6.2.4265
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v12i3.4358
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v16i3.2357.371-381
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v12i3.4358
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2025.8.2.5310