Filter By Year
1945 2024
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jkap.8426
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (325.369 KB) | DOI: 10.31289/jite.v3i1.2601
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26905/afr.v2i1.3260
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (624.434 KB) | DOI: 10.30645/ijistech.v3i1.32
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (526.063 KB) | DOI: 10.34010/miu.v17i1.2228
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/humaniora.v1i1.2155
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v7i1.2220
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (580.029 KB) | DOI: 10.34306/ajri.v1i1.16
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (324.204 KB) | DOI: 10.14421/csecurity.2019.2.1.1388