Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (723.585 KB)
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (941.493 KB) | DOI: 10.28989/compiler.v8i2.525
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (899.218 KB) | DOI: 10.28989/compiler.v7i2.369
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v5i1.1729
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v5i1.1734
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2022.5.1.3641
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (941.493 KB) | DOI: 10.28989/compiler.v8i2.525
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24076/joism.2023v5i1.1157
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar
Publisher :
Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v13i2.1094