NoYearTitleLinkAuthor
1
Author
2
Author
3
Author
4
12015Application of M2M to detect the air pollutionhttps://ieeexplore.ieee.org
/abstract/document/7231441
MMAADR
22016Performance analysis of container-based hadoop cluster: Openvz and lxchttps://ieeexplore.ieee.org
/abstract/document/7571957
ADRMAN
32020Analysis of Spreading Factor Variations on LoRa in Rural Areashttps://ieeexplore.ieee.org
/abstract/document/8969846/
ADRUIW
42018Utilization of Onboard Diagnostic II (OBD-II) on Four Wheel Vehicles for Car Data Recorder Prototypehttps://ieeexplore.ieee.org
/abstract/document/8528741/
ENDADR
52019Smart pot implementation using fuzzy logichttps://iopscience.iop.org
/article/10.1088/1742-6596/1192/1/012058/meta
SKHADR
62015Prototype of microcontroller-based odometer reading for early warning in the vehicle lubricants replacementhttps://ieeexplore.ieee.org
/abstract/document/7231417
ADR
72015Link Failure Emulation with Dijkstra and Bellman-Ford Algorithm in Software Defined Network Architecture (Case Study: Telkom University Topology)https://ieeexplore.ieee.org
/abstract/document/8528809
ADRMAN
82014Cyber physical system: Paper surveyhttps://ieeexplore.ieee.org
/abstract/document/7013187
AJGADR
92019Smart Shopping Prediction on Smart Shopping With Linear Regression Methodhttps://ieeexplore.ieee.org
/abstract/document/8835271/
MMAAJG
102019Comparative Analysis of Mesh and Star Topologies in Improving Smart Fire Alarmshttps://ieeexplore.ieee.org
/abstract/document/8985889
MMAAJG
112019An Analysis on RPL Routing over IPv6 WSN Mobility and Transmission Rangehttps://ieeexplore.ieee.org
/abstract/document/8909501
MMAAJG
122018Prediction of Smarthphone Charging using K-Nearest Neighbor Machine Learninghttps://ieeexplore.ieee.org
/abstract/document/8780497/
MMAAJG
132018Distributed Campus Bike Sharing System Based-on Internet of Things (IoT)https://ieeexplore.ieee.org
/abstract/document/8528778
AJGMMA
142019Design and implementation of smart advertisement display board prototypehttps://ieeexplore.ieee.org
/abstract/document/8884289
DWSCWWEND
152020The Analysis of User Intention Detection Related to Conventional Poster Advertisement by Using The Features of Face and Eye (s)https://ieeexplore.ieee.org
/abstract/document/9166386/
DWSCWW
162019Development of Test Environment Platform for IMA using COTS componentshttps://ieeexplore.ieee.org/
abstract/document/8884322/
CWW
172017Smart city services: A systematic literature reviewhttps://ieeexplore.ieee.org
/abstract/document/8267944
DOK
182017Road traffic signal control using cyber physical social systemhttps://ieeexplore.ieee.org
/abstract/document/8267947/
DOK
192016The prototype of automated doors and windows by using voice commandshttps://ieeexplore.ieee.org
/abstract/document/7873859
DWSAJG
202017Design and implementation of surveillance embedded IP camera with improved image quality using Gamma Correction for surveillance camerahttps://ieeexplore.ieee.org
/abstract/document/8011862/
CWWDWS
212017The performance comparison of forwarding mechanism between IPv4 and Named Data Networking (NDN). Case study: A node compromised by the prefix hijackhttps://ieeexplore.ieee.org
/abstract/document/8257129/
DWS
222017Performance comparative analysis between ARAN and SAODV on VANET facing the blackholehttps://ieeexplore.ieee.org
/abstract/document/8253251/
DWS
232017The validated voice recognition measurement of several tribes in Indonesia using EasyVR 3.0. Case study: the prototype of automated doorshttps://ieeexplore.ieee.org
/abstract/document/8251857/
DWSEND
242015Comparative analysis of Voice over Internet Protocol (VoIP) quality on Priority Queue (PQ) and Class-Based Queue (CBQ) management system using link-sharing mechanism settinghttps://ieeexplore.ieee.org
/abstract/document/7231462/
FAZDWS
252018Design and implementation of human detection feature on surveillance embedded IP camerahttps://ieeexplore.ieee.org
/abstract/document/8693180/
DWSCWW
262016Design and implementation of encrypted SMS on Android smartphone combining ECDSA-ECDH and AEShttps://ieeexplore.ieee.org
/abstract/document/7878165/
DWS
272019The Prototype of Hand Gesture Recognition for Elderly People to Control Connected Home Deviceshttps://iopscience.iop.org
/article/10.1088/1742-6596/1201/1/012042/meta
EMJENDDWS
282018Analysis and Classification of Danger Level in Android Applications Using Naive Bayes Algorithmhttps://ieeexplore.ieee.org
/abstract/document/8528733/
PMNEMJ
292016Swap files Anti-Forensics on Linuxhttps://ieeexplore.ieee.org
/abstract/document/7878175/
EMJ
302015Design and implementation of secure fingerprint template using key binding scheme and random triangle hashing schemehttps://ieeexplore.ieee.org
/abstract/document/7231455
EMJ
312018Design and implementation of smart bath water heater using arduinohttps://ieeexplore.ieee.org
/abstract/document/8528772/
ENDSPO
322017Improved image quality on surveillance embedded IP camera by reducing noiseshttps://ieeexplore.ieee.org
/abstract/document/8257102
ENDDWSCWW
332017The validated voice recognition measurement of several tribes in Indonesia using easy VR 3.0. Case study: The prototype of automated doorshttps://ieeexplore.ieee.org
/abstract/document/8251857/
DWSEND
342015Analysis of liveline addition as the new time constraint and the earliest deadline earliest liveline first (EDELF) algorithm in real time systemhttps://ieeexplore.ieee.org
/abstract/document/7231464/
FAZEND
352006A flexible vital sign representation framework for mobile healthcarehttps://ieeexplore.ieee.org
/abstract/document/4205161
ERF
362007Modeling context and exchange format for context-aware computinghttps://ieeexplore.ieee.org
/abstract/document/4451440/
ERF
372013Digital image compression using graph coloring quantization based on wavelet-SVDhttps://iopscience.iop.org
/article/10.1088/1742-6596/423/1/012019/meta
FAZ
382010Wireless multi-path TCP Westwood+ modification to achieve fairness in HSDPAhttps://ieeexplore.ieee.org
/abstract/document/5703718
HHNFAZ
392016Comparison of data acquisition technique using logical extraction method on Unrooted Android Devicehttps://ieeexplore.ieee.org
/abstract/document/7571934
EMJFAZ
402015The detection of ddos flooding attack using hybrid analysis in ipv6 networkshttps://ieeexplore.ieee.org
/abstract/document/7231429
FAZ
412018An efficient key generation method in audio zero-Watermarkinghttps://ieeexplore.ieee.org
/abstract/document/6079595
FAZ
422015Watermarking QR codehttps://ieeexplore.ieee.org
/abstract/document/7371041/
FAZ
432017Prototyping design of a low-cost bike sharing system for smart city applicationhttps://ieeexplore.ieee.org
/abstract/document/8288882
FBW
442018Development of long-range communication system for fishermen: an initial studyhttps://ieeexplore.ieee.org
/abstract/document/8706564/
FBW
452018Functionality test of communication systems based on Lora technology in oil palm plantations areahttps://ieeexplore.ieee.org
/abstract/document/8706854/
FBW
462015Flexible data sharing architecture of WiMAX heterogeneous Multiprocessor System on Chiphttps://ieeexplore.ieee.org
/abstract/document/7401665
FBW
472018An Inter-Processor Communication (IPC) Data Sharing Architecture in Heterogeneous MPSoC for OFDMA.https://www.researchgate.net
/profile/Rachmad_V_W_
Putra/publication
/322525611_An_inter-processor_communication
_IPC_data_sharing_architecture_in
_heterogeneous_MPSoC_
for_OFDMA/links/
5b36f07f4585150d23e511fa/An-inter-processor-communication
-IPC-data-sharing-architecture-in-heterogeneous-MPSoC-for-OFDMA.pdf
FBW
482016Implementation of Dynamic Time Warping algorithm on an Android based application to write and pronounce Hijaiyah lettershttps://ieeexplore.ieee.org
/abstract/document/7577529/
GMO
492017Factors affecting the implementation of information assurance for eGovernment in Indonesiahttps://ieeexplore.ieee.org
/abstract/document/8356388
GMO
502014MOOCs as an alternative to distance learning model for University in Indonesiahttps://ieeexplore.ieee.org
/abstract/document/7013170
GMO
512018Analyzes of cybercrime expansion in Indonesia and preventive actionshttps://iopscience.iop.org
/article/10.1088/1757-899X/434/1/012257/meta
GMO
522018Investigating Factors in Information Assurance Implementation: Towards Developing an Information Assurance Framework for eGovernment in Indonesiahttps://ieeexplore.ieee.org
/abstract/document/8695932
GMO
532018Towards Confirming an Information Assurance Framework for eGovernment in Indonesiahttps://ieeexplore.ieee.org
/abstract/document/8550010
GMO
542019Implementation of advanced encryption standard for file security in stego-objecthttps://iopscience.iop.org
/article/10.1088/1742-6596/1402/6/066095/meta
GMO
552016Firefly algorithm for log-likelihood optimization problem on speech recognitionhttps://ieeexplore.ieee.org
/abstract/document/7571921/
HHN
562015Near Lossless Seismic Data Compression Using Signal Projection Techniquehttps://www.researchgate.net
/profile/Hilal_Nuha/publication
/314095850_NEAR_LOSSLESS_
SEISMIC_DATA_COMPRESSION_
USING_SIGNAL_PROJECTION_
TECHNIQUE/links
/58b54a9592851ca13e529f1b
/NEAR-LOSSLESS-SEISMIC-DATA-COMPRESSION-USING-SIGNAL-PROJECTION-TECHNIQUE.pdf
HHN
572015Fractional fourier transform for decreasing seismic data lossy compression distortionhttps://ieeexplore.ieee.org
/abstract/document/7231491
HHNNGS
582017Seismic Data Compression using Signal Alignment and PCAhttps://ieeexplore.ieee.org
/abstract/document/8448168/
HHN
592016Digital forensic analysis of Telegram Messenger on Android deviceshttps://ieeexplore.ieee.org
/abstract/document/7910263/
MAN
602016Efficient and secure data delivery in software defined WBAN for virtual hospitalhttps://ieeexplore.ieee.org
/abstract/document/7814973
MAN
61Comparative Analysis of K-Nearest Neighbor and Decision Tree in Detecting Distributed Denial of Servicehttps://ieeexplore.ieee.org
/abstract/document/9166380/
PMNMAN
62Using Load Balancing Scheme on Web Serverhttps://ieeexplore.ieee.org
/abstract/document/8528803
MANMMA
63Digital forensics study of internet messenger: Line artifact analysis in Android OShttps://ieeexplore.ieee.org
/abstract/document/7814959
MAN
642019Quality of Service (QoS) Comparison Analysis of Snort IDS and Bro IDS Application in Software Define Network (SDN) Architecturehttps://ieeexplore.ieee.org
/abstract/document/8835211/
PMNMAN
652020The qos improvement using cdn for live video streaming with hlshttps://ieeexplore.ieee.org
/abstract/document/9079332/
DWSENDMKY
662015Forest fire detection system reliability test using wireless sensor network and OpenMTC communication platformhttps://ieeexplore.ieee.org
/abstract/document/7231402/
NGSSPOMMACWWMMA
672013Mobile tracking system using OpenMTC platform based on event driven methodhttps://ieeexplore.ieee.org
/abstract/document/6758523/
MMAVRA
682013Electrocardiagram monitoring on OpenMTC platformhttps://www.researchgate.net
/profile/Achmad_Rizal4/
publication/258521272_
Electrocardiagram_Monitoring
_On_OpenMTC_Platform/links
/559f426508aeb40ee93c36ba
/Electrocardiagram-Monitoring-On-OpenMTC-Platform.pdf
VRAMMA
692013Transaction level modeling for early verification on embedded system designhttps://ieeexplore.ieee.org
/abstract/document/5222871/
MMA
702018High Performance Streaming Based on H264 and Real Time Messaging Protocol (RTMP)https://ieeexplore.ieee.org
/abstract/document/8528770/
MMA
712019Improving adaboost-based intrusion detection system (IDS) performance on CIC IDS 2017 datasethttps://iopscience.iop.org
/article/10.1088/1742-6596/1192/1/012018/meta
PMNNGS
722017Automation canal intake control system using fuzzy logic and internet of things (iot)https://ieeexplore.ieee.org
/abstract/document/8528756
NGSSPO
732018Energy efficient IoT thermometer based on fuzzy logic for fever monitoringhttps://scholar.google.com
/scholar?luster=
12427688929205430386&hl
=en&oi=scholarr
SMDNGS
742016Intrusion Detection System (IDS) server placement analysis in cloud computinghttps://ieeexplore.ieee.org
/abstract/document/7571954/
FANGS
752018Design and implementation adaptive Intrusion Prevention System (IPS) for attack prevention in software-defined network (SDN) architecturehttps://ieeexplore.ieee.org
/abstract/document/8528735/
NGSMAN
762018Equal-Cost Multipath Routing in Data Center Network Based on Software Defined Networkhttps://ieeexplore.ieee.org
/abstract/document/8528730/
NGSMAN
772016Using multimedia presentations to enhance the judiciary’s technical understanding of digital forensic concepts: An indonesian case studyhttps://ieeexplore.ieee.org
/abstract/document/7427883/
NKN
782018Event Reconstruction of Indonesian E-Banking Services on Windows Phone Deviceshttps://link.springer.com
/chapter/10.1007/978-3-030-01704-0_29
NKN
792016Using multimedia presentations to improve digital forensic understanding: a pilot studyhttps://arxiv.org/abs/1606.01425NKN
802018An approach to enhance understanding of digital forensics technical terms in the presentation phase of a digital investigation using multimedia presentationshttps://link.springer.com
/chapter/10.1007/978-3
-030-01704-0_28
NKN
812018Fast UART and SPI Protocol for Scalable IoT Platformhttps://core.ac.uk
/download/pdf/296979288.pdf
PHVMMN
822012Increasing level of confidence of iris biometric matchinghttps://ieeexplore.ieee.org
/abstract/document/6252556/
PMN
832010Increasing error tolerance in biometric systemshttps://dl.acm.org/doi
/abs/10.1145/1971519.1971531
PMN
842019Overhead Analysis on the Use of Digital Signature in MQTT Protocolhttps://ieeexplore.ieee.org
/abstract/document/8988861/
PMNUIW
852018Hardening the virtual password authentication schemehttps://ieeexplore.ieee.org
/abstract/document/8528757/
PMNEMJ
862019Mitigation of Cryptojacking Attacks Using Taint Analysishttps://ieeexplore.ieee.org

/abstract/document/9003742/
PMNUIW
872019Security document for smart parking gate based on common criteria frameworkhttps://ieeexplore.ieee.org
/abstract/document/8835234/
RYJPMN
882018Security protection profile on smart card system using iso 15408 case study: Indonesia health insurance agencyhttps://ieeexplore.ieee.org
/abstract/document/8528804/
RYJ
892020How Can Fingerprint Improves The Payment Experience of a Drink Vending Machine?https://ieeexplore.ieee.org
/abstract/document/9166181
PMNRYJ
902020Iot products adoption for smart living in indonesia: Technology challenges and prospectshttps://ieeexplore.ieee.org
/abstract/document/9166200/
RYJ
912020Security functional requirements for the development of a biometrics attendance systemhttps://ieeexplore.ieee.org
/abstract/document/9166294/
RYJPMN
922020Mitigating Risk of IoT Sensing Data Error Using Platform as a Data Handlerhttps://ieeexplore.ieee.org
/abstract/document/9264934
PMNRYJ
932019Infusion monitoring using WiFi (802.11) through MQTT protocolhttps://ieeexplore.ieee.org
/abstract/document/8074693
ADRSKH
942020Numerical simulation of tsunami evacuation route planning in Padang using linear programminghttps://ieeexplore.ieee.org
/abstract/document/9166266
SKH
952020Performance analysis of video streaming service migration using container orchestrationhttps://iopscience.iop.org
/article/10.1088/1757-899X/830/2/022100/meta
SKH
962019Prototype of Automation of Organic Fertilizer Manufacturing Systems Based on Internet of Thingshttps://ieeexplore.ieee.org
/document/8835299
ENDSKH
972020Optimization of Phishing Website Classification Based on Synthetic Minority Oversampling Technique and Feature Selectionhttps://ieeexplore.ieee.org
/document/9255562
SKH
982013A review of blackhole attack in mobile adhoc networkhttps://ieeexplore.ieee.org
/abstract/document/6698520/
SMD
992014Pre-processing image database for efficient Content Based Image Retrievalhttps://ieeexplore.ieee.org
/abstract/document/6968606/
SMD
1002015(EDsHEED) Enhanced Simplified Hybrid, Energy-efficient, Distributed Clustering for Wireless Sensor Networkhttps://ieeexplore.ieee.org
/abstract/document/7231404/
SPOMMAERF
1012018TCP Congestion Window Analysis of Twitter with Exponential Modelhttps://ieeexplore.ieee.org
/abstract/document/8528797
HHNSPO
1022019Alignment Recovery for General Integer Scoringhttps://ieeexplore.ieee.org
/document/9034737
SRN
1032016Mobile molecular communications: Positional-distance codeshttps://ieeexplore.ieee.org
/abstract/document/7536830/
TFQ
1042018Access control on internet of things based on publish/subscribe using authentication server and secure protocolhttps://ieeexplore.ieee.org
/abstract/document/8534855/
UIW
1052017Robust flood monitoring platform using message queueing telemetry transport protocolhttps://ieeexplore.ieee.org
/abstract/document/8267949
UIW
1062019Flatbuffers implementation on mqtt publish/subscribe communication as data delivery formathttps://ieeexplore.ieee.org
/abstract/document/8977050/
ADRUIW
1072018The Detection of On-Off Attacks for the Internet of Things Objectshttps://ieeexplore.ieee.org
/abstract/document/8712098
VRA
1082013Mobile Trackning System Using OpenMTC Platformhttps://ieeexplore.ieee.org
/abstract/document/6758523
MMAVRA
1092016A survey on trust in Internet of Thingshttps://ieeexplore.ieee.org
/abstract/document/7863238
MMAVRA
1102015Towards data sovereignty in cyberspacehttps://ieeexplore.ieee.org
/abstract/document/7231469
YDN
1112017Towards the classification of confidentiality capabilities in trustworthy service level agreementshttps://ieeexplore.ieee.org
/abstract/document/7923817/
YDN
1122016The future of cyber security capacity in Indonesiahttps://ora.ox.ac.uk/objects/uuid
:70392ace-4bd6-4066-818e-
a3adc1eeedf3/download_file?
file_format=pdf&safe_filename=
The%2BFuture%2Bof
%2BCybersecurity
%2BCapacity%2Bin%2BIndonesia_
Research%2BReport_2016.pdf&type
_of_work=Working+paper
YDN
1132015Security Assurance Requirements Engineering (STARE) for trustworthy service level agreementshttps://ieeexplore.ieee.org
/abstract/document/7320458
YDN
1142020Towards a collaborative framework for the large-scale social collaboration: a case of Jakarta’s response to the Covid-19 pandemichttps://ieeexplore.ieee.org
/abstract/document/9307544
YDN
1152017Investigating Security Capabilities in Service Level Agreements as Trust-Enhancing Instrumentshttps://link.springer.com
/chapter/10.1007/978-3
-319-59171-1_6
YDN
1162017Understanding trustworthy service level agreements: Open problems and existing solutionshttps://hal.inria.fr/hal-0168
4231/
YDN