Segui
Benfano Soewito
Benfano Soewito
Email verificata su binus.edu
Titolo
Citata da
Citata da
Anno
The accuracy comparison among word2vec, glove, and fasttext towards convolution neural network (cnn) text classification
EM Dharma, FL Gaol, H Warnars, B Soewito
J Theor Appl Inf Technol 100 (2), 31, 2022
1422022
A Proposed surveillance model in an Intelligent Transportation System (ITS)
AS Putra, HLHS Warnars, FL Gaol, B Soewito, E Abdurachman
2018 Indonesian association for pattern recognition international conference …, 2018
1052018
A systematic literature review: Critical success factors to implement enterprise architecture
R Ansyori, N Qodarsih, B Soewito
Procedia Computer Science 135, 43-51, 2018
982018
Software metrics for fault prediction using machine learning approaches: A literature review with PROMISE repository dataset
S Karim, HLHS Warnars, FL Gaol, E Abdurachman, B Soewito
2017 IEEE international conference on cybernetics and computational …, 2017
812017
Attendance system on Android smartphone
B Soewito, FL Gaol, E Simanjuntak, FE Gunawan
2015 International Conference on Control, Electronics, Renewable Energy and …, 2015
582015
Smart mobile attendance system using voice recognition and fingerprint on smartphone
B Soewito, FL Gaol, E Simanjuntak, FE Gunawan
2016 International Seminar on Intelligent Technology and Its Applications …, 2016
522016
Logistic models for classifying online grooming conversation
H Pranoto, FE Gunawan, B Soewito
Procedia Computer Science 59, 357-365, 2015
512015
Websocket to support real time smart home applications
B Soewito, FE Gunawan, IGP Kusuma
Procedia Computer Science 157, 560-566, 2019
492019
A review of collisions in cryptographic hash function used in digital forensic tools
ZE Rasjid, B Soewito, G Witjaksono, E Abdurachman
Procedia computer science 116, 381-392, 2017
492017
Survey on threats and risks in the cloud computing environment
E Abdurachman, FL Gaol, B Soewito
Procedia Computer Science 161, 1325-1332, 2019
472019
Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework
K Razikin, B Soewito
Egyptian Informatics Journal 23 (3), 383-404, 2022
452022
A systematic literature Review: Risk analysis in cloud migration
B Soewito, FL Gaol, E Abdurachman
Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022
452022
Django web framework software metrics measurement using radon and pylint
S Liawatimena, HLHS Warnars, A Trisetyarso, E Abdurahman, B Soewito, ...
2018 Indonesian Association for Pattern Recognition International Conference …, 2018
402018
Information security maturity model: A best practice driven approach to PCI DSS compliance
S Yulianto, C Lim, B Soewito
2016 IEEE Region 10 Symposium (TENSYMP), 65-70, 2016
392016
IoT security system with modified Zero Knowledge Proof algorithm for authentication
B Soewito, Y Marcellinus
Egyptian Informatics Journal 22 (3), 269-276, 2021
382021
Automatic sleep stage classification using weighted ELM and PSO on imbalanced data from single lead ECG
OK Utomo, N Surantha, SM Isa, B Soewito
Procedia Computer Science 157, 321-328, 2019
312019
Software quality model for Internet of Things governance
JJC Tambotoh, SM Isa, FL Gaol, B Soewito, HLHS Warnars
2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016
312016
Quality measurement for serious games
LKP Suryapranata, B Soewito, GP Kusuma, FL Gaol, HLHS Warnars
2017 International Conference on Applied Computer and Communication …, 2017
302017
Usability testing method in augmented reality application
H Pranoto, C Tho, HLHS Warnars, E Abdurachman, FL Gaol, B Soewito
2017 International Conference on Information Management and Technology …, 2017
282017
Detecting online child grooming conversation
FE Gunawan, L Ashianti, S Candra, B Soewito
2016 11th International Conference on Knowledge, Information and Creativity …, 2016
282016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20