Enter your keyword

Budi Rahardjo

[vc_empty_space][vc_empty_space][vc_row layout=”boxed” css=”.vc_custom_1624509994608{margin-top: 90px !important;}”][vc_column width=”1/3″ css=”.vc_custom_1624519913689{border-right-width: 1px !important;border-right-color: #dbdbdb !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_row_inner layout=”boxed”][vc_column_inner]

Budi Rahardjo

[vc_empty_space][vc_btn title=”Lihat Profil Scopus” style=”gradient-custom” gradient_custom_color_1=”#00316d” gradient_custom_color_2=”#2071ea” size=”sm” align=”center” css_animation=”bounceInDown” link=”url:https%3A%2F%2Fwww.scopus.com%2Fauthid%2Fdetail.uri%3FauthorId%3D6603439565||target:%20_blank|”][/vc_column_inner][/vc_row_inner][vc_row_inner css=”.vc_custom_1624510077690{border-right-width: 1px !important;padding-top: 32px !important;border-right-color: #b2b2b2 !important;border-right-style: solid !important;border-radius: 1px !important;}”][/vc_row_inner][/vc_column][vc_column width=”2/3″][vc_row_inner][vc_column_inner css=”.vc_custom_1624509956940{border-left-width: 1px !important;border-left-color: #969696 !important;border-left-style: solid !important;border-radius: 1px !important;}”][megatron_heading title=”Budi Rahardjo” size=”size-md” sub_title=”STEI” text_align=”text-left”][vc_separator][/vc_column_inner][/vc_row_inner][vc_column_text]Health (social science) • Energy Engineering and Power Technology • Biomedical Engineering • Electrical and Electronic Engineering • Software • Business and International Management • Strategy and Management • Management of Technology and Innovation • Instrumentation • Artificial Intelligence • Education • Information Systems • Safety Research • Transportation • Computer Science Applications • Computer Networks and Communications • Information Systems and Management • Control and Systems Engineering • Computer Science (miscellaneous) • Theoretical Computer Science • Health Informatics • Modeling and Simulation • Communication • Safety, Risk, Reliability and Quality • Hardware and Architecture • Environmental Engineering • Engineering (all) • Physics and Astronomy (all) • Computer Science (all) • Energy (all) • Mathematics (all) • Environmental Science (all)[/vc_column_text][/vc_column][/vc_row][vc_row layout=”boxed” css=”.vc_custom_1624522217430{margin-top: 20px !important;}”][vc_column][vc_tta_tabs style=”classic” color=”blue” spacing=”5″ active_section=”1″ no_fill_content_area=”true”][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-book” add_icon=”true” title=”Karya” tab_id=”karya”][vc_empty_space height=”20px”][vc_column_text]
Information Concealment Through Noise Addition
Budi Rahardjo,None Kuspriyanto,Intan Muchtadi-Alamsyah,Marisa W. Paryasto
Procedia Computer Science vol:74, issue:j.procs.2015.12.096, page:1-180

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Noise-based stego-ECC
Budi Rahardjo,Intan Muchtadi-Alamsyah,Marisa Paryasto
EPJ Web of Conferences vol:68, issue:20146800013, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Community detection methods in social network analysis
Andry Alamsyah,Budi Rahardjo,None Kuspriyanto
Advanced Science Letters vol:20, issue:asl.2014.5301, page:1-253

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Implementation of Pollard Rho attack on elliptic curve cryptography over binary fields
None Wienardo,Budi Rahardjo,Fajar Yuliawan,Intan Muchtadi-Alamsyah
AIP Conference Proceedings vol:1677, issue:1.4930641, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Design of a Blockchain-based e-Tendering System: A Case Study in LPSE
Syifa Nurgaida Yutia,Budi Rahardjo
Proceeding – 2019 International Conference on ICT for Smart Society: Innovation and Transformation Toward Smart Region, ICISS 2019 vol:, issue:ICISS48059.2019.8969824, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Attribute selection based on information gain for automatic grouping student system
Oktariani Nurul Pratiwi,Budi Rahardjo,Suhono Harso Supangkat
Communications in Computer and Information Science vol:516, issue:978-3-662-46742-8_19, page:1-211

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Blockchain Based School Operational Funding Recording System Design
Anisa Fatakh Sabila,Budi Rahardjo
TSSA 2019 – 13th International Conference on Telecommunication Systems, Services, and Applications, Proceedings vol:, issue:TSSA48701.2019.8985513, page:1-193

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Composite field multiplier based on look-up table for elliptic curve cryptography implementation
Marisa W. Paryasto,Budi Rahardjo,None Kuspriyanto,Fajar Yuliawan,Intan Muchtadi-Alamsyah
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011 vol:, issue:ICEEI.2011.6021612, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
The Use of Honeypot in Machine Learning Based on Malware Detection: A Review
Iik Muhamad Malik Matin,Budi Rahardjo
2020 8th International Conference on Cyber and IT Service Management, CITSM 2020 vol:, issue:CITSM50537.2020.9268794, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A Framework for Collecting and Analysis PE Malware Using Modern Honey Network (MHN)
Iik Muhamad Malik Matin,Budi Rahardjo
2020 8th International Conference on Cyber and IT Service Management, CITSM 2020 vol:, issue:CITSM50537.2020.9268810, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Group formation method through heuristics algorithm
Oktariani Nurul Pratiwi,Budi Rahardjo,Suhono Harso Supangkat
Journal of Theoretical and Applied Information Technology vol:96, issue:, page:1-7586

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Design of a Public Key Infrastructure-based Single Ballot E-Voting System
Irham Mulkan Rodiana,Budi Rahardjo,W. Aciek Ida
2018 International Conference on Information Technology Systems and Innovation, ICITSI 2018 – Proceedings vol:, issue:ICITSI.2018.8696083, page:1-9

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Attack Vulnerabilities Analysis of Elgamal Elliptical Curve Based Stegocrypt Using Attack Trees
Saqfi Ahmad Rabbani,Budi Rahardjo,Aciek Ida Wuryandari
2018 International Conference on Information Technology Systems and Innovation, ICITSI 2018 – Proceedings vol:, issue:ICITSI.2018.8695915, page:1-294

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
GSM Voice Security Improvement with Ambience Sound-Based Steganography
Albertus Anugerah Pekerti,Budi Rahardjo
2018 International Conference on Information Technology Systems and Innovation, ICITSI 2018 – Proceedings vol:, issue:ICITSI.2018.8696026, page:1-59

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Security metrics: A brief survey
Tito Waluyo Purboyo,Budi Rahardjo,None Kuspriyanto
Proceedings – International Conference on Instrumentation, Communication, Information Technology and Biomedical Engineering 2011, ICICI-BME 2011 vol:, issue:ICICI-BME.2011.6108598, page:1-82

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
New methodology of block cipher analysis using chaos game
Budi Sulistyo,Budi Rahardjo,Dimitri Mahayana,Carmadi Machbub
ITB Journal of Information and Communication Technology vol:5, issue:itbj.ict.2011.5.2.3, page:1-124

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Composite field multiplier based on look-up table for elliptic curve cryptography implementation
Marisa W. Paryasto,Budi Rahardjo,None Kuspriyanto,Fajar Yuliawan,Intan Muchtadi-Alamsyah
ITB Journal of Information and Communication Technology vol:6 C, issue:itbj.ict.2012.6.1.4, page:1-81

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Blockchain based e-voting recording system design
Rifa Hanifatunnisa,Budi Rahardjo
Proceeding of 2017 11th International Conference on Telecommunication Systems Services and Applications, TSSA 2017 vol:2018-January, issue:TSSA.2017.8272896, page:1-6

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Some framework, architecture and approach for analysis a network vulnerability
Tito Waluyo Purboyo,Budi Rahardjo,None Kuspriyanto
Proceedings of the 2012 International Conference on System Engineering and Technology, ICSET 2012 vol:, issue:ICSEngT.2012.6339320, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Attack scenarios and security analysis of MQTT communication protocol in IoT system
Syaiful Andy,Budi Rahardjo,Bagus Hanindhito
International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) vol:2017-December, issue:EECSI.2017.8239179, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Attack scenarios and security analysis of mqtt communication protocol in iot system
Syaiful Andy,Budi Rahardjo,Bagus Hanindhito
International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) vol:4, issue:eecsi.4.1064, page:1-604

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
On applicability of chaos game method for block cipher randomness analysis
Budi Sulistyo,Budi Rahardjo,Dimitri Mahayana
Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009 vol:1, issue:ICEEI.2009.5254777, page:1-262

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Malware Detection Using Honeypot and Machine Learning
Iik Muhamad Malik Matin,Budi Rahardjo
2019 7th International Conference on Cyber and IT Service Management, CITSM 2019 vol:, issue:CITSM47753.2019.8965419, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Clustering multiple mix data type for automatic grouping of student system
Oktariani Nurul Pratiwi,Budi Rahardjo,Suhono Harso Supangkat
2017 International Conference on Information Technology Systems and Innovation, ICITSI 2017 – Proceedings vol:2018-January, issue:ICITSI.2017.8267938, page:1-176

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Designing an agile enterprise architecture for mining company by using TOGAF framework
Rika Yuliana,Budi Rahardjo
Proceedings of 2016 4th International Conference on Cyber and IT Service Management, CITSM 2016 vol:, issue:CITSM.2016.7577466, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Anomaly detection and data recovery on mini batch distillation column based cyber physical system
Wedar Panji Mardyaningsih,Pranoto Hidaya Rusmin,Budi Rahardjo
International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) vol:, issue:EECSI48112.2019.8977070, page:1-458

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
An integration of national identity towards single identity number with blockchain
Rana Zaini Fathiyana,Fadhil Hidayat,Budi Rahardjo
PervasiveHealth: Pervasive Computing Technologies for Healthcare vol:1, issue:eai.12-10-2019.2296532, page:1-1155

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Verifiability Metric Notion in e-Voting System
Teguh Nurhadi Suharsono,Kuspriyanto Kuspriyanto,Budi Rahardjo
TSSA 2019 – 13th International Conference on Telecommunication Systems, Services, and Applications, Proceedings vol:, issue:TSSA48701.2019.8985519, page:1-167

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A survey on malware detection technology and future trends
Setia Juli Irzal Ismail,None Hendrawan,Budi Rahardjo
Proceeding of 14th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2020 vol:, issue:TSSA51342.2020.9310841, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Individual verifiability metric in e-voting system
Teguh Nurhadi Suharsono,None Kuspriyanto,Budi Rahardjo
International Journal on Electrical Engineering and Informatics vol:11, issue:ijeei.2019.11.1.6, page:1-111

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Fast summarization of large-scale social network using graph pruning based on K-core property
Andry Alamsyah,Yoga Priyana,Budi Rahardjo,None Kuspriyanto
Journal of Theoretical and Applied Information Technology vol:95, issue:, page:1-3757

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Verifiability notion in e-Voting based on modified ThreeBallot system
Teguh Nurhadi Suharsono,None Kuspriyanto,Budi Rahardjo,Fazmah Arif Yulianto
2017 International Conference on Information Technology Systems and Innovation, ICITSI 2017 – Proceedings vol:2018-January, issue:ICITSI.2017.8267920, page:1-72

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
DIDS using cooperative agents based on ant colony clustering
Muhammad N. Abdurrazaq,Bambang Riyanto Trilaksono,Budi Rahardjo
Journal of ICT Research and Applications vol:8, issue:itbj.ict.res.appl.2015.8.3.3, page:1-233

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Distributed intrusion detection system using cooperative agent based on ant colony clustering
Muhammad N. Abdurrazaq,Riyanto T. Bambang,Budi Rahardjo
Proceedings of 2014 International Conference on Electrical Engineering and Computer Science, ICEECS 2014 vol:, issue:ICEECS.2014.7045229, page:1-114

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Traffic anomaly detection in DDos flooding attack
Yudha Purwanto,None Kuspriyanto,None Hendrawan,Budi Rahardjo
Proceedings of 2014 8th International Conference on Telecommunication Systems Services and Applications, TSSA 2014 vol:, issue:TSSA.2014.7065953, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Statistical analysis on aggregate and flow based traffic features distribution
Yudha Purwanto,None Kuspriyanto,None Hendrawan,Budi Rahardjo
Proceeding of 2015 1st International Conference on Wireless and Telematics, ICWT 2015 vol:, issue:ICWT.2015.7449255, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Time based anomaly detection using residual polynomial fitting on aggregate traffic statistic
Yudha Purwanto,None Kuspriyanto,None Hendrawan,Budi Rahardjo
Proceeding of 2015 1st International Conference on Wireless and Telematics, ICWT 2015 vol:, issue:ICWT.2015.7449256, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Web application for Jigsaw-based cooperative learning
Oktariani Nurul Pratiwi,I Gusti Bagus Baskara Nugraha,Suhono Harso Supangkat,Budi Rahardjo
Proceedings – International Conference on ICT for Smart Society 2013: “Think Ecosystem Act Convergence”, ICISS 2013 vol:, issue:ICTSS.2013.6588115, page:1-357

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Cost analysis for classification-based autonomous response systems
Yudha Purwanto,None Kuspriyanto,None Hendrawan,Budi Rahardjo
International Journal of Network Security vol:20, issue:IJNS.201801.20(1).13, page:1-130

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Multistage process to decrease processing time in intrusion prevention system
Yudha Purwanto,None Kuspriyanto,None Hendrawan,Budi Rahardjo
Proceedings – ICWT 2017: 3rd International Conference on Wireless and Telematics 2017 vol:2017-July, issue:ICWT.2017.8284138, page:1-59

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Minimal triangle area mahalanobis distance for stream homogeneous group-based DDoS classification
Yudha Purwanto,None Kuspriyanto,None Hendrawan,Budi Rahardjo
International Journal on Electrical Engineering and Informatics vol:10, issue:ijeei.2018.10.2.12, page:1-383

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
The decision accuracy of acquaintance list from different risk-cost analysis
Yudha Purwanto,None Kuspriyanto,None Hendrawan,Budi Rahardjo
Proceeding of 2018 12th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2018 vol:, issue:TSSA.2018.8708840, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Candidate recommendations for voting system using modified AHP
Teguh Nurhadi Suharsono,Fazmah Arief Yulianto,None Kuspriyanto,Budi Rahardjo
Proceeding of 14th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2020 vol:, issue:TSSA51342.2020.9310849, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Implementation of simple verifiability metric to measure the degree of verifiability of E-voting protocol
Teguh Nurhadi Suharsono,None Gunawan,Dini Anggraini,None Kuspriyanto,Budi Rahardjo
Proceeding of 14th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2020 vol:, issue:TSSA51342.2020.9310915, page:1-

[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][/vc_tta_section][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-handshake-o” add_icon=”true” title=”Proyek” tab_id=”proyek”][vc_empty_space height=”20px”][/vc_tta_section][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-users” add_icon=”true” title=”Jejaring” tab_id=”jejaring”][vc_empty_space height=”20px”][/vc_tta_section][/vc_tta_tabs][/vc_column][/vc_row]