Design of information security risk management using ISO/IEC 27005 and NIST SP 800-30 revision 1: A case study at communication data applications of XYZ institute H Setiawan, FA Putra, AR Pradana 2017 International Conference on Information Technology Systems and …, 2017 | 24 | 2017 |
Face anti-spoofing using CNN classifier & face liveness detection RB Hadiprakoso, H Setiawan 2020 3rd International Conference on Information and Communications …, 2020 | 19 | 2020 |
Vulnerability analysis using the interactive application security testing (iast) approach for government x website applications H Setiawan, LE Erlangga, I Baskoro 2020 3rd International Conference on Information and Communications …, 2020 | 12 | 2020 |
Penerapan sistem antrian sebagai upaya mengoptimalkan pelayanan terhadap pasien pada loket pengambilan obat di puskesmas cicurug sukabumi jawa barat B Ruswandi UIN Syarif Hidayatullah Jakarta: Fakultas Sains dan Teknologi, 2006, 2006 | 12 | 2006 |
Comparison of lstm architecture for malware classification H Setiawan, PAW Putro, YR Pramadi 2020 international conference on informatics, multimedia, cyber and …, 2020 | 8 | 2020 |
Design of secure electronic disposition applications by applying blowfish, SHA-512, and RSA digital signature algorithms to government institution H Setiawan, KR Citra 2018 International Seminar on Research of Information Technology and …, 2018 | 8 | 2018 |
Classification of personality type based on twitter data using machine learning techniques H Setiawan, AA Wafi 2020 3rd international conference on information and communications …, 2020 | 7 | 2020 |
Pengaruh penerapan layanan marketing syariah dan kepuasan pelanggan terhadap loyalitas pelanggan: rumah makan Wong Solo Cabang Tebet I Farida UIN Syarif Hidayatullah Jakarta: Fakultas Syariah dan Hukum, 2011, 2011 | 7 | 2011 |
Designing and building secure electronic medical record application by applying AES-256 and RSA digital signature GWW Mukti, H Setiawan IOP Conference Series: Materials Science and Engineering 852 (1), 012148, 2020 | 6 | 2020 |
Pemrograman Terstruktur IKS Buana, H Setiawan, PAW Putro Syiah Kuala University Press, 2022 | 5 | 2022 |
Design and development of information sharing and analysis center (isac) as an information sharing platform IM Sholihah, H Setiawan, OG Nabila 2021 Sixth International Conference on Informatics and Computing (ICIC), 1-6, 2021 | 5 | 2021 |
Implementation of SHA-256 and AES-256 for securing digital Al Quran verification system AS Dewi, H Setiawan 2019 Fourth International Conference on Informatics and Computing (ICIC), 1-8, 2019 | 5 | 2019 |
Aplikasi regresi binomial negatif dan generalized poisson dalam mengatasi overdispersion pada regresi poisson (studi kasus data kemiskinan provinsi di Indonesia tahun 2009) F Fadhillah UIN Syarif Hidayatullah Jakarta: Fakultas Sains dan Teknologi, 2011, 2011 | 5 | 2011 |
Steganografi menggunakan metode LSB dengan software Matlab FP Prasetyo UIN Syarif Hidayatullah Jakarta: Fakultas Sains Dan Teknologi, 2010, 2010 | 5 | 2010 |
Pengaruh persepsi terhadap preferensi guru SDI al-Izhar Pondok Labu mengenai asuransi dana pendidikan pada perusahaan asuransi syariah R Mayani UIN Syarif Hidayatullah Jakarta: Fakultas Syariah dan Hukum, 2011, 2011 | 4 | 2011 |
Analisis regresi linier berganda dengan heteroskedastisitas melalui pendekatan weight least square: studi data apbn tahun 1976-2007 LS Farida UIN Syarif Hidayatullah Jakarta: Fakultas Sains Dan Teknologi, 2010, 2010 | 4 | 2010 |
Correlation Between Motivation and Achievement of Competencies in the Hands-On Learning Method PAW Putro, YR Pramadi, H Setiawan, NK Gunawan, RB Hadiprakoso, ... 2019 5th International Conference on Education and Technology (ICET), 29-32, 2019 | 3 | 2019 |
Perbandingan model fungsi transfer dan arima: studi kasus model antara curah hujan dengan kelembaban udara C Aprialis UIN Syarif Hidayatullah Jakarta: Fakultas Sains dan Teknologi, 2010, 2010 | 3 | 2010 |
Enkripsi pesan rahasia menggunakan Algoritma (Advanced Encription Standard) Aes: Rijndael MF Fachrurozi UIN Syarif Hidayatullah Jakarta: Fakultas Sains dan Teknologi, 2006, 2006 | 3 | 2006 |
Detection Model for URL Phishing with Comparison Between Shallow Machine Learning and Deep Learning Models NA Zuhayr, N Qomariasih, H Setiawan 1st International Conference on Neural Networks and Machine Learning 2022 …, 2023 | 2 | 2023 |