yohan suryanto
Judul
Dikutip oleh
Dikutip oleh
Tahun
A new image encryption using color scrambling based on chaotic permutation multiple circular shrinking and expanding
Y Suryanto, K Ramli, Suryadi
Multimedia Tools and Applications 76 (15), 16831-16854, 2017
272017
A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding
Y Suryanto, Suryadi, K Ramli
Journal of Information Hiding and Multimedia Signal Processing 7 (No. 4), pp …, 2016
182016
On developing information security management system (isms) framework for iso 27001-based data center
D Achmadi, Y Suryanto, K Ramli
2018 International Workshop on Big Data and Information Security (IWBIS …, 2018
162018
Algoritma B217AN Menggunakan Metode Spread Spectrum Berbasis PCMK/PCMB
SR Widianto
Seminar Nasional Teknik Elektro 5 (2), 216-223, 2020
122020
Potential development of AES 128-bit key generation for LoRaWAN security
N Hayati, K Ramli, M Suryanegara, Y Suryanto
2019 2nd International Conference on Communication Engineering and …, 2019
72019
Risk assessment using NIST SP 800-30 revision 1 and ISO 27005 combination technique in profit-based organization: Case study of ZZZ information system application in ABC agency
M Al Fikri, FA Putra, Y Suryanto, K Ramli
Procedia Computer Science 161, 1206-1215, 2019
62019
Performance Comparison of Anti-Spam Technology Using Confusion Matrix Classification
F Rahmad, Y Suryanto, K Ramli
IOP Conference Series: Materials Science and Engineering 879 (1), 012076, 2020
52020
Chaos properties of the chaotic permutation generated by multi circular shrinking and expanding movement
Y Suryanto, K Ramli
2015 International Conference on Quality in Research (QiR), 65-68, 2015
52015
Pengembangan dan analisis metode permutasi chaotic baru berbasis multiputaran mengecil dan membesar untuk enkripsi citra dengan tingkat keamanan tinggi, cepat, dan tahan …
Y Suryanto
42017
Speech enhancement for secure communication using coupled spectral subtraction and Wiener filter
H Pardede, K Ramli, Y Suryanto, N Hayati, A Presekal
Electronics 8 (8), 897, 2019
32019
Novel Image Encryption Using a Pseudoset Generated by Chaotic Permutation Multicircular Shrinking With a Gradual Deletion of the Input Set
K Ramli, Y Suryanto, N Hayati
IEEE Access 8, 110351-110361, 2020
22020
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
N Hayati, Y Suryanto, K Ramli, M Suryanegara
2019 2nd International Conference on Communication Engineering and …, 2019
22019
Performance analysis on iris recognition based on half polar iris localization and normalization method using modified low cost camera
K Ramli, R Nurhadi, Y Suryanto, A Presekal
2017 15th International Conference on Quality in Research (QiR …, 2017
22017
Implementation and Performance Analysis of Reliable and Secure End to End Voice Encryption over Public Mobile Network Based on Frequency Domain Using Dual Processor in FPGA …
Y Suryanto, K Ramli
International Journal of Computer Technology and Applications 5 (1), 103, 2014
22014
Performance Comparison of TCP Spoofing and End to End Approach to Enable Partial QoS on IP Based Network
Y Suryanto, RR Nasser, RF Sari
International Journal of Computers Communications & Control 10 (3), 403-419, 2015
12015
Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography
Y Suryanto, N Hayati, RH Kusumawardhana, RF Sari
Int. J. Computer Technology & Applications 4 (1), 43-50, 2013
12013
Dual Key Triple Encryption Text Based Message Using Cryptography and Steganography
Y Suryanto, N Hayati, RH Kusumawardhana, RF Sari
Int. J. Computer Technology & Applications 4 (1), 43-50, 2013
12013
Vulnerability Analysis of Internet Devices from Indonesia Based on Exposure Data in Shodan
B Novianto, Y Suryanto, K Ramli
IOP Conference Series: Materials Science and Engineering 1115 (1), 012045, 2021
2021
Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS
D Sulistyowati, F Handayani, Y Suryanto
JOIV: International Journal on Informatics Visualization 4 (4), 225-230, 2020
2020
Android Forensic Tools Analysis for Unsend Chat on Social Media
T Hermawan, Y Suryanto, F Alief, L Roselina
2020 3rd International Seminar on Research of Information Technology and …, 2020
2020
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20