Benfano Soewito
Benfano Soewito
Verified email at binus.edu
Title
Cited by
Cited by
Year
Software size measurement of student information terminal with use case point
D Kurniadi, HLHS Warnars, FL Gaol
2017 IEEE International Conference on Cybernetics and Computational …, 2017
262017
Attendance system on Android smartphone
B Soewito, FL Gaol, E Simanjuntak, FE Gunawan
2015 International Conference on Control, Electronics, Renewable Energy and …, 2015
232015
Self-addressable memory-based FSM: a scalable intrusion detection engine
B Soewito, L Vespa, A Mahajan, N Weng, H Wang
IEEE network 23 (1), 14-21, 2009
232009
Logistic models for classifying online grooming conversation
H Pranoto, FE Gunawan, B Soewito
Procedia Computer Science 59, 357-365, 2015
192015
Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system
N Weng, L Vespa, B Soewito
Computer Networks 55 (8), 1648-1661, 2011
172011
Methodology for evaluating dna pattern searching algorithms on multiprocessor
B Soewito, N Weng
2007 IEEE 7th International Symposium on BioInformatics and BioEngineering …, 2007
172007
Software size measurement of knowledge management portal with use case point
K Iskandar, FL Gaol, B Soewito, HLHS Warnars, R Kosala
2016 International Conference on Computer, Control, Informatics and its …, 2016
152016
Software quality model for internet of things governance
JJC Tambotoh, SM Isa, FL Gaol, B Soewito, HLHS Warnars
2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016
132016
Smart mobile attendance system using voice recognition and fingerprint on smartphone
B Soewito, FL Gaol, E Simanjuntak, FE Gunawan
2016 International Seminar on Intelligent Technology and Its Applications …, 2016
122016
Quality measurement for serious games
LKP Suryapranata, B Soewito, GP Kusuma, FL Gaol, HLHS Warnars
2017 International Conference on Applied Computer and Communication …, 2017
112017
Information security maturity model: A best practice driven approach to PCI DSS compliance
S Yulianto, C Lim, B Soewito
2016 IEEE Region 10 Symposium (TENSYMP), 65-70, 2016
112016
A systematic literature review: Critical Success Factors to Implement Enterprise Architecture
R Ansyori, N Qodarsih, B Soewito
Procedia Computer Science 135, 43-51, 2018
102018
Modeling software effort estimation using hybrid PSO-ANFIS
S Nanda, B Soewito
2016 International Seminar on Intelligent Technology and Its Applications …, 2016
102016
Mapping task graphs onto network processors using genetic algorithm
N Weng, N Kumar, S Dechu, B Soewito
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
102008
A review of collisions in cryptographic hash function used in digital forensic tools
ZE Rasjid, B Soewito, G Witjaksono, E Abdurachman
Procedia computer science 116, 381-392, 2017
92017
Digital technology: the effect of connected world to computer ethic and family
B Soewito, SM Isa
CommIT (Communication and Information Technology) Journal 9 (1), 23-28, 2015
92015
A vibratory-based method for road damage classification
FE Gunawan, B Soewito
2015 International Seminar on Intelligent Technology and Its Applications …, 2015
92015
Hybrid pattern matching for trusted intrusion detection
B Soewito, L Vespa, N Weng, H Wang
Security and Communication Networks 4 (1), 33-43, 2011
92011
Improvement of E-learning quality by means of a recommendation system
FE Gunawan, A Maryanto, Y Udjaja, S Candra, B Soewito
2016 11th International Conference on Knowledge, Information and Creativity …, 2016
82016
Detecting online child grooming conversation
FE Gunawan, L Ashianti, S Candra, B Soewito
2016 11th International Conference on Knowledge, Information and Creativity …, 2016
82016
The system can't perform the operation now. Try again later.
Articles 1–20