Benfano Soewito
Benfano Soewito
Verified email at binus.edu
TitleCited byYear
Software size measurement of student information terminal with use case point
D Kurniadi, HLHS Warnars, FL Gaol
2017 IEEE International Conference on Cybernetics and Computational …, 2017
202017
Self-addressable memory-based FSM: a scalable intrusion detection engine
B Soewito, L Vespa, A Mahajan, N Weng, H Wang
IEEE network 23 (1), 14-21, 2009
202009
Methodology for evaluating dna pattern searching algorithms on multiprocessor
B Soewito, N Weng
2007 IEEE 7th International Symposium on BioInformatics and BioEngineering …, 2007
172007
Attendance system on Android smartphone
B Soewito, FL Gaol, E Simanjuntak, FE Gunawan
2015 International Conference on Control, Electronics, Renewable Energy and …, 2015
152015
Software size measurement of knowledge management portal with use case point
K Iskandar, FL Gaol, B Soewito, HLHS Warnars, R Kosala
2016 International Conference on Computer, Control, Informatics and its …, 2016
122016
Logistic models for classifying online grooming conversation
H Pranoto, FE Gunawan, B Soewito
Procedia Computer Science 59, 357-365, 2015
122015
Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system
N Weng, L Vespa, B Soewito
Computer Networks 55 (8), 1648-1661, 2011
122011
Mapping task graphs onto network processors using genetic algorithm
N Weng, N Kumar, S Dechu, B Soewito
2008 IEEE/ACS International Conference on Computer Systems and Applications …, 2008
102008
Software quality model for internet of things governance
JJC Tambotoh, SM Isa, FL Gaol, B Soewito, HLHS Warnars
2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016
92016
Smart mobile attendance system using voice recognition and fingerprint on smartphone
B Soewito, FL Gaol, E Simanjuntak, FE Gunawan
2016 International Seminar on Intelligent Technology and Its Applications …, 2016
92016
A review of collisions in cryptographic hash function used in digital forensic tools
ZE Rasjid, B Soewito, G Witjaksono, E Abdurachman
Procedia computer science 116, 381-392, 2017
72017
Hybrid pattern matching for trusted intrusion detection
B Soewito, L Vespa, N Weng, H Wang
Security and Communication Networks 4 (1), 33-43, 2011
72011
Characterizing power and resource consumption of encryption/Decryption in portable devices
B Soewito, L Vespa, N Weng
2008 IEEE Region 5 Conference, 1-6, 2008
72008
Implementing high-speed string matching hardware for network intrusion detection systems
A Mahajan, B Soewito, SK Parsi, N Weng, H Wang
72008
An automatic text summarization using text features and singular value decomposition for popular articles in Indonesia language
FE Gunawan, AV Juandi, B Soewito
2015 International Seminar on Intelligent Technology and Its Applications …, 2015
62015
Quality measurement for serious games
LKP Suryapranata, B Soewito, GP Kusuma, FL Gaol, HLHS Warnars
2017 International Conference on Applied Computer and Communication …, 2017
52017
Improvement of E-learning quality by means of a recommendation system
FE Gunawan, A Maryanto, Y Udjaja, S Candra, B Soewito
2016 11th International Conference on Knowledge, Information and Creativity …, 2016
52016
Increasing accuracy of bluetooth low energy for distance measurement applications
B Soewito, AYH Ritonga, FE Gunawan
2016 11th International Conference on Knowledge, Information and Creativity …, 2016
52016
Modeling software effort estimation using hybrid PSO-ANFIS
S Nanda, B Soewito
2016 International Seminar on Intelligent Technology and Its Applications …, 2016
52016
Information security maturity model: A best practice driven approach to PCI DSS compliance
S Yulianto, C Lim, B Soewito
2016 IEEE Region 10 Symposium (TENSYMP), 65-70, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20