Convolutional Neural Network (CNN) Untuk Identifkasi Karakter Hiragana C Umam, LB Handoko Prosiding Seminar Nasional Lppm Ump 2, 527-533, 2021 | 14 | 2021 |
Implementation And Analysis High Availability Network File System Based Server Cluster C Umam, LB Handoko, GM Rizqi Jurnal Transformatika 16 (1), 31-39, 2018 | 13 | 2018 |
Teknik Super Enkripsi Menggunakan Transposisi Kolom Berbasis Vigenere Cipher Pada Citra Digital D Sinaga, C Umam, EH Rachmawanto Dinamika Rekayasa 14 (1), 57-64, 2018 | 10 | 2018 |
Kombinasi Vigenere-Aes 256 dan Fungsi Hash Dalam Kriptografi Aplikasi Chatting LB Handoko, C Umam Prosiding Sains Nasional dan Teknologi 12 (1), 390-397, 2022 | 5 | 2022 |
Implementasi kriptografi vigenere cipher pada media teks dengan kombinasi transposisi kolom D Sinaga, C Umam | 5 | 2018 |
Autentikasi Citra Rgb Menggunakan Kombinasi Fungsi Hash MD5 Dan RSA LB Handoko, C Umam, CA Sari Prosiding Sains Nasional dan Teknologi 1 (1), 2018 | 4 | 2018 |
CNN for Image Identification of Hiragana Based on Pattern Recognition Using CNN C Umam, AD Krismawan, RR Ali Journal of Applied Intelligent System 6 (2), 62-71, 2021 | 3 | 2021 |
Penyembunyian pesan menggunakan steganografi dengan metode lsb dan enkripsi kritografi LB Handoko, C Umam | 3 | 2019 |
Digital Signature Pada Citra Menggunakan Rsa Dan Vigenere Cipher Berbasis Md5 LB Handoko, C Umam, EH Rachmawanto Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 10 (1), 357-366, 2019 | 3 | 2019 |
Data Security Using Color Image Based on Beaufort Cipher, Column Transposition and Least Significant Bit (LSB) LB Handoko, C Umam Journal of Applied Intelligent System 8 (2), 140-151, 2023 | 2 | 2023 |
Kombinasi Vigenere dan Autokey Cipher dalam Proses Proteksi SMS Berbasis Android C Umam, LB Handoko, CA Sari, EH Rachmawanto, LAR Hakim Prosiding Seminar Sains Nasional dan Teknologi 12 (1), 492-498, 2022 | 2 | 2022 |
Triple DES Cryptography Based on Hash Function and DSA for Digital Certificate Authentication EH Rachmawanto, LB Handoko, C Umam, C Jatmoko, RR Ali 2022 International Seminar on Application for Technology of Information and …, 2022 | 2 | 2022 |
Purwarupa Sistem Pemilihan Umum Elektronik dengan Pemanfaatan Protokol Ethereum pada Teknologi Blockchain E Arianto, C Umam, LB Handoko Jurnal Transformatika 19 (1), 84-94, 2021 | 2 | 2021 |
Upload file security on the server using LSB and Hill Cipher LB Handoko, C Umam, AS Anindita Journal of Applied Intelligent System 4 (1), 28-38, 2019 | 2 | 2019 |
ANALISA EFEKTIFITAS PENGGUNAAN NETWORK RESOURCE ANTARA STORAGE AREA NETWORK (SAN) DAN NETWORK ATTACHED STORAGE (NAS) LB Handoko, C Umam Techno. Com 14 (1), 72-78, 2015 | 2 | 2015 |
BUSINESS PROCESS REENGINEERING SUPPLY CHAIN MANAGEMENT SYSTEM BASED BLOCKCHAIN USING BPR LC FF Tananto, WS Sari, F Alzami, M Nabila, FO Saputra, C Umam, ... Jurnal Teknik Informatika (Jutif) 4 (2), 291-300, 2023 | 1 | 2023 |
Kombinasi Steganografi LSB dan Kriptografi AES dalam Sekuriti Teks Rahasia Pada Citra Berwarna C Umam, M Muslih, D Fadillah Seminar Nasional Teknologi dan Multidisiplin Ilmu (SEMNASTEKMU) 2 (1), 109-118, 2022 | 1 | 2022 |
Analisa Forensik Kontainer Podman Terhadap Backdoor Metasploit Menggunakan Checkpointctl HA Sya'bani, C Umam, LB Handoko Jurnal Transformatika 21 (2), 2024 | | 2024 |
Forensic Analysis of Podman Container Towards Metasploit Backdoor Using Checkpointctl HA Sya'bani, C Umam, LB Handoko Inform: Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi 9 (1), 81-88, 2024 | | 2024 |
PREDIKSI EMAIL PHISING MENGGUNAKAN SUPPORT VECTOR MACHINE C Umam, LB Handoko Semnas Ristek (Seminar Nasional Riset dan Inovasi Teknologi) 8 (01), 2024 | | 2024 |