Bekti Cahyo Hidayanto
Bekti Cahyo Hidayanto
IT Security and Infrastructure Laboratory at Information Systems Department, ITS Surabaya
Verified email at is.its.ac.id
TitleCited byYear
Dynamic content synchronization between learning management systems over limited bandwidth network
RM Ijtihadie, BC Hidayanto, A Affandi, Y Chisaki, T Usagawa
Human-Centric Computing and Information Sciences 2 (1), 17, 2012
222012
Offline web application and quiz synchronization for e-learning activity for mobile browser
RM Ijtihadie, Y Chisaki, T Usagawa, HB Cahyo, A Affandi
TENCON 2010-2010 IEEE Region 10 Conference, 2402-2405, 2010
162010
Dynamic synchronization of learning contents among distributed moodle systems
T Usagawa, A Affandi, BC Hidayanto, M Rumbayan, T Ishimura, Y Chisaki
Proceeding of the 25th Annual Conference of JSET, e2a-245-06, 1011-1012, 2009
82009
Analisis Live Forensics Untuk Perbandingan Aplikasi Instant Messenger Pada Sistem Operasi Windows 10
TD Larasati, BC Hidayanto
SESINDO 9 2017, 2017
72017
Evaluasi Keamanan Informasi pada Divisi Network of Broadband PT. Telekomunikasi Indonesia Tbk. dengan Menggunakan Indeks Keamanan Informasi (KAMI)
EL Putra, BC Hidayanto, HM Astuti
Jurnal Teknik ITS 3 (2), A228-A233, 2014
72014
Penilaian Risiko Keamanan Informasi Menggunakan Metode Failure Mode And Effects Analysis Di Divisi Ti Pt. Bank Xyz Surabaya
I Desy, BC Hidayanto, HM Astuti
SESINDO 2014 2014, 2014
72014
Analisis Risiko Keamanan Informasi Dengan Menggunakan Metode Octave Dan Kontrol Iso 27001 Pada Dishubkominfo Kabupaten Tulungagung
BL Mahersmi, FA Muqtadiroh, BC Hidayanto
SESINDO 2016 2016, 2016
62016
Rancang Bangun Sistem Penilaian Index Kepuasan Pegawai Terhadap Lingkungan Kerja Melalui Dashboard Terintegrasi Dengan Menggunakan Metode Prototipe, Studi Kasus Pt. Pln …
P Sudharyana, BC Hidayanto, FA Muqtadiroh
Jurnal Teknik Pomits 1 (1), 1-6, 2012
62012
Analisa Forensik Whatsapp dan LINE Messenger Pada Smartphone Android Sebagai Rujukan Dalam Menyediakan Barang Bukti yang Kuat dan Valid di Indonesia
S Ikhsani, BC Hidayanto
Jurnal Teknik ITS 5 (2), A728-A736, 2016
42016
Implementasi Metode Forensik dengan Menggunakan Pitch, Formant, dan Spectrogram untuk Analisis Kemiripan Suara Melalui Perekam Suara Telepon Genggam Pada Lingkungan yang Bervariasi
A Aligarh, BC Hidayanto
Jurnal Teknik ITS 5 (2), A306-A310, 2016
42016
Manajemen Risiko pada Pengelolaan Data di Bagian Pengolahan Data PT Petrokimia Gresik
A Febriyanti, BC Hidayanto
Jurnal Teknik Pomits 1 (1), 1-6, 2012
42012
E-mail based updates delivery in unidirectional content synchronization among learning management systems over limited bandwidth environment
RM Ijtihadie, Y Chisaki, T Usagawa, BC Hidayanto, A Affandi
TENCON 2011-2011 IEEE Region 10 Conference, 211-215, 2011
42011
Performance of uni directional LMS synchronization in various network capacity
A Affandi
Proceeding of The Asian Conference on Education 2009, 1241-1246, 2009
42009
Rowi Fajar Muhammad, Renny P Kusumawardani, Achmad Syafaat, Network Intrusion Detection Systems Analysis using Frequent Item Set Mining Algorithm FP-Max and Apriori
BC Hidayanto
Procedia Computer Science 124, 751-758, 2017
32017
Using e-mail system for delivering unidirectional synchronization among learning management systems in limited bandwidth environment
RM Ijtihadie, BC Hidayanto, A Affandi, Y Chisaki, T Usagawa
Proc. The 6th International Conference on Information and Communication …, 2010
32010
Synchronization of Multiple Learning Management Systems in order to share the learning contents over band limited network
K Sonoda, T Ishimura, BC Hidayanto, A Affandi, Y Chisaki, T Usagawa
Proceeding of the 3rd International Student Conference on Advanced Science …, 2009
32009
Network intrusion detection systems analysis using frequent item set mining algorithm FP-max and apriori
BC Hidayanto, RF Muhammad, RP Kusumawardani, A Syafaat
Procedia Computer Science 124, 751-758, 2017
22017
Pembuatan Standard Operating Procedure Perawatan Sistem Informasi Manajemen Institut Teknologi Sepuluh Nopember
BC Hidayanto, AN Ragiltya, A Herdiyanti
SISFO 7 Vol 7 No 1 7, 2017
22017
Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) Berdasarkan ISO/IEC 27001: 2013 pada Direktorat Pengembangan Teknologi dan Sistem Informasi …
FA Basyarahil, HM Astuti, BC Hidayanto
Jurnal Teknik ITS 6 (1), 116-121, 2017
22017
Evaluasi Keamanan Informasi Menggunakan Indeks Keamanan Informasi Pada Kantor Wilayah Ditjen Perbendaharaan Negara Jawa Timur
M Siga, TD Susanto, BC Hidayanto
SESINDO 2014 2014, 2014
22014
The system can't perform the operation now. Try again later.
Articles 1–20