Follow
Ade Kurniawan
Ade Kurniawan
Graduate School of Information Science and Technology, Osaka University
Verified email at ist.osaka-u.ac.jp - Homepage
Title
Cited by
Cited by
Year
Automatic attendance system for university student using face recognition based on deep learning
TS Tata Sutabri, P Pamungkur, AK Ade Kurniawan, ...
International Journal of Machine Learning and Computing 9 (5), 668-674, 2019
882019
Sejarah, cara kerja dan manfaat internet of things
W Wilianto, A Kurniawan
Matrix: Jurnal Manajemen Teknologi Dan Informatika 8 (2), 36-41, 2018
772018
Development of media-based learning using android mobile learning
K Said, ADE Kurniawan, O Anton
Journal of Theoretical and Applied Information Technology 96 (3), 668-676, 2018
482018
FORENSIC ANALYSIS AND PREVENT OF CROSS SITE SCRIPTING IN SINGLE VICTIM ATTACK USING OPEN WEB APPLICATION SECURITY PROJECT (OWASP) FRAMEWORK.
ADE Kurniawan, I Riadi, A LUTHFI
Journal of Theoretical & Applied Information Technology 95 (6), 2017
362017
Detection and analysis cerber ransomware based on network forensics behavior
A Kurniawan, I Riadi
International Journal of Network Security 20 (5), 836-843, 2018
232018
THE ROLE OF INFORMATION TECHNOLOGY IN KNOWLEDGE MANAGEMENT IN SMALL MEDIUM ENTERPRISE
ADEK SUHARDI, HAPOSAN BANJARNAHOR, STEFFI ADAM
Journal of Theoretical and Applied Information Technology 96 (24), 8265-8278, 2018
19*2018
Sejarah, teori dasar dan penerapan reinforcement learning: Sebuah tinjauan pustaka
J Andreanus, A Kurniawan
Jurnal Telematika 12 (2), 113-118, 2017
152017
Penerapan Framework OWASP dan Network Forensics untuk analisis, deteksi, dan pencegahan serangan injeksi di sisi Host-Based
A Kurniawan
Jurnal Telematika 14 (1), 9-18, 2019
132019
Multi-kernel CNN block-based detection for COVID-19 with imbalance dataset
M Mursalim, A Kurniawan
72021
What is Exploit Kit and How Does it Work?
A kurniawan, A Fitriansyah
International Journal of Pure and Applied Mathematics 118 (No. 20 2018), 509-516, 2018
7*2018
Detection and Analysis Cerber Ransomware Using Network Forensics Behavior Based.
A Kurniawan, I Riadi
Int. J. Netw. Secur. 20 (5), 836-843, 2018
62018
Sejarah, Penerapan, dan Analisis Resiko dari Neural Network: Sebuah Tinjauan Pustaka
C Cristina, A Kurniawan
JURNAL INFORMATIKA: Jurnal Pengembangan IT 3 (2), 2018
52018
Experiments on adversarial examples for deep learning model using multimodal sensors
A Kurniawan, Y Ohsita, M Murata
Sensors 22 (22), 8642, 2022
42022
Implementasi Algoritma Linear Congruent Method (LCM) Pada Media Pembelajaran Bagian-Bagian Bunga Berbasis Virtual Reality (VR)
RAK Rio Andriyat Krisdiawan, HB Heru Budianto, TS Tata Sutabri, ...
NUANSA INFORMATIKA 16 (2), 94-105, 2022
42022
Analisis Unauthorized Access Point Menggunakan Teknik Network Forensics
F Paramita, M Madeline, O Alvina, RE Sentia, A Kurniawan
Jurnal Telematika 14 (2), 63-72, 2019
42019
Detection of Sensors Used for Adversarial Examples against Machine Learning Models
A Kurniawan, Y Ohsita, S Maisuria, M Murata
Preprints, 2023
12023
Meningkatkan Keterampilan Berpikir, Me-Manage Keuangan Pada Masyarakat Pesisir Pulau Setokok Kota Batam
S Suhardi, A Kurniawan, E Yunita, AB Muli
JURNAL PENGABDIAN KEPADA MASYARAKAT 9 (1), 40-47, 2019
12019
Evolution, challenges, mobile application tools and framework: A literature review
M Wijaya, A Kurniawan
POSITIF: Jurnal Sistem dan Teknologi Informasi 4 (1), 34-41, 2018
12018
A Literature Review of Historical and Detection Analysis of Botnets Forensics
K Ade, F Ahmad
International Journal of Computer and Communication Engineering 7 (4), 128-135, 2018
12018
An Investigation of the Centralized EXchange (CEX) App Using an Extended Technology Acceptance Model
S Bambang, K Ade
革新的コンピューティング・情報・制御に関する国際誌 19 (05), 1605, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20