Automatic attendance system for university student using face recognition based on deep learning TS Tata Sutabri, P Pamungkur, AK Ade Kurniawan, ... International Journal of Machine Learning and Computing 9 (5), 668-674, 2019 | 88 | 2019 |
Sejarah, cara kerja dan manfaat internet of things W Wilianto, A Kurniawan Matrix: Jurnal Manajemen Teknologi Dan Informatika 8 (2), 36-41, 2018 | 77 | 2018 |
Development of media-based learning using android mobile learning K Said, ADE Kurniawan, O Anton Journal of Theoretical and Applied Information Technology 96 (3), 668-676, 2018 | 48 | 2018 |
FORENSIC ANALYSIS AND PREVENT OF CROSS SITE SCRIPTING IN SINGLE VICTIM ATTACK USING OPEN WEB APPLICATION SECURITY PROJECT (OWASP) FRAMEWORK. ADE Kurniawan, I Riadi, A LUTHFI Journal of Theoretical & Applied Information Technology 95 (6), 2017 | 36 | 2017 |
Detection and analysis cerber ransomware based on network forensics behavior A Kurniawan, I Riadi International Journal of Network Security 20 (5), 836-843, 2018 | 23 | 2018 |
THE ROLE OF INFORMATION TECHNOLOGY IN KNOWLEDGE MANAGEMENT IN SMALL MEDIUM ENTERPRISE ADEK SUHARDI, HAPOSAN BANJARNAHOR, STEFFI ADAM Journal of Theoretical and Applied Information Technology 96 (24), 8265-8278, 2018 | 19* | 2018 |
Sejarah, teori dasar dan penerapan reinforcement learning: Sebuah tinjauan pustaka J Andreanus, A Kurniawan Jurnal Telematika 12 (2), 113-118, 2017 | 15 | 2017 |
Penerapan Framework OWASP dan Network Forensics untuk analisis, deteksi, dan pencegahan serangan injeksi di sisi Host-Based A Kurniawan Jurnal Telematika 14 (1), 9-18, 2019 | 13 | 2019 |
Multi-kernel CNN block-based detection for COVID-19 with imbalance dataset M Mursalim, A Kurniawan | 7 | 2021 |
What is Exploit Kit and How Does it Work? A kurniawan, A Fitriansyah International Journal of Pure and Applied Mathematics 118 (No. 20 2018), 509-516, 2018 | 7* | 2018 |
Detection and Analysis Cerber Ransomware Using Network Forensics Behavior Based. A Kurniawan, I Riadi Int. J. Netw. Secur. 20 (5), 836-843, 2018 | 6 | 2018 |
Sejarah, Penerapan, dan Analisis Resiko dari Neural Network: Sebuah Tinjauan Pustaka C Cristina, A Kurniawan JURNAL INFORMATIKA: Jurnal Pengembangan IT 3 (2), 2018 | 5 | 2018 |
Experiments on adversarial examples for deep learning model using multimodal sensors A Kurniawan, Y Ohsita, M Murata Sensors 22 (22), 8642, 2022 | 4 | 2022 |
Implementasi Algoritma Linear Congruent Method (LCM) Pada Media Pembelajaran Bagian-Bagian Bunga Berbasis Virtual Reality (VR) RAK Rio Andriyat Krisdiawan, HB Heru Budianto, TS Tata Sutabri, ... NUANSA INFORMATIKA 16 (2), 94-105, 2022 | 4 | 2022 |
Analisis Unauthorized Access Point Menggunakan Teknik Network Forensics F Paramita, M Madeline, O Alvina, RE Sentia, A Kurniawan Jurnal Telematika 14 (2), 63-72, 2019 | 4 | 2019 |
Detection of Sensors Used for Adversarial Examples against Machine Learning Models A Kurniawan, Y Ohsita, S Maisuria, M Murata Preprints, 2023 | 1 | 2023 |
Meningkatkan Keterampilan Berpikir, Me-Manage Keuangan Pada Masyarakat Pesisir Pulau Setokok Kota Batam S Suhardi, A Kurniawan, E Yunita, AB Muli JURNAL PENGABDIAN KEPADA MASYARAKAT 9 (1), 40-47, 2019 | 1 | 2019 |
Evolution, challenges, mobile application tools and framework: A literature review M Wijaya, A Kurniawan POSITIF: Jurnal Sistem dan Teknologi Informasi 4 (1), 34-41, 2018 | 1 | 2018 |
A Literature Review of Historical and Detection Analysis of Botnets Forensics K Ade, F Ahmad International Journal of Computer and Communication Engineering 7 (4), 128-135, 2018 | 1 | 2018 |
An Investigation of the Centralized EXchange (CEX) App Using an Extended Technology Acceptance Model S Bambang, K Ade 革新的コンピューティング・情報・制御に関する国際誌 19 (05), 1605, 2023 | | 2023 |