2020
40
An Efficient Implementation of NTRU Encryption in Post-Quantum Internet of Things
27th International Conference on Telecommunications (ICT), Bali, Indonesia, 2020, pp. 1-5
39
Future Identity Card Using Lattice-Based Cryptography and Steganography
Advances in Intelligent Systems and Computing, vol 1158. Springer. 2020
38
Coordinated Beamforming for Multi-Cell Non-Orthogonal Multiple Access-Based Spatial Modulation
IEEE Access, vol. 8, pp. 113456-113466, 2020
37
Scalable machine learning-based intrusion detection system for IoT-enabled smart cities
Sustainable Cities and Society Volume 61, October 2020
36
Analisis Forensik Android: Artefak pada Aplikasi Penyimpanan Awan Box
Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK) Vol.7, No. 3, Juni 2020
35
A Novel Android Memory Forensics for Discovering Remnant Data
International Journal on Advanced Science, Engineering and Information Technology, Vol. 10 (2020) No. 3
34
Evolutionary computing approach to optimize superframe scheduling on industrial wireless sensor networks
Journal of King Saud University – Computer and Information Sciences (February 2020)
2019
33
Radio Cellular Forensics Analysis: Where is the Adversary?
2019 IEEE International Conference on Signal and Image Processing Applications (ICSIPA)
32
Digital Forensics Study of a Cloud Storage Client: A Dropbox Artifact Analysis
CommIT (Communication and Information Technology) Journal 13 (2)
31
Analisis Forensik Android: Artefak pada Aplikasi Penyimpanan Awan Box
Jurnal Teknologi Informasi dan Ilmu Komputer 7 (1)
30
Enhancing security of SIC algorithm on non-orthogonal multiple access (NOMA) based
systems
Physical Communication 33, 16-25
2018
29
Proposed method for mobile forensics investigation analysis of remnant data on Google Drive client
Journal of Internet Technology 19 (6), 1741-1751
28
Scheduling Algorithm for Visible Light Communications Using Multiple LEDs Based on
TDMA-Superframe Structure
The Journal of Korean Institute of Communications and Information Sciences …
2017
27
Security enhancement to successive interference cancellation algorithm for
non-orthogonal multiple access (noma)
2017 IEEE 28th Annual International Symposium on Personal, Indoor, and …
26
Design of smart LED streetlight system for smart city with web-based management
system
IEEE Sensors Journal 17 (18), 6100-6110
25
Improving Network Security-A Comparison between nDPI and L7-Filter
International Journal on Information and Communication Technology (IJoICT) 2 …
24
Wireless LED Streetlight Platform with Weather Monitoring and Color Temperature Control
System
한국통신학회논문지 42 (5), 1038-1046
23
IoT and public weather data based monitoring & control software development for variable
color temperature LED street lights
International Journal on Advanced Science, Engineering and Information …
22
Identifying artefact on Microsoft OneDrive client to support Android forensics
International Journal of Electronic Security and Digital Forensics 9 (3 …
2016
21
Detection of small colon bleeding in wireless capsule endoscopy videos
Computerized Medical Imaging and Graphics 54, 16-26
20
Digital forensic analysis of Telegram Messenger on Android devices
2016 International Conference on Information & Communication Technology and …
19
Digital forensics study of internet messenger: Line artifact analysis in Android OS
Control, Electronics, Renewable Energy and Communications (ICCEREC), 2016 …
18
Efficient and secure data delivery in software defined WBAN for virtual hospital
2016 International Conference on Control, Electronics, Renewable Energy and …
17
Malware Analysis Pada Windows Operating System Untuk Mendeteksi Trojan
Telkom University 3 (2), 3590-3595
16
Android forensics analysis: Private chat on social messenger
Eighth International Conference on Ubiquitous and Future Networks (ICUFN)
15
2015
14
Optimizing Rule on Open Source Firewall Using Content and PCRE Combination
Journal of Advances in Computer Networks 3 (4), 308-314
13
Performance Analysis of IEEE 802.21 MIH as a Function of Vertical Handover Using PMIPv6 and F-HMIPv6
Proceedings of the 17th International Conference on Electronic Commerce 2015, 3
12
The detection of 8 type malware botnet using hybrid malware analysis in executable file windows operating systems
Proceedings of the 17th International Conference on Electronic Commerce 2015, 5
11
The detection of ddos flooding attack using hybrid analysis in ipv6 networks
2015 3rd International Conference on Information and Communication
10
Analisis Penggunaan Algoritma Delay Scheduling terhadap Karakteristik Job Scheduling pada Hadoop
Telkom University Library
9
Aplikasi Elektronik Braille Menggunakan Perangkat Layar Sentuh Berbasis Android Sebagai Media Komunikasi Penyandang Tuna Netra
SEMNASTEKNOMEDIA ONLINE 3 (1), 4-4-99
2014
8
Analisis Performansi Remote Access VPN Berbasis IPSec dan Berbasis SSL pada Jaringan IPv6
Telkom University Library
7
The analysis and implementation of aging method on packet scheduling algorithm in WiMAX network
2014 IEEE Asia Pacific Conference on Wireless and Mobile
6
Software for automated SoC design based on hardware/software codesign concept
International Journal of Advances in Computer Science and Its Applications
2013
5
Modified weighted fair queuing for packet scheduling in mobile WiMAX networks
International Conference on Graphic and Image Processing (ICGIP 2012) 8768
4
Enkripsi Gambar Parsial dengan Kombinasi Metode Stream Cipher RC4 dan Chaotic Function
Universitas Telkom Library
3
Analisis Perbandingan Algoritma Penjadwalan PF dan MLWDF Pada Kasus Multicell Jaringan Long Term Evolution
Universitas Telkom Library
2012
2
Auto-scaling Cloud Computing Untuk Layanan VoIP Pada IP Multimedia Subsystem
Institut Teknologi Telkom Library
1
Performance analysis of packet scheduling with QoS in IEEE 802.16 e networks
2012 7th International Conference on Telecommunication Systems, Services