A survey of RFID authentication protocols based on hash-chain method I Syamsuddin, T Dillon, E Chang, S Han 2008 Third International Conference on Convergence and Hybrid Information …, 2008 | 89 | 2008 |
The application of AHP model to guide decision makers: a case study of e-banking security I Syamsuddin, J Hwang 2009 fourth international conference on computer sciences and convergence …, 2009 | 63 | 2009 |
SK Penerimaan Peserta Program Visiting Professor Semester Genap AW Triatmo Direktorat Program Pascasarjana Universitas Muhammadiyah Malang, 2023 | 51 | 2023 |
Multicriteria evaluation and sensitivity analysis on information security I Syamsuddin arXiv preprint arXiv:1310.3312, 2013 | 50 | 2013 |
Evaluation of e-government initiatives in developing countries: an ITPOSMO approach I Syamsuddin International Research Journal of Applied and Basic Sciences, 2011 | 48 | 2011 |
Failure of e-government implementation: A case study of South Sulawesi J Hwang, I Syamsuddin 2008 Third International Conference on Convergence and Hybrid Information …, 2008 | 44 | 2008 |
A new fuzzy MCDM framework to evaluate e-government security strategy I Syamsuddin, J Hwang 2010 4th International Conference on Application of Information and …, 2010 | 38 | 2010 |
The use of AHP in security policy decision making: an open office calc application I Syamsuddin Journal of Software 5 (10), 2010 | 37 | 2010 |
Impact of CLAHE-based image enhancement for diabetic retinopathy classification through deep learning BP Mira Hayati, Kahlil Muchtar, Roslidar, Novi Maulina, Irfan Syamsuddin ... Elsevier Procedia Computer Science Volume 216, 2023, 57-66, 2023 | 27* | 2023 |
The application of AHP to evaluate information security policy decision making I Syamsuddin International Journal of Simulation: Systems, Science and Technology 10 (5), 2009 | 24 | 2009 |
SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks I Syamsuddin, OM Barukab electronics 11 (5), 737, 2022 | 18 | 2022 |
Information security policy decision making: an analytic hierarchy process approach J Hwang, I Syamsuddin 2009 Third Asia International Conference on Modelling & Simulation, 158-163, 2009 | 18 | 2009 |
Determining single tuition fee of higher education in Indonesia: A comparative analysis of data mining classification algorithms MNY Utomo, AE Permanasari, E Tungadi, I Syamsuddin 2017 4th International Conference on New Media Studies (CONMEDIA), 113-117, 2017 | 17 | 2017 |
Assessing Moodle as Learning Management System Platform for English Course Based TOEFL A Irfan Syamsuddin International Journal of Computer Trends and Technology 18 (6), 2014 | 15 | 2014 |
A survey on low-cost RFID authentication protocols I Syamsuddin, S Han, T Dillon 2012 International Conference on Advanced Computer Science and Information …, 2012 | 15 | 2012 |
Fuzzy multi criteria evaluation framework for E-learning software quality I Syamsuddin Academic Research International, 2012 | 15 | 2012 |
Automated visual inspection for bottle caps using fuzzy logic AS Prabuwono, W Usino, L Yazdi, AH Basori, A Bramantoro, ... TEM Journal, 2019 | 14 | 2019 |
A traffic congestion framework for smart riyadh city based on iot services HG Al-Majhad, A Bramantoro, I Syamsuddin, A Yunianta, AH Basori, ... (IJACSA) International Journal of Advanced Computer Science and Applications, 2018 | 14* | 2018 |
OntoDI: The Methodology for Ontology Development on Data Integration Arda Yunianta, Ahmad Hoirul Basori, Anton Satria Prabuwono, Arif Bramantoro ... International Journal of Advanced Computer Science and Applications(IJACSA …, 2019 | 11* | 2019 |
VILARITY-Virtual laboratory for information security practices I Syamsuddin TEM Journal 8 (3), 1011-1016, 2019 | 10 | 2019 |