Automatic attendance system for university student using face recognition based on deep learning TS Tata Sutabri, P Pamungkur, AK Ade Kurniawan, ... International Journal of Machine Learning and Computing 9 (5), 668-674, 2019 | 110 | 2019 |
Sejarah, cara kerja dan manfaat internet of things W Wilianto, A Kurniawan Matrix: Jurnal Manajemen Teknologi Dan Informatika 8 (2), 36-41, 2018 | 86 | 2018 |
Development of media-based learning using android mobile learning K Said, ADE Kurniawan, O Anton Journal of Theoretical and Applied Information Technology 96 (3), 668-676, 2018 | 51 | 2018 |
FORENSIC ANALYSIS AND PREVENT OF CROSS SITE SCRIPTING IN SINGLE VICTIM ATTACK USING OPEN WEB APPLICATION SECURITY PROJECT (OWASP) FRAMEWORK. ADE Kurniawan, I Riadi, A LUTHFI Journal of Theoretical & Applied Information Technology 95 (6), 2017 | 37 | 2017 |
Detection and analysis cerber ransomware based on network forensics behavior A Kurniawan, I Riadi International Journal of Network Security 20 (5), 836-843, 2018 | 27 | 2018 |
Sejarah, teori dasar dan penerapan reinforcement learning: Sebuah tinjauan pustaka J Andreanus, A Kurniawan Jurnal Telematika 12 (2), 113-118, 2017 | 19 | 2017 |
THE ROLE OF INFORMATION TECHNOLOGY IN KNOWLEDGE MANAGEMENT IN SMALL MEDIUM ENTERPRISE ADEK SUHARDI, HAPOSAN BANJARNAHOR, STEFFI ADAM Journal of Theoretical and Applied Information Technology 96 (24), 8265-8278, 2018 | 18* | 2018 |
Penerapan Framework OWASP dan Network Forensics untuk analisis, deteksi, dan pencegahan serangan injeksi di sisi Host-Based A Kurniawan Jurnal Telematika 14 (1), 9-18, 2019 | 12 | 2019 |
What is Exploit Kit and How Does it Work? A kurniawan, A Fitriansyah International Journal of Pure and Applied Mathematics 118 (No. 20 2018), 509-516, 2018 | 10* | 2018 |
Multi-kernel CNN block-based detection for COVID-19 with imbalance dataset M Mursalim, A Kurniawan | 8 | 2021 |
Detection and Analysis Cerber Ransomware Using Network Forensics Behavior Based. A Kurniawan, I Riadi Int. J. Netw. Secur. 20 (5), 836-843, 2018 | 6 | 2018 |
Experiments on adversarial examples for deep learning model using multimodal sensors A Kurniawan, Y Ohsita, M Murata Sensors 22 (22), 8642, 2022 | 5 | 2022 |
Implementasi Algoritma Linear Congruent Method (Lcm) Pada Media Pembelajaran Bagian-Bagian Bunga Berbasis Virtual Reality (Studi Kasus: Smp Negeri 2 Ciawigebang) RA Krisdiawan, H Budianto, T Sutabri, A Kurniawan NUANSA INFORMATIKA 16 (2), 94-105, 2022 | 5 | 2022 |
Analisis Unauthorized Access Point Menggunakan Teknik Network Forensics F Paramita, M Madeline, O Alvina, RE Sentia, A Kurniawan Jurnal Telematika 14 (2), 63-72, 2019 | 5 | 2019 |
Sejarah, Penerapan, dan Analisis Resiko dari Neural Network: Sebuah Tinjauan Pustaka C Cristina, A Kurniawan JURNAL INFORMATIKA: Jurnal Pengembangan IT 3 (2), 2018 | 5 | 2018 |
Detection of sensors used for adversarial examples against machine learning models A Kurniawan, Y Ohsita, M Murata Results in Engineering, 103021, 2024 | 1 | 2024 |
Meningkatkan Keterampilan Berpikir, Me-Manage Keuangan Pada Masyarakat Pesisir Pulau Setokok Kota Batam S Suhardi, A Kurniawan, E Yunita, AB Muli JURNAL PENGABDIAN KEPADA MASYARAKAT 9 (1), 40-47, 2019 | 1 | 2019 |
Evolution, challenges, mobile application tools and framework: A literature review M Wijaya, A Kurniawan POSITIF: Jurnal Sistem dan Teknologi Informasi 4 (1), 34-41, 2018 | 1 | 2018 |
A Literature Review of Historical and Detection Analysis of Botnets Forensics K Ade, F Ahmad International Journal of Computer and Communication Engineering 7 (4), 128-135, 2018 | 1 | 2018 |
Toward robust systems against sensor-based adversarial examples based on the criticalities of sensors. A Kurniawan, Y Ohsita, M Murata 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC), 1-5, 2024 | | 2024 |