关注
Ade Kurniawan
Ade Kurniawan
Graduate School of Information Science and Technology, Osaka University
在 ist.osaka-u.ac.jp 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Automatic attendance system for university student using face recognition based on deep learning
TS Tata Sutabri, P Pamungkur, AK Ade Kurniawan, ...
International Journal of Machine Learning and Computing 9 (5), 668-674, 2019
1102019
Sejarah, cara kerja dan manfaat internet of things
W Wilianto, A Kurniawan
Matrix: Jurnal Manajemen Teknologi Dan Informatika 8 (2), 36-41, 2018
862018
Development of media-based learning using android mobile learning
K Said, ADE Kurniawan, O Anton
Journal of Theoretical and Applied Information Technology 96 (3), 668-676, 2018
512018
FORENSIC ANALYSIS AND PREVENT OF CROSS SITE SCRIPTING IN SINGLE VICTIM ATTACK USING OPEN WEB APPLICATION SECURITY PROJECT (OWASP) FRAMEWORK.
ADE Kurniawan, I Riadi, A LUTHFI
Journal of Theoretical & Applied Information Technology 95 (6), 2017
372017
Detection and analysis cerber ransomware based on network forensics behavior
A Kurniawan, I Riadi
International Journal of Network Security 20 (5), 836-843, 2018
272018
Sejarah, teori dasar dan penerapan reinforcement learning: Sebuah tinjauan pustaka
J Andreanus, A Kurniawan
Jurnal Telematika 12 (2), 113-118, 2017
192017
THE ROLE OF INFORMATION TECHNOLOGY IN KNOWLEDGE MANAGEMENT IN SMALL MEDIUM ENTERPRISE
ADEK SUHARDI, HAPOSAN BANJARNAHOR, STEFFI ADAM
Journal of Theoretical and Applied Information Technology 96 (24), 8265-8278, 2018
18*2018
Penerapan Framework OWASP dan Network Forensics untuk analisis, deteksi, dan pencegahan serangan injeksi di sisi Host-Based
A Kurniawan
Jurnal Telematika 14 (1), 9-18, 2019
122019
What is Exploit Kit and How Does it Work?
A kurniawan, A Fitriansyah
International Journal of Pure and Applied Mathematics 118 (No. 20 2018), 509-516, 2018
10*2018
Multi-kernel CNN block-based detection for COVID-19 with imbalance dataset
M Mursalim, A Kurniawan
82021
Detection and Analysis Cerber Ransomware Using Network Forensics Behavior Based.
A Kurniawan, I Riadi
Int. J. Netw. Secur. 20 (5), 836-843, 2018
62018
Experiments on adversarial examples for deep learning model using multimodal sensors
A Kurniawan, Y Ohsita, M Murata
Sensors 22 (22), 8642, 2022
52022
Implementasi Algoritma Linear Congruent Method (Lcm) Pada Media Pembelajaran Bagian-Bagian Bunga Berbasis Virtual Reality (Studi Kasus: Smp Negeri 2 Ciawigebang)
RA Krisdiawan, H Budianto, T Sutabri, A Kurniawan
NUANSA INFORMATIKA 16 (2), 94-105, 2022
52022
Analisis Unauthorized Access Point Menggunakan Teknik Network Forensics
F Paramita, M Madeline, O Alvina, RE Sentia, A Kurniawan
Jurnal Telematika 14 (2), 63-72, 2019
52019
Sejarah, Penerapan, dan Analisis Resiko dari Neural Network: Sebuah Tinjauan Pustaka
C Cristina, A Kurniawan
JURNAL INFORMATIKA: Jurnal Pengembangan IT 3 (2), 2018
52018
Detection of sensors used for adversarial examples against machine learning models
A Kurniawan, Y Ohsita, M Murata
Results in Engineering, 103021, 2024
12024
Meningkatkan Keterampilan Berpikir, Me-Manage Keuangan Pada Masyarakat Pesisir Pulau Setokok Kota Batam
S Suhardi, A Kurniawan, E Yunita, AB Muli
JURNAL PENGABDIAN KEPADA MASYARAKAT 9 (1), 40-47, 2019
12019
Evolution, challenges, mobile application tools and framework: A literature review
M Wijaya, A Kurniawan
POSITIF: Jurnal Sistem dan Teknologi Informasi 4 (1), 34-41, 2018
12018
A Literature Review of Historical and Detection Analysis of Botnets Forensics
K Ade, F Ahmad
International Journal of Computer and Communication Engineering 7 (4), 128-135, 2018
12018
Toward robust systems against sensor-based adversarial examples based on the criticalities of sensors.
A Kurniawan, Y Ohsita, M Murata
2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC), 1-5, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20