Skip to main content
Publications
-
Analysis of Indonesia's Internet Topology Borders at the Autonomous System Level
T Witono, S Yazid
2020 3rd International Seminar on Research of Information Technology and Intelligent Systems (ISRITI 2020)
-
Portrait of Indonesia’s Internet Topology at the Autonomous System Level
T Witono, S Yazid
2020 Computational Science and Technology. Lecture Notes in Electrical Engineering, vol 603.
-
Performance Analysis of the Symmetric Proxy Re-encryption Scheme
R. P. Meiliasari, A. Syalim and S. Yazid
2019 International Workshop on Big Data and Information Security (IWBIS 2019)
-
Customer Churn Analysis and Prediction Using Data Mining Models in Banking Industry
K. G. M. Karvana, S. Yazid, A. Syalim and P. Mursanto
2019 International Workshop on Big Data and Information Security (IWBIS 2019)
-
Development of Communication Technology on VANET with a Combination of Ad-hoc, Cellular and GPS Signals as a Solution Traffic Problems
H Faris, S Yazid
2019 7th International Conference on Information and Communication Technology (ICoICT 2019)
-
Implementation of Lean Methods on Management of IT Infrastructure Monitoring System: A Case Study of PT Kalbe Farma
D. Pratama, R. F. Aji and S. Yazid
2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS 2018)
-
Enumeration and Handling Security Issues of Government Official Web Application
A Fajar, S Yazid.
2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS 2018)
-
Image Preparation For Steganography Capacity Estimation for Specific Image Genre
AC Jaya, S Yazid.
2018 International Workshop on Big Data and Information Security (IWBIS 2018)
-
On preventing bitcoin transaction from money laundering in Indonesia: Analysis and recommendation on regulations
A Gifari, B Anggorojati, S Yazid
2017 International Workshop on Big Data and Information Security (IWBIS 2017)
-
Differentially private optimization algorithms for deep neural networks
R Gylberth, R Adnan, S Yazid, T Basaruddin.
2017 International Conference on Advanced Computer Science and Information Systems (ICACSIS 2017)
-
Mitigation strategy of sinkhole attack in Wireless Sensor Network
MT Kurniawan, S Yazid.
2017 International Workshop on Big Data and Information Security (IWBIS 2017)
-
Improved proxy re-encryption scheme for symmetric key cryptography
A Syalim, T Nishide, K Sakurai
2017 International Workshop on Big Data and Information Security (IWBIS 2017)
-
How to sign multiple versions of digital documents
A Syalim, K Sakurai
2017 International Workshop on Big Data and Information Security (IWBIS 2017)
-
Information security awareness level measurement for employee: Case study at ministry of research, technology, and higher education
DDH Wahyudiwan, YG Sucahyo, A Gandhi
2017 3rd International Conference on Science in Information Technology (ICSITech 2017)
-
Certificate policy analysis and formulation of the government public key infrastructure using SSM: A case study of Indonesia State Cryptography Agency (Lemsaneg)
S Yazid, ME Aziz.
2016 International Conference on Advanced Computer Science and Information System (ICACSIS 2016)
-
Certificate policy and certification practice statement for root CA Indonesia
A Gandhi, YG Sucahyo, T Sirait
2016 2nd International Conference on Science in Information Technology (ICSITech 2016)
-
Information security risk management planning: A case study at application module of state asset directorate general of state asset ministry of finance
S Prasetyo, YG Sucahyo
2014 International Conference on Advanced Computer Science and Information Systems (ICACSIS 2014)
-
DDoS attack detection method and mitigation using pattern of the flow
A Sanmorino, S Yazid.
2013 International Conference of Information and Communication Technology (ICiICT 2013)
-
Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance
A Syalim, T Nishide, K Sakurai
2013 Information and Communication Technology-EurAsia Conference, 363-372 (ICT-EurAsia 2013)
-
Balanced E-Government security framework: An integrated approach to protect information and application
F Setiadi, YG Sucahyo, ZA Hasibuan
2013 International Conference on Technology, Informatics, Management, Engineering and Environment (TIME-E 2013)
-
A survey for handwritten signature verification
A Sanmorino, S Yazid.
2012 2nd International Conference on Uncertainty Reasoning and Knowledge (URKE 2012)
-
Securing provenance of distributed processes in an untrusted environment
A Syalim, T Nishide, K Sakurai
2012 IEICE TRANSACTIONS on Information and Systems 95 (7), 1894-190
-
An overview of the development indonesia national cyber security
F Setiadi, YG Sucahyo, ZA Hasibuan
2012 International Journal of Information & Computer Science 6, 108
-
Realizing proxy re-encryption in the symmetric world
A Syalim, T Nishide, K Sakurai.
2011 International Conference on Informatics Engineering and Information Science (ICIEIS 2011)
-
Digital certificate based security system for electronic government: Case study of PKI implementation for securing electronic government procurement in Indonesia
E Prima, YG Sucahyo
2011 IADIS International Conference Internet Technologies and Society (ITS 2011)
-
Preserving integrity and confidentiality of a directed acyclic graph model of provenance
A Syalim, T Nishide, K Sakurai.
2010 IFIP Annual Conference on Data and Applications Security and Privacy, 311-318 (DBSec 2010)
-
Grouping provenance information to improve efficiency of access control
A Syalim, Y Hori, K Sakurai
2009 International Conference on Information Security and Assurance (ISA 2009)