default search action
Benfano Soewito
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c39]Choirul Huda, Ford Lumban Gaol, Harco Leslie Hendric Spits Warnars, Benfano Soewito:
Software Size Measurement of Smart Digital Tourism Project based on Use Case Point. ICCSCI 2023: 902-911 - [c38]Semi Yulianto, Benfano Soewito, Ford Lumban Gaol, Aditiya Kurniawan:
Metrics and Red Teaming in Cyber Resilience and Effectiveness: A Systematic Literature Review. ICT 2023: 1-7 - 2022
- [j10]Irwan Piesessa, Benfano Soewito:
Analysis of BGP4 Peering Establishment Time on IPv6 Connection over 6PE and 6VPE. Int. J. Commun. Networks Inf. Secur. 13(2) (2022) - [j9]Benfano Soewito, Agung Suwandaru:
Android sensitive data leakage prevention with rooting detection using Java function hooking. J. King Saud Univ. Comput. Inf. Sci. 34(5): 1950-1957 (2022) - [j8]Maniah, Benfano Soewito, Ford Lumban Gaol, Edi Abdurachman:
A systematic literature Review: Risk analysis in cloud migration. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part B): 3111-3120 (2022) - 2021
- [c37]Nicholas Dominic, Jonathan Sebastian Prayoga, Daniel Kumala, Nico Surantha, Benfano Soewito:
The Comparative Study of Algorithms in Building the Green Mobile Cloud Computing Environment. 3PGCIC 2021: 43-54 - [c36]Nico Surantha, Gary Nico, Michael Henry, Wiryanata Chandra, Benfano Soewito:
Wearable Internet-of-Things Device for COVID-19 Detection, Monitoring and Prevention: A Review. 3PGCIC 2021: 55-63 - [c35]Irvan Santoso, Harco Leslie Hendric Spits Warnars, Ford Lumban Gaol, Edi Abdurachman, Benfano Soewito:
Measurement of Web-Based Merchant Application Portal (MAP) Using Function Point Analysis and Constructive Cost Model II. APCoRISE 2021: 639-644 - [c34]Richard, Harjanto Prabowo, Agung Trisetyarso, Benfano Soewito:
Blockchain Platform Selection for Security Token Offering (STO) Using Multi-criteria Decision Model. BLOCKCHAIN 2021: 171-178 - 2020
- [c33]Richard, Harjanto Prabowo, Agung Trisetyarso, Benfano Soewito:
Smart Contract Development Model and the Future of Blockchain Technology. ICBTA 2020: 34-39
2010 – 2019
- 2019
- [c32]Benfano Soewito, Fergyanto E. Gunawan, Indra Permana Rusli:
The use of android smart phones as a tool for absences. ICCSCI 2019: 238-246 - [c31]Oei Kurniawan Utomo, Nico Surantha, Sani Muhamad Isa, Benfano Soewito:
Automatic Sleep Stage Classification using Weighted ELM and PSO on Imbalanced Data from Single Lead ECG. ICCSCI 2019: 321-328 - [c30]Fergyanto E. Gunawan, Benfano Soewito, Nico Surantha, Tuga Mauritsius, Nobumasa Sekishita:
A Study of the Sensitivity of the Fuel Consumption to Driving Strategy by Micro Simulation. ICCSCI 2019: 375-381 - [c29]Fergyanto E. Gunawan, Benfano Soewito, Nico Surantha, Tuga Mauritsius, Nobumasa Sekishita:
Classification of the Structural Integrity by the General Vibration Method. ICCSCI 2019: 382-387 - [c28]Benfano Soewito, Christian, Fergyanto E. Gunawan, Diana, Gede Putra Kusuma:
Websocket to Support Real Time Smart Home Applications. ICCSCI 2019: 560-566 - [c27]Fergyanto E. Gunawan, Benfano Soewito, Nobumasa Sekishita:
Students' Fixation on Tables in PowerPoint Slides. TALE 2019: 1-5 - [c26]Maniah, Benfano Soewito, Ford Lumban Gaol, Edi Abdurachman:
Risk Assessment on Cloud Computing for The Learning System in The Education Environment. TALE 2019: 1-6 - [c25]Benfano Soewito, Okky D. Saiman, Fergyanto E. Gunawan:
Internet Protocol Multimedia Subsystem Security Risk Mitigation In Fix Telephone Network. TALE 2019: 1-6 - 2018
- [c24]Melki Sadekh Mansuan, Benfano Soewito, Mohammad Hamdani:
Designing Fiber Optic Network using Voronoi Diagram Approach. ICCSCI 2018: 15-24 - [c23]Rizal Ansyori, Nanik Qodarsih, Benfano Soewito:
A systematic literature review: Critical Success Factors to Implement Enterprise Architecture. ICCSCI 2018: 43-51 - [c22]Benfano Soewito, Fergyanto E. Gunawan, Hirzi, Frumentius:
Prevention Structured Query Language Injection Using Regular Expression and Escape String. ICCSCI 2018: 678-687 - 2017
- [c21]Benfano Soewito, Andy, Fergyanto E. Gunawan, Melki Sadekh Mansuan:
WAN Optimization to Speed up Data Transfer. ICCSCI 2017: 45-53 - [c20]Zulfany Erlisa Rasjid, Benfano Soewito, Gunawan Witjaksono, Edi Abdurachman:
A review of collisions in cryptographic hash function used in digital forensic tools. ICCSCI 2017: 381-392 - 2016
- [c19]Fergyanto E. Gunawan, Elysia Elysia, Benfano Soewito, Bahtiar Saleh Abbas:
A New Method for Calibrating Gazis-Herman-Rothery Car-Following Model. ACIIDS (2) 2016: 765-772 - [c18]Karto Iskandar, Ford Lumban Gaol, Benfano Soewito, Harco Leslie Hendric Spits Warnars, Raymondus Kosala:
Software size measurement of knowledge management portal with use case point. IC3INA 2016: 42-47 - [c17]Fergyanto E. Gunawan, Livia Ashianti, Sevenpri Candra, Benfano Soewito:
Detecting online child grooming conversation. KICSS 2016: 1-6 - [c16]Fergyanto E. Gunawan, Kanyadian Idananta, Sevenpri Candra, Benfano Soewito:
Relation between emotional state and speech signal. KICSS 2016: 1-3 - [c15]Fergyanto E. Gunawan, Aji Maryanto, Yogi Udjaja, Sevenpri Candra, Benfano Soewito:
Improvement of E-learning quality by means of a recommendation system. KICSS 2016: 1-4 - [c14]Karto Iskandar, Noprianto, Bahtiar Saleh Abbas, Benfano Soewito, Raymondus Kosala:
Two-Way ANOVA with interaction approach to compare content creation speed performance in knowledge management system. KICSS 2016: 1-5 - [c13]Noprianto, Benfano Soewito, Ford Lumban Gaol, Harco Leslie Hendric, Spits Warnars:
Simple spreadsheet test case application to test spreadsheet formula in end-user software engineering. KICSS 2016: 1-5 - [c12]Benfano Soewito, Ikhtiar Faahakhododo, Fergyanto E. Gunawan:
Increasing the accuracy of distance measurement between access point and smartphone. KICSS 2016: 1-6 - [c11]Benfano Soewito, Fergyanto E. Gunawan, Diana, Anna Antonyova:
Power consumption for security on mobile devices. KICSS 2016: 1-4 - [c10]Benfano Soewito, Agses Yohannes Haposan Ritonga, Fergyanto E. Gunawan:
Increasing accuracy of bluetooth low energy for distance measurement applications. KICSS 2016: 1-5 - 2015
- [p1]Benfano Soewito:
Designing and Manufacturing Quartz Crystal Oscillators. Computational Intelligence and Efficiency in Engineering Systems 2015: 293-306 - 2014
- [j7]Benfano Soewito, Yonathan Marcellinus, Manik Hapsara:
Secure Wireless Ad Hoc Networks using Zero Knowledge Proof. J. Comput. Sci. 10(12): 2488-2493 (2014) - 2011
- [j6]Ning Weng, Luke Vespa, Benfano Soewito:
Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system. Comput. Networks 55(8): 1648-1661 (2011) - [j5]Benfano Soewito, Lucas Vespa, Ning Weng, Haibo Wang:
Hybrid pattern matching for trusted intrusion detection. Secur. Commun. Networks 4(1): 33-43 (2011)
2000 – 2009
- 2009
- [j4]Benfano Soewito, Ning Weng:
Concurrent workload mapping for multicore security systems. Concurr. Comput. Pract. Exp. 21(10): 1281-1306 (2009) - [j3]Lucas Vespa, Ning Weng, Benfano Soewito:
Optimized memory based accelerator for scalable pattern matching. Microprocess. Microsystems 33(7-8): 469-482 (2009) - [j2]Benfano Soewito, Lucas Vespa, Atul Mahajan, Ning Weng, Haibo Wang:
Self-addressable memory-based FSM: a scalable intrusion detection engine. IEEE Netw. 23(1): 14-21 (2009) - [c9]Lucas Vespa, Ning Weng, Benfano Soewito:
Reconfigurable String Matching Engine for Network Intrusion Detection. PDPTA 2009: 756-762 - [c8]Ning Weng, Luke Vespa, Benfano Soewito:
Multicore-Based Self-Adapting Pattern Detection Engine. PDPTA 2009: 790-796 - 2008
- [j1]Ning Weng, Benfano Soewito:
Evaluating DNA sequence searching algorithms on multicore. Int. J. Comput. Biol. Drug Des. 1(3): 313-327 (2008) - [c7]Benfano Soewito, Ning Weng:
Methodology for evaluating string matching algorithms on multiprocessor. AICCSA 2008: 20-27 - [c6]Ning Weng, Nandeesh Kumar, Satish Dechu, Benfano Soewito:
Mapping task graphs onto Network Processors using genetic algorithm. AICCSA 2008: 481-488 - [c5]Satish Dechu, Ning Weng, Benfano Soewito:
Mapping Parallel Workload onto Network Processors Using Simulated Annealing. ESA 2008: 62-68 - [c4]Benfano Soewito, Ning Weng:
Approximate Packet Pre-filtering to Accelerate Pattern Matching. Security and Management 2008: 203-209 - [c3]Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning Weng, Haibo Wang:
Implementing high-speed string matching hardware for network intrusion detection systems. FPGA 2008: 264 - [c2]Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning Weng, Haibo Wang:
Implementing High-Speed String Matching Hardware for Network Intrusion Detection Systems. PDPTA 2008: 157-163 - 2007
- [c1]Benfano Soewito, Ning Weng:
Methodology for Evaluating DNA Pattern Searching Algorithms on Multiprocessor. BIBE 2007: 570-577
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint