Benfano Soewito
Benfano Soewito
Verified email at
Cited by
Cited by
A Proposed surveillance model in an Intelligent Transportation System (ITS)
AS Putra, HLHS Warnars, FL Gaol, B Soewito, E Abdurachman
2018 Indonesian association for pattern recognition international conference …, 2018
The accuracy comparison among word2vec, glove, and fasttext towards convolution neural network (cnn) text classification
EM Dharma, FL Gaol, H Warnars, B Soewito
J Theor Appl Inf Technol 100 (2), 349-359, 2022
A systematic literature review: Critical success factors to implement enterprise architecture
R Ansyori, N Qodarsih, B Soewito
Procedia Computer Science 135, 43-51, 2018
Software metrics for fault prediction using machine learning approaches: A literature review with PROMISE repository dataset
S Karim, HLHS Warnars, FL Gaol, E Abdurachman, B Soewito
2017 IEEE international conference on cybernetics and computational …, 2017
Attendance system on Android smartphone
B Soewito, FL Gaol, E Simanjuntak, FE Gunawan
2015 International Conference on Control, Electronics, Renewable Energy and …, 2015
Logistic models for classifying online grooming conversation
H Pranoto, FE Gunawan, B Soewito
Procedia Computer Science 59, 357-365, 2015
Smart mobile attendance system using voice recognition and fingerprint on smartphone
B Soewito, FL Gaol, E Simanjuntak, FE Gunawan
2016 International Seminar on Intelligent Technology and Its Applications …, 2016
A review of collisions in cryptographic hash function used in digital forensic tools
ZE Rasjid, B Soewito, G Witjaksono, E Abdurachman
Procedia computer science 116, 381-392, 2017
Websocket to support real time smart home applications
B Soewito, FE Gunawan, IGP Kusuma
Procedia Computer Science 157, 560-566, 2019
Survey on threats and risks in the cloud computing environment
E Abdurachman, FL Gaol, B Soewito
Procedia Computer Science 161, 1325-1332, 2019
A systematic literature Review: Risk analysis in cloud migration
B Soewito, FL Gaol, E Abdurachman
Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022
Software quality model for Internet of Things governance
JJC Tambotoh, SM Isa, FL Gaol, B Soewito, HLHS Warnars
2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016
Django web framework software metrics measurement using radon and pylint
S Liawatimena, HLHS Warnars, A Trisetyarso, E Abdurahman, B Soewito, ...
2018 Indonesian Association for Pattern Recognition International Conference …, 2018
Information security maturity model: A best practice driven approach to PCI DSS compliance
S Yulianto, C Lim, B Soewito
2016 IEEE Region 10 Symposium (TENSYMP), 65-70, 2016
Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework
K Razikin, B Soewito
Egyptian Informatics Journal 23 (3), 383-404, 2022
Usability testing method in augmented reality application
H Pranoto, C Tho, HLHS Warnars, E Abdurachman, FL Gaol, B Soewito
2017 International Conference on Information Management and Technology …, 2017
IoT security system with modified Zero Knowledge Proof algorithm for authentication
B Soewito, Y Marcellinus
Egyptian Informatics Journal 22 (3), 269-276, 2021
Automatic sleep stage classification using weighted ELM and PSO on imbalanced data from single lead ECG
OK Utomo, N Surantha, SM Isa, B Soewito
Procedia Computer Science 157, 321-328, 2019
Detecting online child grooming conversation
FE Gunawan, L Ashianti, S Candra, B Soewito
2016 11th International Conference on Knowledge, Information and Creativity …, 2016
Software size measurement of knowledge management portal with use case point
K Iskandar, FL Gaol, B Soewito, HLHS Warnars, R Kosala
2016 International Conference on Computer, Control, Informatics and its …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20