Search

Your search keyword '"Sukarno"' showing total 68 results

Search Constraints

Start Over You searched for: Author "Sukarno" Remove constraint Author: "Sukarno" Publisher ieee Remove constraint Publisher: ieee
68 results on '"Sukarno"'

Search Results

6. An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee

7. A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics

15. Thermal Characteristics of Tube Economizer with Serrated Fin

17. How Can National Identity Card Reduce Authentication Risks in Enterprise Attendance Management System?

18. Randomness, Uniqueness, and Steadiness Evaluation of Physical Unclonable Functions

22. Comparison of 5G NR Planning in Mid-Band and High-Band in Jababeka Industrial Estate

23. Mitigating Risk of IoT Sensing Data Error Using Platform as a Data Handler

24. Blacklisted IP Distribution System to handle DDoS attacks on IPS Snort based on Blockchain

25. Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System

26. Comparative Analysis of K-Nearest Neighbor and Decision Tree in Detecting Distributed Denial of Service

27. Security Functional Requirements for The Development of a Biometrics Attendance System

28. How Can Fingerprint Improves The Payment Experience of a Drink Vending Machine?

29. Notice of Removal: Material Handling Cost Analysis in Oil and Gas Company: (Case Study: Removal of Heat Exchanger with Rough Terrain Crane)

38. Toward Autonomy: Symbiotic Formal and Statistical Machine Reasoning

39. Adopting Fingerprint as an Authentication Factor on E-Ticketing Mechanism

40. Mitigation of Cryptojacking Attacks Using Taint Analysis

41. Virtual Password Authentication Scheme in Hashed Domain

42. Overhead Analysis on the Use of Digital Signature in MQTT Protocol

43. Security Document for Smart Parking Gate based on Common Criteria Framework

44. Quality of Service (QoS) Comparison Analysis of Snort IDS and Bro IDS Application in Software Define Network (SDN) Architecture

45. Improving The Accuracy of Fuzzy Vault Scheme in Fingerprint Biometric

46. Reducing Attack Surface via Executable Transformation

47. Analysis and Classification of Danger Level in Android Applications Using Naive Bayes Algorithm

48. Analysis of the Technology Acceptance Model (TAM) on Survey System Based Smartphone by the National Population and Family Planning Indonesia

49. Hardening the Virtual Password Authentication Scheme

50. An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System

Catalog

Books, media, physical & digital resources