Benfano Soewito

Orcid: 0000-0002-3284-5433

According to our database1, Benfano Soewito authored at least 44 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Metrics and Red Teaming in Cyber Resilience and Effectiveness: A Systematic Literature Review.
Proceedings of the 29th International Conference on Telecommunications, 2023

Software Size Measurement of Smart Digital Tourism Project based on Use Case Point.
Proceedings of the Empowering Smart Technology in Digital Era for Industry and Socity: The 8th International Conference on Computer Science and Computational Intelligence, 2023

2022
Analysis of BGP4 Peering Establishment Time on IPv6 Connection over 6PE and 6VPE.
Int. J. Commun. Networks Inf. Secur., April, 2022

Android sensitive data leakage prevention with rooting detection using Java function hooking.
J. King Saud Univ. Comput. Inf. Sci., 2022

A systematic literature Review: Risk analysis in cloud migration.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
Blockchain Platform Selection for Security Token Offering (STO) Using Multi-criteria Decision Model.
Proceedings of the Blockchain and Applications - 3rd International Congress, 2021

Measurement of Web-Based Merchant Application Portal (MAP) Using Function Point Analysis and Constructive Cost Model II.
Proceedings of the 4th Asia Pacific Conference on Research in Industrial and Systems Engineering 2021, 2021

Wearable Internet-of-Things Device for COVID-19 Detection, Monitoring and Prevention: A Review.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2021

The Comparative Study of Algorithms in Building the Green Mobile Cloud Computing Environment.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2021

2020
Smart Contract Development Model and the Future of Blockchain Technology.
Proceedings of the ICBTA 2020: The 3rd International Conference on Blockchain Technology and Applications, 2020

2019
Internet Protocol Multimedia Subsystem Security Risk Mitigation In Fix Telephone Network.
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019

Risk Assessment on Cloud Computing for The Learning System in The Education Environment.
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019

Students' Fixation on Tables in PowerPoint Slides.
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019

2018
Prevention Structured Query Language Injection Using Regular Expression and Escape String.
Proceedings of the Empowering Smart Technology in Digital Era for a Better Life: The 3rd International Conference on Computer Science and Computational Intelligence, 2018

Designing Fiber Optic Network using Voronoi Diagram Approach.
Proceedings of the Empowering Smart Technology in Digital Era for a Better Life: The 3rd International Conference on Computer Science and Computational Intelligence, 2018

A systematic literature review: Critical Success Factors to Implement Enterprise Architecture.
Proceedings of the Empowering Smart Technology in Digital Era for a Better Life: The 3rd International Conference on Computer Science and Computational Intelligence, 2018

2017
WAN Optimization to Speed up Data Transfer.
ICCSCI, 2017

A review of collisions in cryptographic hash function used in digital forensic tools.
ICCSCI, 2017

2016
Increasing accuracy of bluetooth low energy for distance measurement applications.
Proceedings of the 11th International Conference on Knowledge, 2016

Power consumption for security on mobile devices.
Proceedings of the 11th International Conference on Knowledge, 2016

Increasing the accuracy of distance measurement between access point and smartphone.
Proceedings of the 11th International Conference on Knowledge, 2016

Simple spreadsheet test case application to test spreadsheet formula in end-user software engineering.
Proceedings of the 11th International Conference on Knowledge, 2016

Two-Way ANOVA with interaction approach to compare content creation speed performance in knowledge management system.
Proceedings of the 11th International Conference on Knowledge, 2016

Improvement of E-learning quality by means of a recommendation system.
Proceedings of the 11th International Conference on Knowledge, 2016

Relation between emotional state and speech signal.
Proceedings of the 11th International Conference on Knowledge, 2016

Detecting online child grooming conversation.
Proceedings of the 11th International Conference on Knowledge, 2016

Software size measurement of knowledge management portal with use case point.
Proceedings of the 2016 International Conference on Computer, 2016

A New Method for Calibrating Gazis-Herman-Rothery Car-Following Model.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

2015
Designing and Manufacturing Quartz Crystal Oscillators.
Proceedings of the Computational Intelligence and Efficiency in Engineering Systems, 2015

2014
Secure Wireless Ad Hoc Networks using Zero Knowledge Proof.
J. Comput. Sci., 2014

2011
Hybrid pattern matching for trusted intrusion detection.
Secur. Commun. Networks, 2011

Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system.
Comput. Networks, 2011

2009
Self-addressable memory-based FSM: a scalable intrusion detection engine.
IEEE Netw., 2009

Optimized memory based accelerator for scalable pattern matching.
Microprocess. Microsystems, 2009

Concurrent workload mapping for multicore security systems.
Concurr. Comput. Pract. Exp., 2009

Multicore-Based Self-Adapting Pattern Detection Engine.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009

Reconfigurable String Matching Engine for Network Intrusion Detection.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009

2008
Evaluating DNA sequence searching algorithms on multicore.
Int. J. Comput. Biol. Drug Des., 2008

Implementing high-speed string matching hardware for network intrusion detection systems.
Proceedings of the ACM/SIGDA 16th International Symposium on Field Programmable Gate Arrays, 2008

Approximate Packet Pre-filtering to Accelerate Pattern Matching.
Proceedings of the 2008 International Conference on Security & Management, 2008

Mapping Parallel Workload onto Network Processors Using Simulated Annealing.
Proceedings of the 2008 International Conference on Embedded Systems & Applications, 2008

Mapping task graphs onto Network Processors using genetic algorithm.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

Methodology for evaluating string matching algorithms on multiprocessor.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
Methodology for Evaluating DNA Pattern Searching Algorithms on Multiprocessor.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007


  Loading...