Heru Susanto

Orcid: 0000-0002-1823-357X

According to our database1, Heru Susanto authored at least 39 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
CIRC Model Based on Audiovisual Local Wisdom on Ability to Write Malay Pantun.
Proceedings of the Learning Technology for Education Challenges, 2023

CFPChain: An Optimization of Research Funding Selection System Employing A Consortium Blockchain Based Approach.
Proceedings of the International Conference on Computer, 2023

5G Network Base Station Timeline Scheduling.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

2022
Innovative Business Process Reengineering Adoption: Framework of Big Data Sentiment, Improving Customers' Service Level Agreement.
Big Data Cogn. Comput., 2022

Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

Asymmetric Cryptography Among Different 5G Core Networks.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

5G Base Station Scheduling.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

Detection and Defense of DDoS Attack and Flash Events by Using Shannon Entropy.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

Accelerating Encrypted Watermarking using Wavelet Transform and CKKS Homomorphic Encryption.
Proceedings of the 2022 International Conference on Computer, 2022

2021
A Fault Tolerant Mechanism for UE Authentication in 5G Networks.
Mob. Networks Appl., 2021

Small Object Detection Based on SSD-ResNeXt101.
Proceedings of the 11th International Conference on Robotics, Vision, Signal Processing and Power Applications, 2021

Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software Maintenance.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

A Q-Learning Based Downlink Scheduling Algorithm for Multiple Traffics in 5G NR Systems.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Smart Surveillance for COVID-19 Health Protocol Compliance in Vehicles.
Proceedings of the IC3INA 2021: The 2021 International Conference on Computer, Control, Informatics and Its Applications, Virtual/Online Conference, Indonesia, October 5, 2021

The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project Failure.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

2020
Mobile Physiological Sensor Cloud System for Long-term Care.
Internet Things, 2020

A channel assignment scheme for MIMO on concentric-hexagon-based multi-channel wireless networks.
Int. J. Ad Hoc Ubiquitous Comput., 2020

A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme.
Concurr. Comput. Pract. Exp., 2020

2019
Improving Metrics to Rank the Research Performance.
Proceedings of the 3rd International Conference on Advances in Artificial Intelligence, 2019

News Collection and Analysis on Public Political Opinions.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Mobile Physiological Sensor Cloud System for Long-Term Care.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

System Implementation of AUSF Fault Tolerance.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Revealing Storage and Speed Transmission Emerging Technology of Big Data.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
An MFCC-based text-independent speaker identification system for access control.
Concurr. Comput. Pract. Exp., 2018

High Performance Grid Computing: Challenges and Opportunities of High Speed Networking.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Migration of Edge Computing Services in 5G Networks - Firewall as a Service Example.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

2016
Android vs iOS or Others? SMD-OS Security Issues: Generation Y Perception.
Int. J. Technol. Diffusion, 2016

2015
S-PMIPv6: An intra-LMA model for IPv6 mobility.
J. Netw. Comput. Appl., 2015

Revealing Customer Behavior on Smartphones.
Int. J. Asian Bus. Inf. Manag., 2015

2013
Crafting strategies for sustainability: how travel agents should react in facing a disintermediation.
Oper. Res., 2013

2012
Toward Cloud Computing Evolution
CoRR, 2012

Information Security Awareness Within Business Environment: An IT Review
CoRR, 2012

Refinement of Strategy and Technology Domains STOPE View on ISO 27001
CoRR, 2012

Integrated Solution Modeling Software: A New Paradigm on Information Security Review
CoRR, 2012

A Simulation Approach Paradigm: An Optimization and Inventory Challenge Case Study
CoRR, 2012

I-SolFramework: An Integrated Solution Framework Six Layers Assessment on Multimedia Information Security Architecture Policy Compliance.
CoRR, 2012

A Novel Method on ISO 27001 Reviews: ISMS Compliance Readiness Level Measurement
CoRR, 2012

Integrated Solution Modeling Software: A New Paradigm on Information Security Review and Assessment
CoRR, 2012


  Loading...