Maulahikmah Galinium

Orcid: 0000-0001-8418-3796

According to our database1, Maulahikmah Galinium authored at least 15 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Deep Learning Analysis in Development of Handwritten and Plain Text Classification API.
Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry, 2022

2020
Optimization on Malaria Computer Aided Diagnostic System.
Proceedings of the ICONETSI 2020: International Conference on Engineering and Information Technology for Sustainable Industry, 2020

Business Analysis and Design of Online Marketplace for Beauty Care Services.
Proceedings of the ICONETSI 2020: International Conference on Engineering and Information Technology for Sustainable Industry, 2020

Backend Development of Online Marketplace for Male Beauty Care Services.
Proceedings of the ICONETSI 2020: International Conference on Engineering and Information Technology for Sustainable Industry, 2020

An Online Catering Marketplace Business Plan: Kunyahku.id.
Proceedings of the ICONETSI 2020: International Conference on Engineering and Information Technology for Sustainable Industry, 2020

2017
Contact lens detection for iris spoofing countermeasure.
Int. J. Biom., 2017

Understanding and granting android permissions: A user survey.
Proceedings of the International Carnahan Conference on Security Technology, 2017

2014
Case Studies: Business and Technical Perspectives in Migration of Legacy Systems to Service Oriented Architecture.
CoRR, 2014

2013
Simulation based verification of concurrent processing on security devices.
Proceedings of the IEEE International Systems Conference, 2013

2012
Secure Messaging Implementation in OpenSC.
J. Information Security, 2012

Interleaving Command Sequences: a Threat to Secure Smartcard Interoperability
CoRR, 2012

Interleaving Commands: a Threat to the Interoperability of Smartcard Based Security Applications
CoRR, 2012

Design and Implementation of the Connectionless Network Protocol (CLNP) as Loadable Kernel Modules in Linux Kernel 2.6
CoRR, 2012

Design and Implementation of the End System to Intermediate System (ES-IS) Routing Information Exchange Protocol as a Loadable Kernel Module in Linux Kernel 2.6.
CoRR, 2012

State space blow-up in the verification of secure smartcard interoperability.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2012


  Loading...