Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
- Tohari AhmadDepartment of Informatics, Institut Teknologi Sepuluh NopemberVerified email at if.its.ac.id
- Ary Mazharuddin ShiddiqiInstitut Teknologi Sepuluh Nopember, University of Western AustraliaVerified email at its.ac.id
- Baskoro Adi PratomoInstitut Teknologi Sepuluh NopemberVerified email at if.its.ac.id
- Ferdous SohelMurdoch UniversityVerified email at murdoch.edu.au
- Supeno DjanaliDepartment of Informatics, Institut Teknologi Sepuluh NopemberVerified email at its.ac.id
- Swardiantara SilalahiInsitut Teknologi Sepuluh NopemberVerified email at student.its.ac.id
- Royyana Muslim IjtihadieDepartment of Informatics, Institut Teknologi Sepuluh Nopember ITS SurabayaVerified email at its.ac.id
- George GrisposAssistant Professor of Cybersecurity - University of Nebraska at OmahaVerified email at unomaha.edu
- Arda Surya EdityaUniversitas NU SidoarjoVerified email at unusida.ac.id
- Christian PayneMurdoch UniversityVerified email at murdoch.edu.au
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Lowri WilliamsCardiff UniversityVerified email at cardiff.ac.uk
- Dr Eirini AnthiCybersecurity Lecturer, Cardiff UniversityVerified email at cardiff.ac.uk
Follow
Hudan Studiawan
Department of Informatics, Institut Teknologi Sepuluh Nopember
Verified email at if.its.ac.id - Homepage