Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
Tohari AhmadDepartment of Informatics, Institut Teknologi Sepuluh NopemberVerified email at if.its.ac.id
Baskoro Adi PratomoInstitut Teknologi Sepuluh Nopember, Cardiff UniversityVerified email at if.its.ac.id
Ary Mazharuddin ShiddiqiInstitut Teknologi Sepuluh Nopember, University of Western AustraliaVerified email at if.its.ac.id
Ferdous SohelMurdoch UniversityVerified email at murdoch.edu.au
Supeno DjanaliDepartment of Informatics, Institut Teknologi Sepuluh NopemberVerified email at its.ac.id
Swardiantara SilalahiInsitut Teknologi Sepuluh NopemberVerified email at student.its.ac.id
Royyana Muslim IjtihadieDepartment of Informatics, Institut Teknologi Sepuluh Nopember ITS SurabayaVerified email at its.ac.id
Radityo AnggoroInstitut Teknologi Sepuluh NopemberVerified email at if.its.ac.id
George GrisposAssistant Professor of Cybersecurity - University of Nebraska at OmahaVerified email at unomaha.edu
Christian PayneMurdoch UniversityVerified email at murdoch.edu.au
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
Lowri WilliamsCardiff UniversityVerified email at cardiff.ac.uk
Dr Eirini AnthiCybersecurity Lecturer, Cardiff UniversityVerified email at cardiff.ac.uk
Follow![Hudan Studiawan](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=e5pVb-wAAAAJ&citpid=5)
Hudan Studiawan
Department of Informatics, Institut Teknologi Sepuluh Nopember
Verified email at if.its.ac.id - Homepage