Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
Tohari AhmadDepartment of Informatics, Institut Teknologi Sepuluh NopemberVerified email at if.its.ac.id
Ary Mazharuddin ShiddiqiInstitut Teknologi Sepuluh Nopember, University of Western AustraliaVerified email at its.ac.id
Baskoro Adi PratomoInstitut Teknologi Sepuluh NopemberVerified email at if.its.ac.id
Ferdous SohelMurdoch UniversityVerified email at murdoch.edu.au
Supeno DjanaliDepartment of Informatics, Institut Teknologi Sepuluh NopemberVerified email at its.ac.id
Royyana Muslim IjtihadieDepartment of Informatics, Institut Teknologi Sepuluh Nopember ITS SurabayaVerified email at its.ac.id
George GrisposAssistant Professor of Cybersecurity - University of Nebraska at OmahaVerified email at unomaha.edu
Christian PayneMurdoch UniversityVerified email at murdoch.edu.au
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
Lowri WilliamsCardiff UniversityVerified email at cardiff.ac.uk
Dr Eirini AnthiCybersecurity Lecturer, Cardiff UniversityVerified email at cardiff.ac.uk
Follow
Hudan Studiawan
Department of Informatics, Institut Teknologi Sepuluh Nopember
Verified email at if.its.ac.id - Homepage