|
|
|
Melki Mario Gulo, I Gede Puja Astawa, Amang Sudarsono
Pág. 35 - 59
In recent years, the development of communication technology has advanced at an accelerated rate. Communication technologies such as 4G, 5G, Wi-Fi 5 (802.11ac), and Wi-Fi 6 (802.11ax) are extensively used today due to their excellent system quality and e...
ver más
|
|
|
|
|
|
|
Ruwaidah Afiyati, Sudarsono, Tunggul Anshari Setia Negara, Imam Koeswahyono
Pág. 503 - 511
|
|
|
|
|
|
|
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto
Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time. Howe...
ver más
|
|
|
|
|
|
|
Indra Kusuma Haryanto, Sudarsono Sudarsono, Bambang Sugiri, Abdul Rachmad Budiono
Pág. 423 - 431
|
|
|
|
|
|
|
Dielasy Budiarti, Sudarsono Sudarsono, Bambang Sugiri, Abdul Rachmad Budiono
Pág. 173 - 183
|
|
|
|
|
|
|
Saifudin Usman, Idris Winarno, Amang Sudarsono
Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio...
ver más
|
|
|
|
|
|
|
Tri Ubayanto, sudarsono sudarsono, Iwan Permadi, Setyo Widagdo
Pág. 105 - 113
|
|
|
|
|
|
|
Hendra Kurnia Putra, sudarsono sudarsono, Istislam Istislam, Aan Eko Widiarto
Pág. 182 - 190
|
|
|
|
|
|
|
Anindya Dwi Putri Islamidina, Amang Sudarsono, Titon Dutono
Pág. 102 - 125
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size an...
ver más
|
|
|
|
|
|
|
Inka Trisna Dewi, Amang Sudarsono, Prima Kristalina, Mike Yuliana
Pág. 140 - 160
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize ...
ver más
|
|
|
|