Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Soewito, Benfano
add a person with the name Soewito, Benfano
 

Other publications of authors with the same name

Detecting online child grooming conversation., , , and . KICSS, page 1-6. IEEE, (2016)A systematic literature Review: Risk analysis in cloud migration., , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (6 Part B): 3111-3120 (2022)Hybrid pattern matching for trusted intrusion detection., , , and . Secur. Commun. Networks, 4 (1): 33-43 (2011)A New Method for Calibrating Gazis-Herman-Rothery Car-Following Model., , , and . ACIIDS (2), volume 9622 of Lecture Notes in Computer Science, page 765-772. Springer, (2016)Measurement of Web-Based Merchant Application Portal (MAP) Using Function Point Analysis and Constructive Cost Model II., , , , and . APCoRISE, page 639-644. ACM, (2021)Methodology for evaluating string matching algorithms on multiprocessor., and . AICCSA, page 20-27. IEEE Computer Society, (2008)Blockchain Platform Selection for Security Token Offering (STO) Using Multi-criteria Decision Model., , , and . BLOCKCHAIN, volume 320 of Lecture Notes in Networks and Systems, page 171-178. Springer, (2021)Simple spreadsheet test case application to test spreadsheet formula in end-user software engineering., , , , and . KICSS, page 1-5. IEEE, (2016)Software size measurement of knowledge management portal with use case point., , , , and . IC3INA, page 42-47. IEEE, (2016)Multicore-Based Self-Adapting Pattern Detection Engine., , and . PDPTA, page 790-796. CSREA Press, (2009)