Cited by
Cited by
Comic image decomposition for reading comics on cellular phones
M Yamada, R Budiarto, M Endo, S Miyazaki
IEICE transactions on information and systems 87 (6), 1370-1376, 2004
Qos multicast routing based on bandwidth estimation in mobile ad Hoc networks
M Saghir, TC Wan, R Budiarto
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 6, 2006
Load balancing qos multicast routing protocol in mobile ad hoc networks
M Saghir, TC Wan, R Budiarto
Asian Internet Engineering Conference, 83-97, 2005
A survey on real world botnets and detection mechanisms
S Soltani, SAH Seno, M Nezhadkamali, R Budiarto
International Journal of Information and Network Security 3 (2), 116, 2014
Survey and new approach in service discovery and advertisement for mobile ad hoc networks
SAH Seno, R Budiarto, TC Wan
International Journal of Computer Science and Network Security 7 (2), 275-284, 2007
A comparison of IP datagrams transmission using MPE and ULE over Mpeg-2/DVB networks
TC Hong, WT Chee, R Budiarto
2005 5th International Conference on Information Communications & Signal …, 2005
Lightweight and cost-effective MPEG video encryption
LS Choon, A Samsudin, R Budiarto
Proc. of Information and Communication Technologies: From Theory to …, 2004
A routing layer-based hierarchical service advertisement and discovery for MANETs
SAH Seno, R Budiarto, TC Wan
Ad Hoc Networks 9 (3), 355-367, 2011
A new cross-layer framework for QoS multicast applications in mobile ad hoc networks
M Saghir, TC Wan, R Budiarto
International Journal of Computer Science and Network Security 6 (10), 142-151, 2006
A comparative study of short range wireless sensor network on high density networks
M Zareei, A Zarei, R Budiarto, MA Omar
The 17th Asia Pacific conference on communications, 247-252, 2011
EFIS: Evolvable-neural-based fuzzy inference system and its application for adaptive network anomaly detection
MF Pasha, R Budiarto, M Syukur, M Yamada
Advances in machine learning and cybernetics, 662-671, 2006
Honeypots: why we need a dynamics honeypots?
R Budiarto, A Samsudin, CW Heong, S Noori
Proceedings. 2004 International Conference on Information and Communication …, 2004
Automatic text summarization for indonesian language using textteaser
D Gunawan, A Pasaribu, RF Rahmat, R Budiarto
Proceeding of the Electrical Engineering Computer Science and Informatics 3 …, 2016
Development of penetration testing model for increasing network security
R Budiarto, S Ramadass, A Samsudin, S Noor
Proceedings. 2004 International Conference on Information and Communication …, 2004
RSS-based distance measurement in underwater acoustic sensor networks: An application of the Lambert W function
M Hosseini, H Chizari, CK Soon, R Budiarto
2010 4th International Conference on Signal Processing and Communication …, 2010
EMS-MAC: Energy efficient contention-based medium access control protocol for mobile sensor networks
M Zareei, A Taghizadeh, R Budiarto, TC Wan
The Computer Journal 54 (12), 1963-1972, 2011
Cyber-attack penetration test and vulnerability analysis
D Stiawan, MY Idris, AH Abdullah, F Aljaber, R Budiarto
International Journal of Online and Biomedical Engineering (iJOE) 13 (01 …, 2017
A cluster-based distributed hierarchical IDS for MANETs
B Pahlevanzadeh, SAH Seno, TC Wan, R Budiarto, MM Kadhum
Executive Development 21, 22, 2008
Penetration Testing and Mitigation of Vulnerabilities Windows Server.
D Stiawan, MYB Idris, AH Abdullah, M AlQurashi, R Budiarto
IJ Network Security 18 (3), 501-513, 2016
Anomaly detection and monitoring in Internet of Things communication
D Stiawan, MY Idris, RF Malik, S Nurmaini, R Budiarto
2016 8th International Conference on Information Technology and Electrical …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20