Benfano Soewito

Benfano Soewito
Binus University | binus · Department of Computer Science

About

33
Publications
6,590
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
131
Citations

Publications

Publications (33)
Article
Full-text available
In modern corporate networking, the shift from leased lines to Virtual Private Networks (VPNs) utilizing broadband internet has become commonplace due to cost considerations. However, this transition introduces challenges, notably packet loss, impacting network throughput. This paper investigates the implications of packet loss and proposes a solut...
Article
Full-text available
This research discusses the importance of enhancing real-time object detection on mobile devices by introducing a new multi-object detection system that uses the quantified YOLOv7 model. Focusing on the complexities of food item detection, particularly in diverse and intricate contexts, our study uses a dataset that includes five food classes. By i...
Article
Full-text available
There's a lot of cyber attacks going on right now, so the Ministry of Public Works and People's Housing (PUPR) has to get serious about preventing them. One of the information system that contains critical public data need to be secured is Portal Perizinan. In order to maintain information security, an evaluation should be carried out to assess the...
Article
Full-text available
Universities in Indonesia are working hard to improve the graduation rates of their students as it is considered a measure of success and quality in terms of accreditation. This study focuses on analyzing the effectiveness of machine learning algorithms, regression, Support Vector Machine (SVM) Decision Tree and ensemble learning, with AdaBoost wet...
Chapter
Many companies are redefining their business strategies to improve the business output. Business over internet provides the opportunity to customers and partners where their products and specific business can be found. Web usage mining is the type of web mining activity that involves the automatic discovery of user access patterns from web servers....
Article
Full-text available
Sistem informasi dan aplikasi manajemen kepegawaian memiliki peran penting dalam menjaga kerahasiaan data pribadi karyawan, terutama di sektor pemerintahan di mana manajemen karier sangat bergantung pada informasi dari data Aparatur Sipil Negara (ASN) dalam sistem informasi kepegawaian. Selain sebagai sumber informasi, aplikasi ini juga berfungsi s...
Article
Full-text available
Menurut laporan dari Check Point Reasearch, terjadi peningkatan sebesar 38% dalam serangan siber global pada tahun 2022 bila dibandingkan dengan tahun 2021. Untuk menghadapi serangan siber global ini, maka perlu disiapkan manajemen risiko dalam menghadapi serangan siber tersebut. Saat ini Kementerian Pekerjaan Umum dan Perumahan Rakyat (PUPR) belum...
Conference Paper
Defragmentation can potentially be employed as a tactic by perpetrators to conceal, misrepresent, or eliminate digital evidence. This study explores the effects of minor defragmentation, a potential method to conceal digital evidence, on recovering file system data in digital forensics. Our investigation sought to determine the influence of minor d...
Article
Full-text available
Numerous LED light brands are available on the market, each offering a variety of light colors, including warm white (2700 K), white (3000 K), cool white (5000 K), and daylight (6000 K). Each color of light produces heat in the form of different lights in the room. Living things have a physiological ability called circadian rhythm to adapt to chang...
Article
Full-text available
Penggunaan High-Performance Computing (HPC) selama pandemi COVID-19 menemui kendala; banyak pekerja mengeluhkan kinerja aplikasi yang lambat dan proses grafis yang buruk. Studi ini menjelaskan bagaimana para peneliti telah melakukan eksperimen ekstensif untuk mengusulkan desain HPC Private Cloud. Studi ini menganalisis beberapa aspek penting yang m...
Article
Full-text available
Every system produces independent logs. This makes monitoring logs difficult if not done centrally. The research objective is to monitor and evaluate network security using open source-based Security Information and Event Management (SIEM). The research methods include literature studies, SIEM review, observation at the Data and Information System...
Article
Full-text available
 Manajemen Resiko teknologi informasi saat ini sangat diperlukan agar suatu instansi tidak mengalami banyak kerugian diakibatkan kerentanan dan resiko yang sudah pernah terjadi sebelumnya. Manajement Resiko Teknologi Informasi saat ini memiliki banyak framework dan metode untuk melakukan manajement resiko dan dokumentasi resiko tersebut. Saat menj...
Article
Full-text available
Aplikasi manajemen resiko serta perkiraan resiko bisa menolong industri menghemat pengeluaran sekaligus melindungi masa. Aktivitas yang dilakukan pada saat manajemen risiko antara lain planning, organize, setting, coordination ataupun controlling/evaluation untuk penanggulangan risiko. Penelitian ini dengan menggunakan aplikasi yang dipakai perusah...
Article
Full-text available
Nowadays, because of the exhaustion of IPv4 address space, IPv6 is increasingly being used on enterprise networks. Usually, an enterprise uses an MPLS network from a Service Provider to interconnect their IPv4 network sites. Although MPLS Service Providers mostly built their MPLS backbone based on IPv4, their MPLS backbone have the capability to tr...
Article
Full-text available
Water pumps have an essential role in supplying water in household activities. However, the power required to operate it is significant. Previous research has carried out saving electrical energy on a water pump with an automation system using an Arduino microcontroller for automatic plant watering and ultrasonic sensors to prevent overfilling. Our...
Article
The proposed work was a recommendation model for designing cyber security decision support, in building an information technology security system based on risk analysis and the ISO/IEC 27001 cybersecurity framework. The proposed model aimed to obtain the best security system in mitigating security threats. This paper contributed to strategic policy...
Article
Nowadays, because of the exhaustion of IPv4 address space, IPv6 is increasingly being used on enterprise networks. Usually, an enterprise uses an MPLS network from a Service Provider to interconnect their IPv4 network sites. Although MPLS Service Providers mostly built their MPLS backbone based on IPv4, their MPLS backbone have the capability to tr...
Article
Full-text available
In this age where almost all facets of life are full of digital objects, because of technology is advancing more and more rapidly, included the fields of economy, the social field, the industrial field, labour, and the entertainment field especially the film industry. In film industry, the backgrounds that were once impossible such as foreign plane...
Article
Full-text available
Running applications on a rooting device makes the application vulnerable to data leakage. Therefore, many applications that require a high level of security are not allowed to run on rooted device. Common technique of detecting rooted device is by using Android API to discover rooting trace. However, the detection can be bypassed using Java functi...
Article
The current GPS (Global Positioning System) is unable to work inside a building because the satellite signal is blocked by the building itself. A great amount of researches aimed to realize a tracking system that works inside a building. However, only few researches uses BLE (Bluetooth Low Energy). In a tracking system using BLE, its position stron...
Article
Full-text available
In recent years, smartphones have become more popular. Along with the increasing number of smartphone users, more features are requested by the users which can be used to solve their daily life problems. One of the most popular applications is related to location-based detection. Almost all smartphones have a feature of Global Positioning System (G...

Network

Cited By