1 |
Recommendation System Using the K-Nearest Neighbor Approach: A Case Study of Dual Camera Quality as a Smartphone Selection Criterion |
1 |
1 |
2023 |
9–15 |
- What matters for international consumers’ choice preferences for smartphones: Evidence from a cross-border ecommerce platform – PLoS ONE 18(5), 2023, Plos
- Smartphone recommendation using popularity and collaborative filtering-based models – 6th ICRTAC, 2023, IEEE
|
2 |
A Child Growth and Development Evaluation Using Weighted Product Method |
1 |
1 |
2023 |
16–21 |
- Amalgamation evaluation model design based on modification weighted product-Provus-Alkin-Rwa Bhineda – International Journal of Evaluation and Research in Education 13(4), 2024, IAES
- User interface design of context-input-process-product evaluation application based on weighted product – IAES International Journal of Artificial Intelligence 13(2), 2024, IAES
|
3 |
The Utilization of Information System for Crime Rate Modelling in Surabaya Using K-means |
1 |
1 |
2023 |
22–30 |
- Space-Time Autoregressive Integrated Moving Average (STARIMA) Modeling for Predicting Criminal Cases of Motor Vehicle Theft in Surabaya, Indonesia – Data and Metadata 3, 2024, AG Editor
|
4 |
Delivery Route Estimation on a Web-Based Restaurant Delivery System Using Greedy Algorithm |
1 |
1 |
2023 |
31-40 |
- Recommendation System for Boarding House Rental Using Greedy Algorithm – 4th ICERA, 2025, IEEE
|
5 |
Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age |
1 |
2 |
2023 |
53–67 |
- Responsible AI on National Cybersecurity Strategy with Enhancement of Cybersecurity in Education – IIPEM, 2024, IEEE
- Taxonomy of Challenges of Cybersecurity Risk Assessment in Higher Learning Institutions – IGI Global, 2025
- Architecting the Digital Future: Platforms, Design, and Application – IGI Global, 2025
- The Deep Learning-Based Security Assessment and Optimization Model for Enterprise Information Systems Under Digital Economy – Journal of Organizational and End User Computing 37(1), 2025, IGI Global
- Research of Information Conflict between Humans and Artificial Intelligence in Information and Cybernetic Systems – CPITS 3991, 2025, CEUR-WS
|
6 |
Supervised Learning Methods Comparison for Android Malware Detection Based on System Calls Referring to ARM (32-bit/EABI) Table |
2 |
1 |
2024 |
15–24 |
- Android Malware Detection System using Machine Learning – 6th IC3, 2024, ACM
|
7 |
Identifying Dominant Actors of Ferdy Sambo's Case Network on Social Media X/Twitter Using Social Network Analysis for Public Relations Strategy |
2 |
1 |
2024 |
25-39 |
- The Reduction of Criminal Justice Policy in Indonesia: Justice versus Virality – Journal of Human Rights, Culture and Legal System, 2025, Lembaga Contrarius Indonesia
|
8 |
The Waterfall Model in the Implementation of a Room Reservation Information System: A Case Study at a University |
2 |
2 |
2024 |
95-110 |
- Development of a Social Network Analysis Application to Identify Influential Subgroups of Networks and Users Involved in Spreading Negative Issues - IAICT, 2025, IEEE
|
9 |
Clustering of Post-Disaster Building Damage Levels Using Discrete Wavelet Transform and Principal Component Analysis |
3 |
1 |
2025 |
33-44 |
- A remote sensing approach for flood extent estimation and damage mapping in the Bramhani-Baitarani river basin using Sentinel data – International Journal of Information Technology, 2025, Springer
|