Fog computing: Will it be the future of cloud computing? M Firdhous, O Ghazali, S Hassan The Third International Conference on Informatics & Applications (ICIA2014), 2014 | 182 | 2014 |
Survey on caching approaches in information centric networking I Abdullahi, S Arif, S Hassan Journal of Network and Computer Applications 56, 48-59, 2015 | 151 | 2015 |
Trust management in cloud computing: a critical review M Firdhous, O Ghazali, S Hassan arXiv preprint arXiv:1211.3979, 2012 | 114 | 2012 |
Comic image decomposition for reading comics on cellular phones M Yamada, R Budiarto, M Endo, S Miyazaki IEICE transactions on information and systems 87 (6), 1370-1376, 2004 | 69 | 2004 |
Membangun koneksi matematis siswa dalam pemecahan masalah verbal N Tasni, E Susanti Beta: Jurnal Tadris Matematika 10 (1), 103-116, 2017 | 61 | 2017 |
A comprehensive survey on scheduler for VoIP over WLAN K Nisar, A Amphawan, S Hassan, NI Sarkar Journal of Network and Computer Applications 36 (2), 933-948, 2013 | 47 | 2013 |
QoS multicast routing based on bandwidth estimation in mobile ad hoc networks M Saghir, TC Wan, R Budiarto Proceedings of the International Conference on Computer and Communication …, 2006 | 40 | 2006 |
Hubungan antara kontrol diri dan konformitas dengan prokrastinasi akademik pada mahasiswa program studi psikologi Unesa E Susanti, D Nurwidawati Jurnal Character 2 (3), 1-7, 2014 | 38 | 2014 |
Load balancing qos multicast routing protocol in mobile ad hoc networks M Saghir, TC Wan, R Budiarto Technologies for Advanced Heterogeneous Networks: First Asian Internet …, 2005 | 35 | 2005 |
A comparison of IP datagrams transmission using MPE and ULE over Mpeg-2/DVB networks TC Hong, WT Chee, R Budiarto 2005 5th International Conference on Information Communications & Signal …, 2005 | 34 | 2005 |
A trust computing mechanism for cloud computing M Firdhous, O Ghazali, S Hassan Proceedings of ITU Kaleidoscope 2011: The Fully Networked Human?-Innovations …, 2011 | 33 | 2011 |
A routing layer-based hierarchical service advertisement and discovery for MANETs SAH Seno, R Budiarto, TC Wan Ad Hoc Networks 9 (3), 355-367, 2011 | 31 | 2011 |
Security mechanism for IPv6 stateless address autoconfiguration S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ... 2015 International Conference on Automation, Cognitive Science, Optics …, 2015 | 27 | 2015 |
Securing duplicate address detection on IPv6 using distributed trust mechanism S Praptodiyono, IH Hasbullah, MM Kadhum, CY Wey, RK Murugesan, ... Int J Simulation—Systems, Sci Technol 17 (26), 2016 | 22 | 2016 |
Honeypots: why we need a dynamics honeypots? R Budiarto, A Samsudin, CW Heong, S Noori Proceedings. 2004 International Conference on Information and Communication …, 2004 | 22 | 2004 |
Simulation-based performance comparison of TCP-friendly congestion control protocols S Hassan, M Kara Proceedings of the 16th Annual UK Performance Engineering Workshop …, 2000 | 22 | 2000 |
Feasibility study of using IEEE 802.22 wireless regional area network (WRAN) in Malaysia MH Omar, S Hassan, AHM Shabli 2010 Second International Conference on Network Applications, Protocols and …, 2010 | 21 | 2010 |
Improvement of address resolution security in IPv6 local network using trust-ND S Praptodiyono, IH Hasbullah, M Anbar, RK Murugesan, A Osman TELKOMNIKA Indonesian Journal of Electrical Engineering 13 (1), 195-202, 2015 | 16 | 2015 |
Meningkatkan penalaran siswa melalui koneksi matematika E Susanti Seminar Nasional Matematika Dan Pendidikan Matematika, 2012 | 16 | 2012 |
Formal modeling and analysis of hybrid systems in rewriting logic using higher-order numerical methods and discrete-event detection M Fadlisyah, PC Ölveczky, E Abrahám 2011 CSI International Symposium on Computer Science and Software …, 2011 | 13 | 2011 |