Benfano Soewito
YOU?
Author Swipe
View article: Combination Of CNN And LSTM In Cat Breed Detection In Pet Stores
Combination Of CNN And LSTM In Cat Breed Detection In Pet Stores Open
The research examines the utilization of the Long Short-Term Memory (LSTM) algorithm for identifying cat breeds in pet retail establishments. With numerous cat breeds globally, each with unique needs and behaviors, manually identifying the…
View article: Modeling and Validating COBIT 5-Based It Governance Capability in Automotive After-Sales Services: Empirical Insights from Authorized Dealerships
Modeling and Validating COBIT 5-Based It Governance Capability in Automotive After-Sales Services: Empirical Insights from Authorized Dealerships Open
The increasing adoption of digital technologies in automotive after-sales services has introduced new challenges for IT governance, particularly within authorized car dealerships. These dealerships rely on digital tools, such as customer r…
View article: Enhancing Database Availability: A Combined Approach Using SQL Always on Failover Cluster Instance and Availability Groups
Enhancing Database Availability: A Combined Approach Using SQL Always on Failover Cluster Instance and Availability Groups Open
Database availability is a critical factor in supporting business processes to ensure uninterrupted operations. When the production server experiences failures, data may become inaccessible, disrupting business operations. To mitigate this…
View article: Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment
Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment Open
As cybersecurity threats evolve alarmingly, conventional defense strategies are becoming increasingly ineffective. In response to this urgent challenge, our study presents a transformative approach to red-teaming exercises by integrating t…
View article: Data Monetization Service Development Using Iterative Lifecycle Framework, Quality Assurance, and Open Web Application Security Project: A Case Study of a Utility Company in Indonesia
Data Monetization Service Development Using Iterative Lifecycle Framework, Quality Assurance, and Open Web Application Security Project: A Case Study of a Utility Company in Indonesia Open
The research aims to provide Data Monetization (DM) services for an Indonesian utility company as a pilot to generate additional revenue beyond the primary operation. The service is built using an iterative development lifecycle framework …
View article: DETEKSI AKURASI FALSE POSITIVE PADA SISTEM DETEKSI INTRUSI MENGGUNAKAN KNN (K NEAREST NEIGHBOR)
DETEKSI AKURASI FALSE POSITIVE PADA SISTEM DETEKSI INTRUSI MENGGUNAKAN KNN (K NEAREST NEIGHBOR) Open
Pada saat ini terdapat banyak serangan yang menyebabkan serangan atau malware kepada korban pada komputer, server, jaringan, dll. Untuk mencegah semua ini, diperlukan sistem yang dapat mencegah atau mendeteksi jika serangan seperti itu ter…
View article: The Crucial Role of Red Teaming: Strengthening Indonesia's Cyber Defenses Through Cybersecurity Drill Tests
The Crucial Role of Red Teaming: Strengthening Indonesia's Cyber Defenses Through Cybersecurity Drill Tests Open
View article: Perancangan Tata Kelola TI Menggunakan Framework COBIT 2019 pada Pusat Data dan Informasi Kementerian XYZ
Perancangan Tata Kelola TI Menggunakan Framework COBIT 2019 pada Pusat Data dan Informasi Kementerian XYZ Open
The Data and Information Center (Pusdatin) is one of the organizational units of a government institution responsible for managing Information and Communication Technology (ICT) in the Ministry XYZ. Many issues have been identified in the …
View article: Monitoring water quality parameters impacted by Indonesia’s weather using internet of things
Monitoring water quality parameters impacted by Indonesia’s weather using internet of things Open
Increasing need for food resources, State of Indonesia to strive to maximize the output of food production. Not only in agriculture but also aquaculture results are also trying to be improved. This is also supported by the increase of Indo…
View article: Application of the Multi-Threading Method and Python Script for the Automate of Network
Application of the Multi-Threading Method and Python Script for the Automate of Network Open
In recent times, there has been a noticeable surge in the inclination towards the implementation of network automation solutions. This trend is driven by the objective of optimizing network availability within the context of hybrid data ce…
View article: Assessing Information Security Using COBIT 2019 And ISO 27001:2013
Assessing Information Security Using COBIT 2019 And ISO 27001:2013 Open
One of the vulnerabilities organizations face against cyberattacks arises from the absence of standardized governance for information system security.This encompasses insufficient security policies and a lack of consistent security updates…
View article: Lightweight Neural Network Design for Real-time HumanTracking with Visual Modality
Lightweight Neural Network Design for Real-time HumanTracking with Visual Modality Open
We proposed a lightweight neural network architecture model that focuses on efficient computation when doing face detection in real-time with limited system resources, in image processing time to be exact.The concept is to implement layers…
View article: SIEM and Threat Intelligence: Protecting Applications with Wazuh and TheHive
SIEM and Threat Intelligence: Protecting Applications with Wazuh and TheHive Open
View article: The Pivotal Role of Red Teaming in Cybersecurity Drill Tests in Enhancing Indonesia's Cyber Defenses
The Pivotal Role of Red Teaming in Cybersecurity Drill Tests in Enhancing Indonesia's Cyber Defenses Open
View article: Optimizing Bug Bounty Programs for Efficient Malware-Related Vulnerability Discovery
Optimizing Bug Bounty Programs for Efficient Malware-Related Vulnerability Discovery Open
Conventional security measures struggle to keep pace with the rapidly evolving threat of malware, which demands novel approaches for vulnerability discovery. Although Bug Bounty Programs (BBPs) are promising, they often underperform in att…
View article: Multi-Object Detection Using YOLOv7 Object Detection Algorithm on Mobile Device
Multi-Object Detection Using YOLOv7 Object Detection Algorithm on Mobile Device Open
This research discusses the importance of enhancing real-time object detection on mobile devices by introducing a new multi-object detection system that uses the quantified YOLOv7 model. Focusing on the complexities of food item detection,…
View article: Information Security Evaluation Using Case Study Information Security Index on Licensing Portal Applications
Information Security Evaluation Using Case Study Information Security Index on Licensing Portal Applications Open
There's a lot of cyber attacks going on right now, so the Ministry of Public Works and People's Housing (PUPR) has to get serious about preventing them. One of the information system that contains critical public data need to be secured is…
View article: STUDENT GRADUATION TIME PREDICTION USING LOGISTIC REGRESSION, DECISION TREE, SUPPORT VECTOR MACHINE, AND ADABOOST ENSEMBLE LEARNING
STUDENT GRADUATION TIME PREDICTION USING LOGISTIC REGRESSION, DECISION TREE, SUPPORT VECTOR MACHINE, AND ADABOOST ENSEMBLE LEARNING Open
Universities in Indonesia are working hard to improve the graduation rates of their students as it is considered a measure of success and quality in terms of accreditation. This study focuses on analyzing the effectiveness of machine learn…
View article: Model Manajemen Risiko Sistem Informasi Untuk Sistem Informasi Manajemen Kepegawaian
Model Manajemen Risiko Sistem Informasi Untuk Sistem Informasi Manajemen Kepegawaian Open
Sistem informasi dan aplikasi manajemen kepegawaian memiliki peran penting dalam menjaga kerahasiaan data pribadi karyawan, terutama di sektor pemerintahan di mana manajemen karier sangat bergantung pada informasi dari data Aparatur Sipil …
View article: Penerapan Kerangka Kerja NIST Cybersecurity dan CIS Controls sebagai Manajemen Risiko Keamanan Siber
Penerapan Kerangka Kerja NIST Cybersecurity dan CIS Controls sebagai Manajemen Risiko Keamanan Siber Open
Menurut laporan dari Check Point Reasearch, terjadi peningkatan sebesar 38% dalam serangan siber global pada tahun 2022 bila dibandingkan dengan tahun 2021. Untuk menghadapi serangan siber global ini, maka perlu disiapkan manajemen risiko …
View article: IOT Based Indoor Lighting Performance of Led With Different Color Temperatures System Based on Human Activity
IOT Based Indoor Lighting Performance of Led With Different Color Temperatures System Based on Human Activity Open
Numerous LED light brands are available on the market, each offering a variety of light colors, including warm white (2700 K), white (3000 K), cool white (5000 K), and daylight (6000 K). Each color of light produces heat in the form of dif…
View article: Analisis Keamanan Infrastruktur Jaringan Berdasarkan Cyber Kill Chain Framework
Analisis Keamanan Infrastruktur Jaringan Berdasarkan Cyber Kill Chain Framework Open
This study concentrates on examining the security of network infrastructure using the cyber kill chain framework approach. The research is conducted within a company operating in network security services. In its operations, it offers a Vi…
View article: Temperature controls for plastic injection machine based on PID controller
Temperature controls for plastic injection machine based on PID controller Open
Injection machines are already on the market with varying prices based on its capacity.Even the smallest machine on the market has a capacity starting from around 100 grams per second, with an expensive price starting around USD 13,000.Fur…
View article: Private Cloud Hpc Untuk Geologi Dan Aplikasi Eksplorasi Geofisika (G&GE)
Private Cloud Hpc Untuk Geologi Dan Aplikasi Eksplorasi Geofisika (G&GE) Open
Penggunaan High-Performance Computing (HPC) selama pandemi COVID-19 menemui kendala; banyak pekerja mengeluhkan kinerja aplikasi yang lambat dan proses grafis yang buruk. Studi ini menjelaskan bagaimana para peneliti telah melakukan eksper…
View article: Monitoring dan Evaluasi Keamanan Jaringan Dengan Pendekatan System Information and Security Management (SIEM)
Monitoring dan Evaluasi Keamanan Jaringan Dengan Pendekatan System Information and Security Management (SIEM) Open
Every system produces independent logs. This makes monitoring logs difficult if not done centrally. The research objective is to monitor and evaluate network security using open source-based Security Information and Event Management (SIEM)…
View article: Smart Agriculture Water System Using Crop Water Stress Index and Weather Prediction
Smart Agriculture Water System Using Crop Water Stress Index and Weather Prediction Open
Water is essential for crops to grow well. However, overwatered or underwatered plants hinder growth and produce less fruit than plants with sufficient watering. Using the Internet of Things (IoT), agriculture can be controlled to achieve …
View article: Software Size Measurement of Smart Digital Tourism Project based on Use Case Point
Software Size Measurement of Smart Digital Tourism Project based on Use Case Point Open
In recent years, the tourism sector has evolved into a key strategic business for boosting local economic output. This industry has been dealing with the COVID-19 pandemic impact since the end of 2019. The tourism sector was, however, expe…
View article: M2FRED Analysis Using MobileNet and Siamese Neural Network
M2FRED Analysis Using MobileNet and Siamese Neural Network Open
Mobile face recognition has become increasingly important, especially during the COVID-19 pandemic when the use of masks has become ubiquitous.The area that can be analyzed for face recognition is narrowed down only to the periocular area.…
View article: Integrated Methodology for Information Security Risk Management using ISO 27005:2018 and NIST SP 800-30 for Insurance Sector
Integrated Methodology for Information Security Risk Management using ISO 27005:2018 and NIST SP 800-30 for Insurance Sector Open
The development of Information and Communication Technology (ICT) in the Industrial Revolution 4.0 era shows very fast and disruptive developments that encourage increased use of Information Technology (IT) services within organizations. H…
View article: Cloud-based control system: a bibliometric analysis
Cloud-based control system: a bibliometric analysis Open
Network control system (NCS) approaches for distributed closed-loop control systems have been established in industrial control. However, recent advancements in cloud computing provide scalable, elastic, and low-cost networked computing ca…