default search action
Heru Susanto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Jung-Chun Liu, Heru Susanto, Chi-Jan Huang, Kun-Lin Tsai, Fang-Yie Leu, Zhi-Qian Hong:
A Q-learning-based downlink scheduling in 5G systems. Wirel. Networks 30(8): 6951-6972 (2024) - [c23]Li-Wen Peng, Fang-Yie Leu, Heru Susanto:
Implementation of Switch Slicing in 5G/B5G/6G Networks. IMIS 2024: 369-378 - [c22]Yu-Han Chen, Fang-Yie Leu, Heru Susanto:
Base-Station Resource Allocation Based on Frame/Sub-Frame. IMIS 2024: 379-385 - 2023
- [c21]Yu-Han Chen, Chao-Hsiang Hsu, Heru Susanto, Fang-Yie Leu:
5G Network Base Station Timeline Scheduling. BWCCA 2023: 244-252 - [c20]Taufik Iqbal Ramdhani, Akbari Indra Basuki, Heru Susanto, Raditya Panji Umbara, Samsul Arifin, Ninon Nurul Faiza:
CFPChain: An Optimization of Research Funding Selection System Employing A Consortium Blockchain Based Approach. IC3INA 2023: 108-113 - [c19]Gunta Wirawan, Eti Sunarsih, Susan Neni Triani, Sri Mulyani, Heru Susanto, Chairil Effendy, Andi Mursidi:
CIRC Model Based on Audiovisual Local Wisdom on Ability to Write Malay Pantun. LTEC 2023: 191-203 - 2022
- [j10]Heru Susanto, Aida Sari, Fang-Yie Leu:
Innovative Business Process Reengineering Adoption: Framework of Big Data Sentiment, Improving Customers' Service Level Agreement. Big Data Cogn. Comput. 6(4): 151 (2022) - [c18]Akbari Basuki, Iwan Setiawan, Didi Rosiyadi, Taufik Iqbal Ramdhani, Heru Susanto:
Accelerating Encrypted Watermarking using Wavelet Transform and CKKS Homomorphic Encryption. IC3INA 2022: 311-315 - [c17]Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu:
Detection and Defense of DDoS Attack and Flash Events by Using Shannon Entropy. IMIS 2022: 307-314 - [c16]Yi-Cheng Jian, Meng-Shao Chung, Heru Susanto, Fang-Yie Leu:
5G Base Station Scheduling. IMIS 2022: 315-324 - [c15]Yu-Syuan Lu, Heru Susanto, Fang-Yie Leu:
Asymmetric Cryptography Among Different 5G Core Networks. IMIS 2022: 325-333 - [c14]Shih-Ting Chiu, Heru Susanto, Fang-Yie Leu:
Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense. MobiSec 2022: 243-253 - 2021
- [j9]Fang-Yie Leu, Kun-Lin Tsai, Heru Susanto, Cheng-Yan Gu, Ilsun You:
A Fault Tolerant Mechanism for UE Authentication in 5G Networks. Mob. Networks Appl. 26(4): 1650-1667 (2021) - [c13]Sen-Tarng Lai, Heru Susanto, Fang-Yie Leu:
Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project Failure. BWCCA 2021: 197-205 - [c12]Pei-Hua Yu, Heru Susanto, Li-Xuan Liu, Shang-Jie Wu, Fang-Yie Leu:
The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G Networks. BWCCA 2021: 206-215 - [c11]Rachmat Hidayat, Aniati Murni Arymurthy, Heru Susanto:
Smart Surveillance for COVID-19 Health Protocol Compliance in Vehicles. IC3INA 2021: 6-10 - [c10]Sen-Tarng Lai, Heru Susanto, Fang-Yie Leu:
Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software Maintenance. IMIS 2021: 362-372 - [c9]Zhi-Qian Hong, Heru Susanto, Fang-Yie Leu:
A Q-Learning Based Downlink Scheduling Algorithm for Multiple Traffics in 5G NR Systems. IMIS 2021: 393-402 - [c8]Uus Khusni, Aniati Murni Arymurthy, Heru Susanto:
Small Object Detection Based on SSD-ResNeXt101. RoViSP 2021: 1058-1064 - 2020
- [j8]Yi-Li Huang, Fang-Yie Leu, Ruey-Kai Sheu, Jung-Chun Liu, Heru Susanto:
A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j7]Fang-Yie Leu, Heru Susanto, Kun-Lin Tsai, Chia-Yin Ko:
A channel assignment scheme for MIMO on concentric-hexagon-based multi-channel wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 35(4): 205-221 (2020) - [j6]Fang-Yie Leu, Ping-Jui Chiang, Heru Susanto, Rui-Ting Hung, Hui-Ling Huang:
Mobile Physiological Sensor Cloud System for Long-term Care. Internet Things 11: 100209 (2020)
2010 – 2019
- 2019
- [c7]Heru Susanto, Fang-Yie Leu, Didi Rosiyadi, Chen Chin Kang:
Revealing Storage and Speed Transmission Emerging Technology of Big Data. AINA 2019: 571-583 - [c6]Wei-Sheng Chen, Fang-Yie Leu, Heru Susanto:
System Implementation of AUSF Fault Tolerance. BWCCA 2019: 678-687 - [c5]Zhi-Qian Hong, Fang-Yie Leu, Heru Susanto:
News Collection and Analysis on Public Political Opinions. BWCCA 2019: 688-697 - [c4]Ping-Jui Chiang, Heru Susanto, Fang-Yie Leu, Hui-Ling Huang:
Mobile Physiological Sensor Cloud System for Long-Term Care. BWCCA 2019: 698-707 - [c3]Yaniasih Yaniasih, Aris Yaman, Ambar Yoganingrum, Fadly Akbar Saputra, Heru Susanto, Slamet Riyanto:
Improving Metrics to Rank the Research Performance. ICAAI 2019: 112-116 - 2018
- [j5]Jung-Chun Liu, Fang-Yie Leu, Guan-Liang Lin, Heru Susanto:
An MFCC-based text-independent speaker identification system for access control. Concurr. Comput. Pract. Exp. 30(2) (2018) - [c2]Fang-Yie Leu, Heru Susanto, Ping-Hung Chou, Jeng-Wei Lin:
Migration of Edge Computing Services in 5G Networks - Firewall as a Service Example. BWCCA 2018: 578-585 - [c1]Heru Susanto, Fang-Yie Leu, Chen Chin Kang:
High Performance Grid Computing: Challenges and Opportunities of High Speed Networking. BWCCA 2018: 597-610 - 2016
- [j4]Heru Susanto, Mohammad Nabil Almunawar, Fang-Yie Leu, Chen Chin Kang:
Android vs iOS or Others? SMD-OS Security Issues: Generation Y Perception. Int. J. Technol. Diffusion 7(2): 1-18 (2016) - 2015
- [j3]Mohammad Nabil Almunawar, Muhammad Anshari, Heru Susanto, Chen Chin Kang:
Revealing Customer Behavior on Smartphones. Int. J. Asian Bus. Inf. Manag. 6(2): 33-49 (2015) - [j2]Fang-Yie Leu, Chin-Yu Liu, Jung-Chun Liu, Fuu-Cheng Jiang, Heru Susanto:
S-PMIPv6: An intra-LMA model for IPv6 mobility. J. Netw. Comput. Appl. 58: 180-191 (2015) - 2013
- [j1]Mohammad Nabil Almunawar, Muhammad Anshari, Heru Susanto:
Crafting strategies for sustainability: how travel agents should react in facing a disintermediation. Oper. Res. 13(3): 317-342 (2013) - 2012
- [i8]Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan, Mehmet Sabih Aksoy, Wahyudin P. Syam:
Integrated Solution Modeling Software: A New Paradigm on Information Security Review and Assessment. CoRR abs/1203.6214 (2012) - [i7]Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan:
A Novel Method on ISO 27001 Reviews: ISMS Compliance Readiness Level Measurement. CoRR abs/1203.6622 (2012) - [i6]Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan, Mehmet Sabih Aksoy:
I-SolFramework: An Integrated Solution Framework Six Layers Assessment on Multimedia Information Security Architecture Policy Compliance. CoRR abs/1204.0056 (2012) - [i5]Heru Susanto, Mohammad Nabil Almunawar, Mehmet Sabih Aksoy, Yong Chee Tuan:
A Simulation Approach Paradigm: An Optimization and Inventory Challenge Case Study. CoRR abs/1204.0225 (2012) - [i4]Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan, Mehmet Sabih Aksoy, Wahyudin P. Syam:
Integrated Solution Modeling Software: A New Paradigm on Information Security Review. CoRR abs/1204.0240 (2012) - [i3]Heru Susanto, Fahad Bin Muhaya, Mohammad Nabil Almunawar, Yong Chee Tuan:
Refinement of Strategy and Technology Domains STOPE View on ISO 27001. CoRR abs/1204.1385 (2012) - [i2]Heru Susanto, Mohammad Nabil Almunawar:
Information Security Awareness Within Business Environment: An IT Review. CoRR abs/1206.2597 (2012) - [i1]Heru Susanto, Mohammad Nabil Almunawar, Chen Chin Kang:
Toward Cloud Computing Evolution. CoRR abs/1209.6125 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint