GS Documents
Source by Sinta Kemenristek
Total : 45
An approach for optimizing ensemble intrusion detection systems Ieee Access 9, 6930-6947, 2020 D Stiawan, A Heryanto, A Bardadi, DP Rini, IMI Subroto, MYB Idris, ... Citation : 32 Year : 2020 |
Network anomaly detection research: a survey Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 7 (1Â …, 2019 K Kurniabudi, B Purnama, S Sharipuddin, D Darmawijoyo, D Stiawan, ... Citation : 28 Year : 2019 |
Proposal of the S-score for measuring the performance of researchers, institutions, and journals in Indonesia Science Editing 5 (2), 135-141, 2018 L Lukman, M Dimyati, Y Rianto, IMI Subroto, T Sutikno, DS Hidayat, ... Citation : 22 Year : 2018 |
Implementasi Sistem Database Terdistribusi Dengan Metode Multi-Master Database Replication Jurnal Media Informatika Budidarma 3 (1), 30-36, 2019 A Heryanto, A Albert Citation : 22 Year : 2019 |
Payload recognition and detection of Cross Site Scripting attack 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 172-176, 2017 MR Zalbina, TW Septian, D Stiawan, MY Idris, A Heryanto, R Budiarto Citation : 19 Year : 2017 |
A malicious URLs detection system using optimization and machine learning classifiers Indonesian Journal of Electrical Engineering and Computer Science 17 (3 …, 2020 OV Lee¹, A Heryanto, MF Ab Razak, AFM Raffei, DNE Phon, S Kasim, ... Citation : 17 Year : 2020 |
Ransomware detection based on opcode behavior using k-nearest neighbors algorithm Information Technology and Control 50 (3), 495-506, 2021 D Stiawan, SM Daely, A Heryanto, N Afifah, MY Idris, R Budiarto Citation : 12 Year : 2021 |
Sistem Monitoring Server Dan Perangkat Jaringan Pada Enterprise Resource Planning Fasilkom Unsri Menggunakan Protokol Icmp Dan Snmp Sistemasi: Jurnal Sistem Informasi 6 (3), 1-10, 2017 A Heryanto, A Hermansyah, M Nizar Citation : 10 Year : 2017 |
Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm. Inf. Technol. Control. 50 (3), 495-506, 2021 D Stiawan, SM Daely, A Heryanto, N Afifah, MY Idris, R Budiarto Citation : 10 Year : 2021 |
TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis. International Journal of Online & Biomedical Engineering 15 (7), 2019 D Stiawan, D Wahyudi, A Heryanto, M Idris, F Muchtar, MA Alzahrani, ... Citation : 8 Year : 2019 |