WoS Documents

Source by WoS

Total : 5

Analysis of Custody Transfer on Moving Bundle Protocol of Wireless Router in Delay Tolerant Network (DTN)
Year: 2017
Authors : Noviani, F; Stiawan, D; Siswanti, SD; Septian, TW; Riyadi, MA; Aljaber, F; Budiarto, R;
Citation : 0 | IMPACT FACTOR : 0 | IMPACT FACTOR 5 YEAR : 0
Publication Name : 2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE)
URL: https://www.webofscience.com/wos/woscc/full-record/WOS:000427968000010
Combining Oversampling with Recurrent Neural Networks for Intrusion Detection
Year: 2021
Authors : Wang, JH; Septian, TW;
Citation : 0 | IMPACT FACTOR : 0 | IMPACT FACTOR 5 YEAR : 0
Publication Name : DATABASE SYSTEMS FOR ADVANCED APPLICATIONS: DASFAA 2021 INTERNATIONAL WORKSHOPS
URL: https://www.webofscience.com/wos/woscc/full-record/WOS:000886740400021
Denial of Service Attack Visualization with Clustering using K-Means Algorithm
Year: 2017
Authors : Putri, NA; Stiawan, D; Heryanto, A; Septian, TW; Siregar, L; Budiarto, R;
Citation : 0 | IMPACT FACTOR : 0 | IMPACT FACTOR 5 YEAR : 0
Publication Name : 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (ICECOS)
URL: https://www.webofscience.com/wos/woscc/full-record/WOS:000426923800033
Payload Recognition and Detection of Cross Site Scripting Attack
Year: 2017
Authors : Zalbina, MR; Septian, TW; Stiawan, D; Idris, MY; Heryanto, A; Budiarto, R;
Citation : 0 | IMPACT FACTOR : 0 | IMPACT FACTOR 5 YEAR : 0
Publication Name : 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC)
URL: https://www.webofscience.com/wos/woscc/full-record/WOS:000425917300030
The Development of an Internet of Things (IoT) Network Traffic Dataset with Simulated Attack Data
Year: 2023
Authors : Stiawan, D; Wahyudi, D; Septian, TW; Idris, MY; Budiarto, R;
Citation : 0 | IMPACT FACTOR : 0 | IMPACT FACTOR 5 YEAR : 0
Publication Name : JOURNAL OF INTERNET TECHNOLOGY
URL: https://www.webofscience.com/wos/woscc/full-record/WOS:000964302700013