deris stiawan
deris stiawan
Faculty of Computer Science, Universitas Sriwijaya
Email yang diverifikasi di ieee.org - Beranda
Dikutip oleh
Dikutip oleh
WhatsApp, viber and telegram: Which is the best for instant messaging?
T Sutikno, L Handayani, D Stiawan, MA Riyadi, IMI Subroto
International Journal of Electrical & Computer Engineering (2088-8708) 6 (3), 2016
CICIDS-2017 dataset feature analysis with information gain for anomaly detection
D Stiawan, MYB Idris, AM Bamhdi, R Budiarto
IEEE Access 8, 132911-132921, 2020
The trends of intrusion prevention system network
D Stiawan, AH Abdullah, MY Idris
2010 2nd International Conference on Education Technology and Computer 4, V4 …, 2010
Investigating brute force attack patterns in IoT network
D Stiawan, M Idris, RF Malik, S Nurmaini, N Alsharif, R Budiarto
Journal of Electrical and Computer Engineering 2019, 2019
Automatic features extraction using autoencoder in intrusion detection system
YN Kunang, S Nurmaini, D Stiawan, A Zarkasi
2018 International Conference on Electrical Engineering and Computer Science …, 2018
Cyber-attack penetration test and vulnerability analysis
D Stiawan
International Journal of Online and Biomedical Engineering, 2017
Characterizing network intrusion prevention system
D Stiawan, M Idris, AH Abdullah
International Journal of Computer Applications 14 (1), 11-18, 2011
An introduction to journal phishings and their detection approach
M Dadkhah, T Sutikno, MD Jazi, D Stiawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (2), 373-380, 2015
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization
YN Kunang, S Nurmaini, D Stiawan, BY Suprapto
Journal of Information Security and Applications 58, 102804, 2021
Anomaly detection and monitoring in Internet of Things communication
D Stiawan, MY Idris, RF Malik, S Nurmaini, R Budiarto
2016 8th International Conference on Information Technology and Electrical …, 2016
Fundamental Internetworking Development & Design Life Cycle
D Setiawan
Fasilkom Unsri,(April), 1-13, 2009
Fortifying big data infrastructures to face security and privacy issues
T Sutikno, D Stiawan, IMI Subroto
TELKOMNIKA (Telecommunication Computing Electronics and Control) 12 (4), 751-752, 2014
A lstm-method for bitcoin price prediction: A case study yahoo finance stock market
F Ferdiansyah, SH Othman, RZRM Radzi, D Stiawan, Y Sazaki, U Ependi
2019 International Conference on Electrical Engineering and Computer Science …, 2019
Review of the machine learning methods in the classification of phishing attack
JA Jupin, T Sutikno, MA Ismail, MS Mohamad, S Kasim, D Stiawan
Bulletin of Electrical Engineering and Informatics 8 (4), 1545-1555, 2019
The Fast Health Interoperability Resources (FHIR) standard: systematic literature review of implementations, applications, challenges and opportunities
M Ayaz, MF Pasha, MY Alzahrani, R Budiarto, D Stiawan
JMIR medical informatics 9 (7), e21929, 2021
Intrusion prevention system: a survey
D Stiawan, AYI Shakhatreh, MY Idris, KA Bakar, AH Abdullah
Journal of Theoretical and Applied Information Technology 40 (1), 44-54, 2012
Design restful web service of national population database for supporting e-health interoperability service
D Stiawan
Little Lion Scientific, 2018
Penetration Testing and Mitigation of Vulnerabilities Windows Server.
D Stiawan, MYB Idris, AH Abdullah, M AlQurashi, R Budiarto
Int. J. Netw. Secur. 18 (3), 501-513, 2016
Network anomaly detection research: a survey
K Kurniabudi, B Purnama, S Sharipuddin, D Darmawijoyo, D Stiawan, ...
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 7 (1 …, 2019
Payload recognition and detection of Cross Site Scripting attack
MR Zalbina, TW Septian, D Stiawan, MY Idris, A Heryanto, R Budiarto
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 172-176, 2017
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20