Search Results - "Musthafa, Muhammad Bisri"

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques by Musthafa, Muhammad Bisri, Huda, Samsul, Kodera, Yuta, Ali, Md Arshad, Araki, Shunsuke, Mwaura, Jedidah, Nogami, Yasuyuki

    Published in Sensors (Basel, Switzerland) (01-07-2024)
    “…Internet of Things (IoT) devices are leading to advancements in innovation, efficiency, and sustainability across various industries. However, as the number of…”
    Get full text
    Journal Article
  2. 2

    Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM by Musthafa, Muhammad Bisri, Huda, Samsul, Ali, Md. Arshad, Kodera, Yuta, Nogami, Yasuyuki

    “…Utilizing Machine Learning (ML) techniques to construct models for Intrusion Detection Systems (IDS) has emerged as a leading strategy to enhance security…”
    Get full text
    Conference Proceeding
  3. 3

    A Secure Authentication for Plant Monitoring System Sensor Data Access by Huda, Samsul, Nogami, Yasuyuki, Hossain, Md. Biplob, Jie, Yang, Anh, Le Hoang, Musthafa, Muhammad Bisri, Rahayu, Maya, Akada, Takuma

    “…To encourage effective monitoring in plant agriculture, we have studied an IoT application for plant agriculture monitoring systems. This application helps…”
    Get full text
    Conference Proceeding
  4. 4

    Pemanfaatan Data PDDIKTI sebagai Pendukung Keputusan Manajemen Perguruan Tinggi by Ngatmari, Ngatmari, Musthafa, Muhammad Bisri, Rahmad, Cahya, Asmara, Rosa Andrie, Rahutomo, Faisal

    “…Pangkalan Data Pendidikan Tinggi (PDDIKTI) merupakan sebuah sistem penyimpan data yang dikelola Pusat Data dan Informasi (Pusdatin) Kementrian Ristek dan…”
    Get full text
    Journal Article
  5. 5

    Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System by Musthafa, Muhammad Bisri, Ali, Md. Arshad, Huda, Samsul, Kodera, Yuta, Kusaka, Takuya, Nogami, Yasuyuki

    “…An Intrusion Detection System (IDS) is used in the field of cyber security to prevent and mitigate threats during transmitting data between the devices and…”
    Get full text
    Conference Proceeding
  6. 6

    A Proposal of IoT Application for Plant Monitoring System with AWS Cloud Service by Huda, Samsul, Nogami, Yasuyuki, Akada, Takuma, Rahayu, Maya, Hossain, Md. Biplob, Musthafa, Muhammad Bisri, Anh, Le Hoang, Jie, Yang

    “…Recently, food security has become a significant concern worldwide as a serious risk to sustainable societies. One of the key challenges facing food security…”
    Get full text
    Conference Proceeding
  7. 7

    Comparative Performance of Prediction Methods for Digital Wallet Transactions in the Pandemic Period by Arwin Datumaya Wahyudi Sumari, Muhammad Bisri Musthafa, Ngatmari, Dimas Rossiawan Hendra Putra

    “…A pandemic situation such as Covid-19 which is still ongoing has given significant impacts to various sectors such as education, economy, tourism, and social…”
    Get full text
    Journal Article