Search Results - "Stiawan, Deris"

Refine Results
  1. 1

    CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection by Kurniabudi, Stiawan, Deris, Darmawijoyo, Bin Idris, Mohd Yazid, Bamhdi, Alwi M., Budiarto, Rahmat

    Published in IEEE access (2020)
    “…Feature selection (FS) is one of the important tasks of data preprocessing in data analytics. The data with a large number of features will affect the…”
    Get full text
    Journal Article
  2. 2

    The Fast Health Interoperability Resources (FHIR) Standard: Systematic Literature Review of Implementations, Applications, Challenges and Opportunities by Ayaz, Muhammad, Pasha, Muhammad F, Alzahrani, Mohammed Y, Budiarto, Rahmat, Stiawan, Deris

    Published in JMIR medical informatics (30-07-2021)
    “…Background Information technology has shifted paper-based documentation in the health care sector into a digital form, in which patient information is…”
    Get full text
    Journal Article
  3. 3

    Investigating Brute Force Attack Patterns in IoT Network by Alsharif, Nizar, Nurmaini, Siti, Malik, Reza Firsandaya, Idris, Mohd. Yazid, Stiawan, Deris, Budiarto, Rahmat

    “…Internet of Things (IoT) devices may transfer data to the gateway/application server through File Transfer Protocol (FTP) transaction. Unfortunately, in terms…”
    Get full text
    Journal Article
  4. 4

    Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104 by Arifin, M. Agus Syamsul, Stiawan, Deris, Yudho Suprapto, Bhakti, Susanto, Susanto, Salim, Tasmi, Idris, Mohd Yazid, Budiarto, Rahmat

    Published in IET cyber-physical systems (01-09-2024)
    “…Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are…”
    Get full text
    Journal Article
  5. 5

    Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network by Stiawan, Deris, Suryani, Meilinda Eka, Susanto, Idris, Mohd Yazid, Aldalaien, Muawya N., Alsharif, Nizar, Budiarto, Rahmat

    Published in IEEE access (2021)
    “…Security is the main challenge in Internet of Things (IoT) systems. The devices on the IoT networks are very heterogeneous, many of them have limited…”
    Get full text
    Journal Article
  6. 6

    An Approach for Optimizing Ensemble Intrusion Detection Systems by Stiawan, Deris, Heryanto, Ahmad, Bardadi, Ali, Rini, Dian Palupi, Subroto, Imam Much Ibnu, Kurniabudi, Idris, Mohd Yazid Bin, Abdullah, Abdul Hanan, Kerim, Bedine, Budiarto, Rahmat

    Published in IEEE access (2021)
    “…Intrusion Detection System is yet an interesting research topic. With a very large amount of traffic in real-time networks, feature selection techniques that…”
    Get full text
    Journal Article
  7. 7

    Effective and efficient approach in IoT Botnet detection by Susanto, Susanto, Stiawan, Deris, Arifin, M. Agus Syamsul, Idris, Mohd. Yazid, Budiarto, Rahmat

    “…Internet of Things (IoT) technology presents an advantage to daily life, but this advantage is not a guarantee of security. This is because cyber-attacks, such…”
    Get full text
    Journal Article
  8. 8
  9. 9

    Mobile Application of Electronic Prescribing for Supporting E-Health Services by Amin, M. Miftakul, Sutrisman, Adi, Stiawan, Deris, Ermatita

    Published in E3S web of conferences (01-01-2019)
    “…The frequency of frequent medication errors in misreading prescriptions and drug doses that have the potential to cause harm and endanger the patient's health…”
    Get full text
    Journal Article
  10. 10

    Proposal of the S-score for measuring the performance of researchers, institutions, and journals in Indonesia by Lukman, Lukman, Dimyati, Muhammad, Rianto, Yan, Subroto, Imam Much Ibnu, Sutikno, Tole, Hidayat, Deden Sumirat, Nadhiroh, Irene M, Stiawan, Deris, Haviana, Sam Farisa Chaerul, Heryanto, Ahmad, Yuliansyah, Herman

    Published in Science editing (01-08-2018)
    “…This study aimed to propose a tool for measuring the research performance of researchers, institutions, and journals in Indonesia based on bibliometrics…”
    Get full text
    Journal Article
  11. 11

    Automatic Features Extraction Using Autoencoder in Intrusion Detection System by Kunang, Yesi Novaria, Nurmaini, Siti, Stiawan, Deris, Zarkasi, Ahmad, Firdaus, Jasmir

    “…Intrusion Detection System (IDS) can detect attacks by analysing the patterns of data traffic in the network. With a large amount of data that is processed in…”
    Get full text
    Conference Proceeding
  12. 12

    Attack classification of an intrusion detection system using deep learning and hyperparameter optimization by Kunang, Yesi Novaria, Nurmaini, Siti, Stiawan, Deris, Suprapto, Bhakti Yudho

    “…A network intrusion detection system (NIDS) is a solution that mitigates the threat of attacks on a network. The success of a NIDS depends on the success of…”
    Get full text
    Journal Article
  13. 13

    An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction by Kunang, Yesi Novaria, Nurmaini, Siti, Stiawan, Deris, Suprapto, Bhakti Yudho

    “…The rapid growth of the Internet of things (IoT) platform has implications on security vulnerabilities that need to be resolved. This requires an intrusion…”
    Get full text
    Journal Article
  14. 14

    A Novel Dataset for Experimentation with Intrusion Detection Systems in SCADA Networks using IEC 60870-5-104 Standard by Agus Syamsul Arifin, M., Stiawan, Deris, Suprapto, Bhakti Yudho, Susanto, Salim, Tasmi, Idris, Mohd. Yazid, Shenify, Mohamed, Budiarto, Rahmat

    Published in IEEE access (03-10-2024)
    “…Supervisory Control and Data Acquisition (SCADA) systems, particularly Remote Terminal Units (RTUs), are vulnerable to cyber-attacks due to their limited…”
    Get full text
    Journal Article
  15. 15

    Improvement of attack detection performance on the internet of things with PSO-search and random forest by Kurniabudi, Stiawan, Deris, Darmawijoyo, Bin Idris, Mohd Yazid, Defit, Sarjon, Triana, Yaya Sudarya, Budiarto, Rahmat

    Published in Journal of computational science (01-10-2022)
    “…The presence of the internet of things allows various smart devices to be connected and interact with each other. Although IoT provides benefits in daily…”
    Get full text
    Journal Article
  16. 16

    Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm by Stiawan, Deris, Daely, Somame Morianus, Heryanto, Ahmad, Afifah, Nurul, Idris, Mohd Yazid, Budiarto, Rahmat

    Published in Information technology and control (24-09-2021)
    “…Ransomware is a malware that represents a serious threat to a user’s information privacy. By investigating howransomware works, we may be able to recognise its…”
    Get full text
    Journal Article
  17. 17

    Dimensional Reduction With Fast ICA for IoT Botnet Detection by  , Susanto, Stiawan, Deris, Rini, Dian Palupi, Arifin, M. Agus Syamsul, Idris, Mohd Yazid, Alsharif, Nizar, Budiarto, Rahmat

    Published in Journal of applied security research (02-10-2023)
    “…The Internet of Things (IoT) has unique characteristics with a minimalist design and has network access with great scalability, which makes it difficult to…”
    Get full text
    Journal Article
  18. 18

    Validity of Measurable Expertise on Publication Recognition by Firdaus, Ali, Stiawan, Deris, Samsuryadi

    “…In recent years, increasing attention has been given to the use of expert opinions in decision-making and problem-solving processes. Several methodical…”
    Get full text
    Conference Proceeding
  19. 19

    Optimization of Feature Selection to Improve Order Transaction Performance in the Manufacturing Industry by Hartati, Ery, Stiawan, Deris, Widhiarso, Wijang

    “…The development of business processes that occur in Industry 4.0 requires the optimization of processes in the system, especially in the process of order…”
    Get full text
    Conference Proceeding
  20. 20

    Intelligent Sentiment Analysis On Cellphone Checking By Police Officer by Prasetyo, Barep, Triana, Yaya Sudarya, Budiarto, Rahmat, Stiawan, Deris

    “…Twitter is one of social media used by the public to send and read tweets that have been shared, making it easier to express their opinions. The opinions found…”
    Get full text
    Conference Proceeding