Search Results - "Stiawan, Deris"
-
1
CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection
Published in IEEE access (2020)“…Feature selection (FS) is one of the important tasks of data preprocessing in data analytics. The data with a large number of features will affect the…”
Get full text
Journal Article -
2
The Fast Health Interoperability Resources (FHIR) Standard: Systematic Literature Review of Implementations, Applications, Challenges and Opportunities
Published in JMIR medical informatics (30-07-2021)“…Background Information technology has shifted paper-based documentation in the health care sector into a digital form, in which patient information is…”
Get full text
Journal Article -
3
Investigating Brute Force Attack Patterns in IoT Network
Published in Journal of electrical and computer engineering (01-01-2019)“…Internet of Things (IoT) devices may transfer data to the gateway/application server through File Transfer Protocol (FTP) transaction. Unfortunately, in terms…”
Get full text
Journal Article -
4
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104
Published in IET cyber-physical systems (01-09-2024)“…Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are…”
Get full text
Journal Article -
5
Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network
Published in IEEE access (2021)“…Security is the main challenge in Internet of Things (IoT) systems. The devices on the IoT networks are very heterogeneous, many of them have limited…”
Get full text
Journal Article -
6
An Approach for Optimizing Ensemble Intrusion Detection Systems
Published in IEEE access (2021)“…Intrusion Detection System is yet an interesting research topic. With a very large amount of traffic in real-time networks, feature selection techniques that…”
Get full text
Journal Article -
7
Effective and efficient approach in IoT Botnet detection
Published in Sinergi (Fakultas Teknologi Industri Univeritas Mercu Buana. (2024)“…Internet of Things (IoT) technology presents an advantage to daily life, but this advantage is not a guarantee of security. This is because cyber-attacks, such…”
Get full text
Journal Article -
8
Correction: The Fast Health Interoperability Resources (FHIR) Standard: Systematic Literature Review of Implementations, Applications, Challenges and Opportunities
Published in JMIR medical informatics (17-08-2021)“…Related Article Correction of: https://medinform.jmir.org/2021/7/e21929…”
Get full text
Journal Article -
9
Mobile Application of Electronic Prescribing for Supporting E-Health Services
Published in E3S web of conferences (01-01-2019)“…The frequency of frequent medication errors in misreading prescriptions and drug doses that have the potential to cause harm and endanger the patient's health…”
Get full text
Journal Article -
10
Proposal of the S-score for measuring the performance of researchers, institutions, and journals in Indonesia
Published in Science editing (01-08-2018)“…This study aimed to propose a tool for measuring the research performance of researchers, institutions, and journals in Indonesia based on bibliometrics…”
Get full text
Journal Article -
11
Automatic Features Extraction Using Autoencoder in Intrusion Detection System
Published in 2018 International Conference on Electrical Engineering and Computer Science (ICECOS) (01-10-2018)“…Intrusion Detection System (IDS) can detect attacks by analysing the patterns of data traffic in the network. With a large amount of data that is processed in…”
Get full text
Conference Proceeding -
12
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization
Published in Journal of information security and applications (01-05-2021)“…A network intrusion detection system (NIDS) is a solution that mitigates the threat of attacks on a network. The success of a NIDS depends on the success of…”
Get full text
Journal Article -
13
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction
Published in International journal of information security (01-06-2024)“…The rapid growth of the Internet of things (IoT) platform has implications on security vulnerabilities that need to be resolved. This requires an intrusion…”
Get full text
Journal Article -
14
A Novel Dataset for Experimentation with Intrusion Detection Systems in SCADA Networks using IEC 60870-5-104 Standard
Published in IEEE access (03-10-2024)“…Supervisory Control and Data Acquisition (SCADA) systems, particularly Remote Terminal Units (RTUs), are vulnerable to cyber-attacks due to their limited…”
Get full text
Journal Article -
15
Improvement of attack detection performance on the internet of things with PSO-search and random forest
Published in Journal of computational science (01-10-2022)“…The presence of the internet of things allows various smart devices to be connected and interact with each other. Although IoT provides benefits in daily…”
Get full text
Journal Article -
16
Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm
Published in Information technology and control (24-09-2021)“…Ransomware is a malware that represents a serious threat to a user’s information privacy. By investigating howransomware works, we may be able to recognise its…”
Get full text
Journal Article -
17
Dimensional Reduction With Fast ICA for IoT Botnet Detection
Published in Journal of applied security research (02-10-2023)“…The Internet of Things (IoT) has unique characteristics with a minimalist design and has network access with great scalability, which makes it difficult to…”
Get full text
Journal Article -
18
Validity of Measurable Expertise on Publication Recognition
Published in 2023 10th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) (20-09-2023)“…In recent years, increasing attention has been given to the use of expert opinions in decision-making and problem-solving processes. Several methodical…”
Get full text
Conference Proceeding -
19
Optimization of Feature Selection to Improve Order Transaction Performance in the Manufacturing Industry
Published in 2023 10th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) (20-09-2023)“…The development of business processes that occur in Industry 4.0 requires the optimization of processes in the system, especially in the process of order…”
Get full text
Conference Proceeding -
20
Intelligent Sentiment Analysis On Cellphone Checking By Police Officer
Published in 2022 9th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) (06-10-2022)“…Twitter is one of social media used by the public to send and read tweets that have been shared, making it easier to express their opinions. The opinions found…”
Get full text
Conference Proceeding