CICIDS-2017 dataset feature analysis with information gain for anomaly detection D Stiawan, MYB Idris, AM Bamhdi, R Budiarto IEEE Access 8, 132911-132921, 2020 | 346 | 2020 |
WhatsApp, viber and telegram: Which is the best for instant messaging? T Sutikno, L Handayani, D Stiawan, MA Riyadi, IMI Subroto International Journal of Electrical & Computer Engineering (2088-8708) 6 (3), 2016 | 274 | 2016 |
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization YN Kunang, S Nurmaini, D Stiawan, BY Suprapto Journal of Information Security and Applications 58, 102804, 2021 | 224 | 2021 |
The Fast Health Interoperability Resources (FHIR) standard: systematic literature review of implementations, applications, challenges and opportunities M Ayaz, MF Pasha, MY Alzahrani, R Budiarto, D Stiawan JMIR medical informatics 9 (7), e21929, 2021 | 191 | 2021 |
Investigating brute force attack patterns in IoT network D Stiawan, MY Idris, RF Malik, S Nurmaini, N Alsharif, R Budiarto Journal of Electrical and Computer Engineering 2019 (1), 4568368, 2019 | 118 | 2019 |
Automatic features extraction using autoencoder in intrusion detection system YN Kunang, S Nurmaini, D Stiawan, A Zarkasi 2018 International conference on electrical engineering and computer science …, 2018 | 104 | 2018 |
A lstm-method for bitcoin price prediction: A case study yahoo finance stock market F Ferdiansyah, SH Othman, RZRM Radzi, D Stiawan, Y Sazaki, U Ependi 2019 international conference on electrical engineering and computer science …, 2019 | 90 | 2019 |
The trends of intrusion prevention system network D Stiawan, AH Abdullah, MY Idris 2010 2nd international conference on education technology and computer 4, V4 …, 2010 | 65 | 2010 |
Cyber-Attack Penetration Test and Vulnerability Analysis. D Stiawan, MY Idris, AH Abdullah, F Aljaber, R Budiarto International Journal of Online Engineering 13 (1), 2017 | 52 | 2017 |
Characterizing network intrusion prevention system D Stiawan, AH Abdullah, MY Idris International Journal of Computer Applications 14 (1), 11-18, 2011 | 42 | 2011 |
An introduction to journal phishings and their detection approach M Dadkhah, T Sutikno, MD Jazi, D Stiawan TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (2), 373-380, 2015 | 41 | 2015 |
An approach for optimizing ensemble intrusion detection systems D Stiawan, A Heryanto, A Bardadi, DP Rini, IMI Subroto, MYB Idris, ... Ieee Access 9, 6930-6947, 2020 | 40 | 2020 |
Review of the machine learning methods in the classification of phishing attack JA Jupin, T Sutikno, MA Ismail, MS Mohamad, S Kasim, D Stiawan Bulletin of Electrical Engineering and Informatics 8 (4), 1545-1555, 2019 | 35 | 2019 |
Anomaly detection and monitoring in Internet of Things communication D Stiawan, MY Idris, RF Malik, S Nurmaini, R Budiarto 2016 8th International Conference on Information Technology and Electrical …, 2016 | 34 | 2016 |
Fundamental Internetworking Development & Design Life Cycle D Setiawan Fasilkom Unsri,(April), 1-13, 2009 | 31 | 2009 |
Ping flood attack pattern recognition using a K-means algorithm in an Internet of Things (IoT) network D Stiawan, ME Suryani, MY Idris, MN Aldalaien, N Alsharif, R Budiarto IEEE Access 9, 116475-116484, 2021 | 30 | 2021 |
Network anomaly detection research: a survey K Kurniabudi, B Purnama, S Sharipuddin, D Darmawijoyo, D Stiawan, ... Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 7 (1 …, 2019 | 30 | 2019 |
Phishing detection system using machine learning classifiers NS Zaini, D Stiawan, MF Ab Razak, A Firdaus, WISW Din, S Kasim, ... Indonesian Journal of Electrical Engineering and Computer Science 17 (3 …, 2020 | 29 | 2020 |
Fortifying big data infrastructures to face security and privacy issues T Sutikno, D Stiawan, IMI Subroto TELKOMNIKA (Telecommunication Computing Electronics and Control) 12 (4), 751-752, 2014 | 28 | 2014 |
Proposal of the S-score for measuring the performance of researchers, institutions, and journals in Indonesia L Lukman, M Dimyati, Y Rianto, IMI Subroto, T Sutikno, DS Hidayat, ... Science Editing 5 (2), 135-141, 2018 | 25 | 2018 |