An approach for optimizing ensemble intrusion detection systems D Stiawan, A Heryanto, A Bardadi, DP Rini, IMI Subroto, MYB Idris, ... Ieee Access 9, 6930-6947, 2020 | 41 | 2020 |
Network anomaly detection research: a survey K Kurniabudi, B Purnama, S Sharipuddin, D Darmawijoyo, D Stiawan, ... Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 7 (1 …, 2019 | 31 | 2019 |
Payload recognition and detection of Cross Site Scripting attack MR Zalbina, TW Septian, D Stiawan, MY Idris, A Heryanto, R Budiarto 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 172-176, 2017 | 20 | 2017 |
Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm D Stiawan, SM Daely, A Heryanto, N Afifah, MY Idris, R Budiarto Information Technology and Control 50 (3), 495-506, 2021 | 15 | 2021 |
Sistem Monitoring Server Dan Perangkat Jaringan Pada Enterprise Resource Planning Fasilkom Unsri Menggunakan Protokol Icmp Dan Snmp A Heryanto, A Hermansyah, M Nizar Sistemasi: Jurnal Sistem Informasi 6 (3), 1-10, 2017 | 11 | 2017 |
Visualisasi Serangan Brute Force Menggunakan Metode K-Means dan Naïve Bayes S Sandra, D Stiawan, A Heryanto Annual Research Seminar (ARS) 2 (1), 315-320, 2017 | 8 | 2017 |
Cyberattack Feature Selection using Correlation-Based Feature Selection Method in an Intrusion Detection System A Heryanto, D Stiawan, MYB Idris, MR Bahari, A Al Hafizin, R Budiarto 2022 9th International Conference on Electrical Engineering, Computer …, 2022 | 6 | 2022 |
Implementasi Wireless Controller Capsman Pada Virtual Local Area Network Menggunakan Virtual Access Point B Lintang, A Heryanto, A Hermansyah, TW Septian, P Korespondensi Jurnal Ilmu Komputer 1 (3), 1-11, 2022 | 4 | 2022 |
Deteksi Serangan Denial of Service Menggunakan Artificial Immune System CA Winanto vol 2, 456-459, 2017 | 4 | 2017 |
High availability in server clusters by using backpropagation neural network method A Heryanto, A Gunanta Jurnal Teknologi dan Open Source 4 (1), 08-18, 2021 | 1 | 2021 |