WhatsApp, viber and telegram: Which is the best for instant messaging? T Sutikno, L Handayani, D Stiawan, MA Riyadi, IMI Subroto International Journal of Electrical & Computer Engineering (2088-8708) 6 (3), 2016 | 239 | 2016 |
CICIDS-2017 dataset feature analysis with information gain for anomaly detection D Stiawan, MYB Idris, AM Bamhdi, R Budiarto IEEE Access 8, 132911-132921, 2020 | 185 | 2020 |
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization YN Kunang, S Nurmaini, D Stiawan, BY Suprapto Journal of Information Security and Applications 58, 102804, 2021 | 113 | 2021 |
Investigating brute force attack patterns in IoT network D Stiawan, M Idris, RF Malik, S Nurmaini, N Alsharif, R Budiarto Journal of Electrical and Computer Engineering 2019, 2019 | 85 | 2019 |
The Fast Health Interoperability Resources (FHIR) standard: systematic literature review of implementations, applications, challenges and opportunities M Ayaz, MF Pasha, MY Alzahrani, R Budiarto, D Stiawan JMIR medical informatics 9 (7), e21929, 2021 | 82 | 2021 |
Automatic features extraction using autoencoder in intrusion detection system YN Kunang, S Nurmaini, D Stiawan, A Zarkasi 2018 International Conference on Electrical Engineering and Computer Science …, 2018 | 72 | 2018 |
A lstm-method for bitcoin price prediction: A case study yahoo finance stock market F Ferdiansyah, SH Othman, RZRM Radzi, D Stiawan, Y Sazaki, U Ependi 2019 international conference on electrical engineering and computer science …, 2019 | 59 | 2019 |
The trends of intrusion prevention system network D Stiawan, AH Abdullah, MY Idris 2010 2nd international conference on education technology and computer 4, V4 …, 2010 | 57 | 2010 |
Cyber-Attack Penetration Test and Vulnerability Analysis. D Stiawan, MY Idris, AH Abdullah, F Aljaber, R Budiarto International Journal of Online Engineering 13 (1), 2017 | 44 | 2017 |
Characterizing network intrusion prevention system D Stiawan, AH Abdullah, MY Idris International Journal of Computer Applications 14 (1), 11-18, 2011 | 39 | 2011 |
Fundamental Internetworking Development & Design Life Cycle D Setiawan Fasilkom Unsri,(April), 1-13, 2009 | 36 | 2009 |
An introduction to journal phishings and their detection approach M Dadkhah, T Sutikno, MD Jazi, D Stiawan TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (2), 373-380, 2015 | 34 | 2015 |
Review of the machine learning methods in the classification of phishing attack JA Jupin, T Sutikno, MA Ismail, MS Mohamad, S Kasim, D Stiawan Bulletin of Electrical Engineering and Informatics 8 (4), 1545-1555, 2019 | 32 | 2019 |
Anomaly detection and monitoring in Internet of Things communication D Stiawan, MY Idris, RF Malik, S Nurmaini, R Budiarto 2016 8th International Conference on Information Technology and Electrical …, 2016 | 32 | 2016 |
Network anomaly detection research: a survey K Kurniabudi, B Purnama, S Sharipuddin, D Darmawijoyo, D Stiawan, ... Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 7 (1 …, 2019 | 27 | 2019 |
An approach for optimizing ensemble intrusion detection systems D Stiawan, A Heryanto, A Bardadi, DP Rini, IMI Subroto, MYB Idris, ... Ieee Access 9, 6930-6947, 2020 | 26 | 2020 |
Fortifying big data infrastructures to face security and privacy issues T Sutikno, D Stiawan, IMI Subroto TELKOMNIKA (Telecommunication Computing Electronics and Control) 12 (4), 751-752, 2014 | 26 | 2014 |
DESIGN RESTFUL WEB SERVICE OF NATIONAL POPULATION DATABASE FOR SUPPORTING E-HEALTH INTEROPERABILITY SERVICE. MM AMIN, ADI Sutrisman, D STIAWAN, A MASELENO Journal of Theoretical & Applied Information Technology 96 (15), 2018 | 20 | 2018 |
Penetration Testing and Mitigation of Vulnerabilities Windows Server. D Stiawan, MYB Idris, AH Abdullah, M AlQurashi, R Budiarto Int. J. Netw. Secur. 18 (3), 501-513, 2016 | 20 | 2016 |
Intrusion prevention system: a survey D Stiawan, AYI Shakhatreh, MY Idris, KA Bakar, AH Abdullah Journal of Theoretical and Applied Information Technology 40 (1), 44-54, 2012 | 20 | 2012 |