deris stiawan
deris stiawan
Faculty of Computer Science, Universitas Sriwijaya
Verified email at - Homepage
Cited by
Cited by
WhatsApp, viber and telegram: Which is the best for instant messaging?
T Sutikno, L Handayani, D Stiawan, MA Riyadi, IMI Subroto
International Journal of Electrical & Computer Engineering (2088-8708) 6 (3), 2016
CICIDS-2017 dataset feature analysis with information gain for anomaly detection
D Stiawan, MYB Idris, AM Bamhdi, R Budiarto
IEEE Access 8, 132911-132921, 2020
Investigating brute force attack patterns in IoT network
D Stiawan, M Idris, RF Malik, S Nurmaini, N Alsharif, R Budiarto
Journal of Electrical and Computer Engineering 2019, 2019
Attack classification of an intrusion detection system using deep learning and hyperparameter optimization
YN Kunang, S Nurmaini, D Stiawan, BY Suprapto
Journal of Information Security and Applications 58, 102804, 2021
The trends of intrusion prevention system network
D Stiawan, AH Abdullah, MY Idris
2010 2nd International Conference on Education Technology and Computer 4, V4 …, 2010
Automatic features extraction using autoencoder in intrusion detection system
YN Kunang, S Nurmaini, D Stiawan, A Zarkasi
2018 International Conference on Electrical Engineering and Computer Science …, 2018
A lstm-method for bitcoin price prediction: A case study yahoo finance stock market
F Ferdiansyah, SH Othman, RZRM Radzi, D Stiawan, Y Sazaki, U Ependi
2019 International Conference on Electrical Engineering and Computer Science …, 2019
The Fast Health Interoperability Resources (FHIR) standard: systematic literature review of implementations, applications, challenges and opportunities
M Ayaz, MF Pasha, MY Alzahrani, R Budiarto, D Stiawan
JMIR medical informatics 9 (7), e21929, 2021
Cyber-Attack Penetration Test and Vulnerability Analysis.
D Stiawan, MY Idris, AH Abdullah, F Aljaber, R Budiarto
International Journal of Online Engineering 13 (1), 2017
Characterizing network intrusion prevention system
D Stiawan, M Idris, AH Abdullah
International Journal of Computer Applications 14 (1), 11-18, 2011
Fundamental Internetworking Development & Design Life Cycle
D Setiawan
Fasilkom Unsri,(April), 1-13, 2009
Anomaly detection and monitoring in Internet of Things communication
D Stiawan, MY Idris, RF Malik, S Nurmaini, R Budiarto
2016 8th International Conference on Information Technology and Electrical …, 2016
An introduction to journal phishings and their detection approach
M Dadkhah, T Sutikno, MD Jazi, D Stiawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (2), 373-380, 2015
Review of the machine learning methods in the classification of phishing attack
JA Jupin, T Sutikno, MA Ismail, MS Mohamad, S Kasim, D Stiawan
Bulletin of Electrical Engineering and Informatics 8 (4), 1545-1555, 2019
Fortifying big data infrastructures to face security and privacy issues
T Sutikno, D Stiawan, IMI Subroto
TELKOMNIKA (Telecommunication Computing Electronics and Control) 12 (4), 751-752, 2014
Network anomaly detection research: a survey
K Kurniabudi, B Purnama, S Sharipuddin, D Darmawijoyo, D Stiawan, ...
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 7 (1 …, 2019
Intrusion prevention system: a survey
D Stiawan, AYI Shakhatreh, MY Idris, KA Bakar, AH Abdullah
Journal of Theoretical and Applied Information Technology 40 (1), 44-54, 2012
Design Restful Web Service of National Population Database for Supporting E-Health Interoperability Service.
D Stiawan
Journal of Theoretical and Applied Information Technology, 2018
Penetration Testing and Mitigation of Vulnerabilities Windows Server.
D Stiawan, MYB Idris, AH Abdullah, M AlQurashi, R Budiarto
Int. J. Netw. Secur. 18 (3), 501-513, 2016
An approach for optimizing ensemble intrusion detection systems
D Stiawan, A Heryanto, A Bardadi, DP Rini, IMI Subroto, MYB Idris, ...
Ieee Access 9, 6930-6947, 2020
The system can't perform the operation now. Try again later.
Articles 1–20