default search action
BibTeX records: Deris Stiawan
@article{DBLP:journals/ijisec/KunangNSS24, author = {Yesi Novaria Kunang and Siti Nurmaini and Deris Stiawan and Bhakti Yudho Suprapto}, title = {An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {3}, pages = {1619--1648}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00807-7}, doi = {10.1007/S10207-023-00807-7}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KunangNSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/StiawanBAMHSISLB23, author = {Deris Stiawan and Ali Bardadi and Nurul Afifah and Lisa Melinda and Ahmad Heryanto and Tri Wanda Septian and Mohd Yazid Idris and Imam Much Ibnu Subroto and Lukman and Rahmat Budiarto}, title = {An Improved {LSTM-PCA} Ensemble Classifier for {SQL} Injection and {XSS} Attack Detection}, journal = {Comput. Syst. Sci. Eng.}, volume = {46}, number = {2}, pages = {1759--1774}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.034047}, doi = {10.32604/CSSE.2023.034047}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/StiawanBAMHSISLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocs/KurniabudiSDIST22, author = {Kurniabudi and Deris Stiawan and Darmawijoyo and Mohammad Yazid Bin Idris and Defit Sarjon and Yaya Sudarya Triana and Rahmat Budiarto}, title = {Improvement of attack detection performance on the internet of things with PSO-search and random forest}, journal = {J. Comput. Sci.}, volume = {64}, pages = {101833}, year = {2022}, url = {https://doi.org/10.1016/j.jocs.2022.101833}, doi = {10.1016/J.JOCS.2022.101833}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocs/KurniabudiSDIST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/StiawanHBRSKIAK21, author = {Deris Stiawan and Ahmad Heryanto and Ali Bardadi and Dian Palupi Rini and Imam Much Ibnu Subroto and Kurniabudi and Mohammad Yazid Bin Idris and Abdul Hanan Abdullah and Bedine Kerim and Rahmat Budiarto}, title = {An Approach for Optimizing Ensemble Intrusion Detection Systems}, journal = {{IEEE} Access}, volume = {9}, pages = {6930--6947}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2020.3046246}, doi = {10.1109/ACCESS.2020.3046246}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/StiawanHBRSKIAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/StiawanSSIAAB21, author = {Deris Stiawan and Meilinda Eka Suryani and Susanto and Mohd Yazid Idris and Muawya N. Aldalaien and Nizar Alsharif and Rahmat Budiarto}, title = {Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network}, journal = {{IEEE} Access}, volume = {9}, pages = {116475--116484}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3105517}, doi = {10.1109/ACCESS.2021.3105517}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/StiawanSSIAAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KunangNSS21, author = {Yesi Novaria Kunang and Siti Nurmaini and Deris Stiawan and Bhakti Yudho Suprapto}, title = {Attack classification of an intrusion detection system using deep learning and hyperparameter optimization}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102804}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102804}, doi = {10.1016/J.JISA.2021.102804}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KunangNSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/StiawanDHAIB21, author = {Deris Stiawan and Somame Morianus Daely and Ahmad Heryanto and Nurul Afifah and Mohd Yazid Idris and Rahmat Budiarto}, title = {Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm}, journal = {Inf. Technol. Control.}, volume = {50}, number = {3}, pages = {495--506}, year = {2021}, url = {https://doi.org/10.5755/j01.itc.50.3.25816}, doi = {10.5755/J01.ITC.50.3.25816}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itc/StiawanDHAIB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KurniabudiSDIBB20, author = {Kurniabudi and Deris Stiawan and Darmawijoyo and Mohammad Yazid Bin Idris and Alwi M. Bamhdi and Rahmat Budiarto}, title = {{CICIDS-2017} Dataset Feature Analysis With Information Gain for Anomaly Detection}, journal = {{IEEE} Access}, volume = {8}, pages = {132911--132921}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3009843}, doi = {10.1109/ACCESS.2020.3009843}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KurniabudiSDIBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/StiawanAHSMIB19, author = {Deris Stiawan and Diky Aryandi and Ahmad Heryanto and Tri Wanda Septian and Farkhana Muchtar and Mohd Yazid Idris and Rahmat Budiarto}, title = {Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {1}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3789}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/StiawanAHSMIB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijoe/StiawanWHSIMAB19, author = {Deris Stiawan and Dimas Wahyudi and Ahmad Heryanto and Samsuryadi Samsuryadi and Mohd Yazid Idris and Farkhana Muchtar and Mohammed Abdullah Alzahrani and Rahmat Budiarto}, title = {{TCP} {FIN} Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis}, journal = {Int. J. Online Biomed. Eng.}, volume = {15}, number = {7}, pages = {124--139}, year = {2019}, url = {https://doi.org/10.3991/ijoe.v15i07.9848}, doi = {10.3991/IJOE.V15I07.9848}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijoe/StiawanWHSIMAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jece/StiawanIMNAB19, author = {Deris Stiawan and Mohd Yazid Idris and Reza Firsandaya Malik and Siti Nurmaini and Nizar Alsharif and Rahmat Budiarto}, title = {Investigating Brute Force Attack Patterns in IoT Network}, journal = {J. Electr. Comput. Eng.}, volume = {2019}, pages = {4568368:1--4568368:13}, year = {2019}, url = {https://doi.org/10.1155/2019/4568368}, doi = {10.1155/2019/4568368}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jece/StiawanIMNAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijoe/StiawanIAAB17, author = {Deris Stiawan and Mohd Yazid Idris and Abdul Hanan Abdullah and Fahad Aljaber and Rahmat Budiarto}, title = {Cyber-Attack Penetration Test and Vulnerability Analysis}, journal = {Int. J. Online Eng.}, volume = {13}, number = {1}, pages = {125--132}, year = {2017}, url = {https://www.online-journals.org/index.php/i-joe/article/view/6407}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijoe/StiawanIAAB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/StiawanIAAB16, author = {Deris Stiawan and Mohd Yazid Idris and Abdul Hanan Abdullah and Mohammed AlQurashi and Rahmat Budiarto}, title = {Penetration Testing and Mitigation of Vulnerabilities Windows Server}, journal = {Int. J. Netw. Secur.}, volume = {18}, number = {3}, pages = {501--513}, year = {2016}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n3/ijns-2016-v18-n3-p501-513.pdf}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/StiawanIAAB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/StiawanIA15, author = {Deris Stiawan and Mohammad Yazid Bin Idris and Abdul Hanan Abdullah}, title = {Penetration Testing and Network Auditing: Linux}, journal = {J. Inf. Process. Syst.}, volume = {11}, number = {1}, pages = {104--115}, year = {2015}, url = {https://doi.org/10.3745/JIPS.03.0013}, doi = {10.3745/JIPS.03.0013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/StiawanIA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoft/StiawanAI11, author = {Deris Stiawan and Abdul Hanan Abdullah and Mohammad Yazid Bin Idris}, editor = {Mar{\'{\i}}a Jos{\'{e}} Escalona Cuaresma and Boris Shishkov and Jos{\'{e}} Cordeiro}, title = {Research on Heteregeneous Data for Recognizing Threat}, booktitle = {{ICSOFT} 2011 - Proceedings of the 6th International Conference on Software and Data Technologies, Volume 1, Seville, Spain, 18-21 July, 2011}, pages = {222--225}, publisher = {SciTePress}, year = {2011}, timestamp = {Tue, 31 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsoft/StiawanAI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.