Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2020
- Nungky Awang Chandra, Anak Agung Putri Ratna, Kalamullah Ramli:
Development of a Cyber-Situational Awareness Model of Risk Maturity Using Fuzzy FMEA. IWBIS 2020: 127-136 - Venia Noella Nanisura Damanik, Septia Ulfa Sunaringtyas:
Secure Code Recommendation Based on Code Review Result Using OWASP Code Review Guide. IWBIS 2020: 153-158 - Satvik Dasari, Vishal Madipadga:
Aegis: A Framework to Detect Compromised Components in the Supply Chain of Information Technology Infrastructure. IWBIS 2020: 159-164 - Muhammad Fauzi, Grafika Jati, Muhammad Febrian Rachmadi, Wisnu Jatmiko:
Improved Logistic-Sine Chaotic Map based S-box and Bit-Plane Scrambling Encryption Schemes Performance on Compressed ECG Data. IWBIS 2020: 97-102 - Ghina Fitriya, Arif Rahman Hakim, Mohammed Abozied Hassan Abozied:
Capture The Flag Simulation Based on STRIDE Threat Model. IWBIS 2020: 145-152 - Zainal A. Hasibuan:
Towards Using Universal Big Data in Artificial Intelligence Research and Development to Gain Meaningful Insights and Automation Systems. IWBIS 2020: 9-18 - Syafiq Hidayattullah, Isti Surjandari, Enrico Laoh:
Financial Statement Fraud Detection in Indonesia Listed Companies using Machine Learning based on Meta-Heuristic Optimization. IWBIS 2020: 79-84 - Muhammad Yogi Ilham, Isti Surjandari, Enrico Laoh:
Analyzing Highway Road Accident Characteristic Using Data Mining. IWBIS 2020: 17-22 - Kezia Irene, M. Anwar Ma'sum, Reyhan Eddy Yunus, Wisnu Jatmiko:
Segmentation and Approximation of Blood Volume in Intracranial Hemorrhage Patients Based on Computed Tomography Scan Images Using Deep Learning Method. IWBIS 2020: 65-72 - Alif Kurniawan, Wisnu Jatmiko, Rukman Hertadi, Novian Habibie:
Prediction of Protein Tertiary Structure Using Pre-Trained Self-Supervised Learning Based on Transformer. IWBIS 2020: 73-80 - Wahyu Andhyka Kusuma, Agus Eko Minarno, Mochamad Satriyo Wibowo:
Triaxial accelerometer-based human activity recognition using 1D convolution neural network. IWBIS 2020: 53-58 - Petrus Mursanto, Ari Wibisono, Wendy D. W. T. Bayu, Valian Fil Ahli, May Iffah Rizki, Lintang Matahari Hasani, Jihan Adibah:
Time-Series Big Data Stream Evaluation. IWBIS 2020: 41-46 - Rizki Agung Muzaki, Obrina Candra Briliyant, Maulana Andika Hasditama, Hamzah Ritchi:
Improving Security of Web-Based Application Using ModSecurity and Reverse Proxy in Web Application Firewall. IWBIS 2020: 85-90 - Corry Elsa Noviyanti, Yova Ruldeviyani:
Risk Classification of Peer-to-Peer Lending Platform Using SVM Algorithm. IWBIS 2020: 29-34 - Amarulla Octavian, Wisnu Jatmiko:
Designing Intelligent Coastal Surveillance based on Big Maritime Data. IWBIS 2020: 1-8 - Muhammad Mahavira Prawira P, Rizki Kurniandi, Amiruddin Amiruddin:
Secure SMS Using Pseudo-Random Bit Generator Based on Chaotic Map, and AES on Arduino UNO Board and SIM 900 Module. IWBIS 2020: 91-96 - Prabhat Pokharel, Roshan Pokhrel, Sandeep Sigdel:
Intrusion Detection System based on Hybrid Classifier and User Profile Enhancement Techniques. IWBIS 2020: 137-144 - Iffa Maula Nur Prasasti, Arian Dhini, Enrico Laoh:
Automobile Insurance Fraud Detection using Supervised Classifiers. IWBIS 2020: 47-52 - Rizal Dwi Prayogo, Siti Amatullah Karimah:
Optimization of Phishing Website Classification Based on Synthetic Minority Oversampling Technique and Feature Selection. IWBIS 2020: 121-126 - Made Wira Dhanar Santika, Muhammad Anwar Ma'sum, Aria Kekalih, Alhadi Bustamam, Adila Alfa Krisnadhi, Noor Akhmad Setiawan, I Made Agus Dwi Suarjaya, Adi Nurhadiyatna, Wisnu Jatmiko:
Fast Ellipse Fitting Implementation on USG Mobile Telehealth Application. IWBIS 2020: 59-64 - Intania Cahya Sari, Yova Ruldeviyani:
Sentiment Analysis of the Covid-19 Virus Infection in Indonesian Public Transportation on Twitter Data: A Case Study of Commuter Line Passengers. IWBIS 2020: 23-28 - Puspita Kencana Sari, Setiadi Yazid:
Design of Blockchain-based Electronic Health Records for Indonesian Context: Narrative Review. IWBIS 2020: 103-108 - Mauli Bayu Segoro, Prasetyo Adi Wibowo Putro:
Implementation of Two Factor Authentication (2FA) and Hybrid Encryption to Reduce the Impact of Account Theft on Android-Based Instant Messaging (IM) Applications. IWBIS 2020: 115-120 - Poorva Tiwari, C. S. Skanda, U. Sanjana, S. Aruna, Prasad B. Honnavalli:
Secure Wipe Out in BYOD Environment. IWBIS 2020: 109-114 - Gede Rizky Gustisa Wisnu, Ahmadi, Ahmad Rizaqu Muttaqi, Aris Budi Santoso, Prabu Kresna Putra, Indra Budi:
Sentiment Analysis and Topic Modelling of 2018 Central Java Gubernatorial Election using Twitter Data. IWBIS 2020: 35-40 - International Workshop on Big Data and Information Security, IWBIS 2020, Depok, Indonesia, October 17-18, 2020. IEEE 2020, ISBN 978-1-7281-9098-3 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 07:52 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint