Albaha University
Verified email at
Cited by
Cited by
CICIDS-2017 dataset feature analysis with information gain for anomaly detection
D Stiawan, MYB Idris, AM Bamhdi, R Budiarto
IEEE Access 8, 132911-132921, 2020
Evaluating trust prediction and confusion matrix measures for web services ranking
M Hasnain, MF Pasha, I Ghani, M Imran, MY Alzahrani, R Budiarto
IEEE Access 8, 90847-90861, 2020
The Fast Health Interoperability Resources (FHIR) standard: systematic literature review of implementations, applications, challenges and opportunities
M Ayaz, MF Pasha, MY Alzahrani, R Budiarto, D Stiawan
JMIR medical informatics 9 (7), e21929, 2021
Investigating brute force attack patterns in IoT network
D Stiawan, M Idris, RF Malik, S Nurmaini, N Alsharif, R Budiarto
Journal of Electrical and Computer Engineering 2019, 2019
Comic image decomposition for reading comics on cellular phones
M Yamada, R Budiarto, M Endo, S Miyazaki
IEICE transactions on information and systems 87 (6), 1370-1376, 2004
Education exchange storage protocol: Transformation into decentralized learning platform
U Rahardja, MA Ngadi, R Budiarto, Q Aini, M Hardini, FP Oganda
Frontiers in Education 6, 477, 2021
A survey on real world botnets and detection mechanisms
S Soltani, SAH Seno, M Nezhadkamali, R Budiarto
International Journal of Information and Network Security 3 (2), 116, 2014
Cyber-Attack Penetration Test and Vulnerability Analysis.
D Stiawan, MY Idris, AH Abdullah, F Aljaber, R Budiarto
International Journal of Online Engineering 13 (1), 2017
Automatic text summarization for Indonesian language using textteaser
D Gunawan, A Pasaribu, RF Rahmat, R Budiarto
iop conference series: materials science and engineering 190 (1), 012048, 2017
Qos multicast routing based on bandwidth estimation in mobile ad Hoc networks
M Saghir, TC Wan, R Budiarto
Proceedings of the International Conference on Computer and Communication …, 2006
Load balancing qos multicast routing protocol in mobile ad hoc networks
M Saghir, TC Wan, R Budiarto
Technologies for Advanced Heterogeneous Networks: First Asian Internet …, 2005
A comparison of IP datagrams transmission using MPE and ULE over Mpeg-2/DVB networks
TC Hong, WT Chee, R Budiarto
2005 5th International Conference on Information Communications & Signal …, 2005
Agronomical and physiological characters of kaffir lime (citrus hystrixDC) seedling under artificial shading and pruning
R Budiarto, R Poerwanto, E Santosa, D Efendi, A Agusta
Emirates Journal of Food and Agriculture, 222-230, 2019
Anomaly detection and monitoring in Internet of Things communication
D Stiawan, MY Idris, RF Malik, S Nurmaini, R Budiarto
2016 8th International Conference on Information Technology and Electrical …, 2016
Survey and new approach in service discovery and advertisement for mobile ad hoc networks
SAH Seno, R Budiarto, TC Wan
International Journal of Computer Science and Network Security 7 (2), 275-284, 2007
An approach for optimizing ensemble intrusion detection systems
D Stiawan, A Heryanto, A Bardadi, DP Rini, IMI Subroto, MYB Idris, ...
Ieee Access 9, 6930-6947, 2020
Water pipeline monitoring and leak detection using flow liquid meter sensor
RF Rahmat, IS Satria, B Siregar, R Budiarto
IOP conference series: materials science and engineering 190 (1), 012036, 2017
A routing layer-based hierarchical service advertisement and discovery for MANETs
SAH Seno, R Budiarto, TC Wan
Ad Hoc Networks 9 (3), 355-367, 2011
Lightweight and cost-effective MPEG video encryption
LS Choon, A Samsudin, R Budiarto
Proc. of Information and Communication Technologies: From Theory to …, 2004
Network anomaly detection research: a survey
K Kurniabudi, B Purnama, S Sharipuddin, D Darmawijoyo, D Stiawan, ...
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 7 (1 …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20