Tri Wanda Septian
Cited by
Cited by
Payload recognition and detection of Cross Site Scripting attack
MR Zalbina, TW Septian, D Stiawan, MY Idris, A Heryanto, R Budiarto
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 172-176, 2017
Analysis of custody transfer on moving bundle protocol of wireless router in delay tolerant network (DTN)
F Noviani, D Stiawan, SD Siswanti, TW Septian, MA Riyadi, F Aljaber, ...
2017 4th International Conference on Information Technology, Computer, and …, 2017
Denial of service attack visualization with clustering using K-means algorithm
NA Putri, D Stiawan, A Heryanto, TW Septian, L Siregar, R Budiarto
2017 International Conference on Electrical Engineering and Computer Science …, 2017
Real Time Environmental Monitoring in Palm Oil Plantation Using Wireless Sensor Network
RF Malik, M Hafiz, MR Zalbina, TW Septian
Proceeding of the Electrical Engineering Computer Science and Informatics 2 …, 2015
Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method
D Stiawan, MY Idris, D Aryandi, A Heryanto, TW Septian, F Muchtar, ...
International Journal of Communication Networks and Information Security 11 …, 2019
Analysis WhatsApp Forensic and Visualization in Android Smartphone with Support Vector Machine (SVM) Method
D Stiawan, TW Septian, RF Malik, A Heriyanto, R Budiarto
Journal of Physics: Conference Series 1196 (1), 012064, 2019
Integrasi Wireless Sensor Network Pada Sistem Tertanam Menggunakan Metode Proxy Agent Layer
H Ahmad, N Siti, S Triwanda, F Ricy
Intrusion Prevention in Heterogeneous System based on Behavior Approaches
D Stiawan, AF Oklilas, A Heryanto, TW Septian, R Budiarto
The system can't perform the operation now. Try again later.
Articles 1–8