deris stiawan
deris stiawan
Faculty of Computer Science, Universitas Sriwijaya
Verified email at ieee.org - Homepage
TitleCited byYear
WhatsApp, viber and telegram: Which is the best for instant messaging?
T Sutikno, L Handayani, D Stiawan, MA Riyadi, IMI Subroto
International Journal of Electrical & Computer Engineering (2088-8708) 6 (3), 2016
542016
The trends of intrusion prevention system network
D Stiawan, AH Abdullah, MY Idris
2010 2nd International Conference on Education Technology and Computer 4, V4á…, 2010
362010
Characterizing network intrusion prevention system
D Stiawan, M Idris, AH Abdullah
International Journal of Computer Applications 14 (1), 11-18, 2011
262011
Fortifying big data infrastructures to face security and privacy issues
T Sutikno, D Stiawan, IMI Subroto
Telkomnika 12 (4), 751, 2014
252014
An introduction to journal phishings and their detection approach
M Dadkhah, T Sutikno, MD Jazi, D Stiawan
Telkomnika 13 (2), 373, 2015
212015
Cyber-attack penetration test and vulnerability analysis
D Stiawan, MY Idris, AH Abdullah, F Aljaber, R Budiarto
International Journal of Online and Biomedical Engineering (iJOE) 13 (01á…, 2017
152017
Penetration Testing and Mitigation of Vulnerabilities Windows Server.
D Stiawan, MYB Idris, AH Abdullah, M AlQurashi, R Budiarto
IJ Network Security 18 (3), 501-513, 2016
142016
Fundamental Internetworking Development & Design Life Cycle
D Setiawan
Artikel Fasilkom Universitas Sriwijaya, 2009
142009
Intrusion prevention system: a survey
D Stiawan, AYI Shakhatreh, MY Idris, KA Bakar, AH Abdullah
Journal of Theoretical and Applied Information Technology 40 (1), 44-54, 2012
132012
DESIGN RESTFUL WEB SERVICE OF NATIONAL POPULATION DATABASE FOR SUPPORTING E-HEALTH INTEROPERABILITY SERVICE.
MM AMIN, ADI SUTRISMAN, D STIAWAN, A MASELENO
Journal of Theoretical & Applied Information Technology 96 (15), 2018
112018
Anomaly detection and monitoring in Internet of Things communication
D Stiawan, MY Idris, RF Malik, S Nurmaini, R Budiarto
2016 8th International Conference on Information Technology and Electricalá…, 2016
112016
The Prevention Threat of Behavior-based Signature using Pitcher Flow Architecture
D Stiawan, M Idris, AH Abdullah
IJCSNS International Journal of Computer Science and Network Security 10 (4á…, 2010
112010
Classification of Habitual Activities in Behavior-based Network Detection
D Stiawan, M Idris, AH Abdullah
Journal of Computing 2 (8), 1-7, 2010
102010
Penetration Testing and Network Auditing: Linux.
D Stiawan, MYB Idris, AH Abdullah
JIPS 11 (1), 104-115, 2015
92015
E-commerce
D Stiawan
82013
Payload recognition and detection of Cross Site Scripting attack
MR Zalbina, TW Septian, D Stiawan, MY Idris, A Heryanto, R Budiarto
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 172-176, 2017
72017
Analisis Perbandingan Sistem Keamanan WEP
D Stiawan, DP Rini, J Sriwijaya, J Sriwijaya
WPA/RADIUS Pada Jaringan Publik Wireless Hotspot, 2009
7*2009
A moving objects detection in underwater video using subtraction of the background model
MR Prabowo, N Hudayani, S Purwiyanti, SR Sulistiyanti, FXA Setyawan
2017 4th International Conference on Electrical Engineering, Computerá…, 2017
62017
Investigating Brute Force Attack Patterns in IoT Network
D Stiawan, M Idris, RF Malik, S Nurmaini, N Alsharif, R Budiarto
Journal of Electrical and Computer Engineering 2019, 2019
52019
Comparative analysis of K-Means method and Na´ve Bayes method for brute force attack visualization
D Stiawan, S Sandra, E Alzahrani, R Budiarto
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 177-182, 2017
52017
The system can't perform the operation now. Try again later.
Articles 1–20