Deris Stiawan
YOU?
Author Swipe
View article: New approach to measuring researcher expertise using cosine similarity algorithm and association rules
New approach to measuring researcher expertise using cosine similarity algorithm and association rules Open
This study proposes a new method to assess researcher expertise using publication data. The quality of research publications is an important indicator in the ranking of universities that are undergoing diversification. Research publication…
View article: FC-PoW: A Machine Learning-Based Blockchain Consensus for Efficient Order Processing in Manufacturing
FC-PoW: A Machine Learning-Based Blockchain Consensus for Efficient Order Processing in Manufacturing Open
View article: Recognition of Illegible Digits on Indonesian Election C1 Forms Using Convolutional Neural Network for Recapitulation Information System (SIREKAP)
Recognition of Illegible Digits on Indonesian Election C1 Forms Using Convolutional Neural Network for Recapitulation Information System (SIREKAP) Open
View article: Innovative smart showcase design for indoors and eco-friendly hydroponics
Innovative smart showcase design for indoors and eco-friendly hydroponics Open
Hydroponics is a unique and fascinating farming technique for producing plants and vegetables. Without having to use a large area of land, people can easily apply the technique to produce fresh and hygienic vegetables. However, the techniq…
View article: Shellcode classification analysis with binary classification-based machine learning
Shellcode classification analysis with binary classification-based machine learning Open
The internet enables people to connect through their devices. While it offers numerous benefits, it also has adverse effects. A prime example is malware, which can damage or even destroy a device or harm its users, highlighting the importa…
View article: Needs Analysis for the Development of Interactive Infographic Media Based on Discovery Learning on Renewable Energy Topics in Elementary Education
Needs Analysis for the Development of Interactive Infographic Media Based on Discovery Learning on Renewable Energy Topics in Elementary Education Open
The low level of students’ understanding in learning Natural Sciences, particularly on renewable energy topics, in elementary schools is partly due to the lack of interactive learning media that align with children's learning characteristi…
View article: Early Mental Health Detection with Machine Learning : A Practical Approach to Model Development and Implementation
Early Mental Health Detection with Machine Learning : A Practical Approach to Model Development and Implementation Open
View article: Classification and similarity detection of Indonesian scientific journal articles
Classification and similarity detection of Indonesian scientific journal articles Open
The development of technology is accelerating in finding references to scientific articles or journals related to research topics. One of the sources of national aggregator services to find references is Garba Rujukan Digital (GARUDA), dev…
View article: Enhanced Intrusion Detection in IoT Smart Homes: Leveraging Binary and Multi-Class Classification Models
Enhanced Intrusion Detection in IoT Smart Homes: Leveraging Binary and Multi-Class Classification Models Open
This study uses the MQTT-IoT-IDS2020 dataset, which contains normal traffic and attack traffic such as scan_A, scan_sU, Sparta, and mqtt_bruteforce attacks. This dataset is statistically extracted based on the unidirectional-based features…
View article: Detection of android malware with deep learning method using convolutional neural network model
Detection of android malware with deep learning method using convolutional neural network model Open
Android malware is an application that targets Android devices to steal crucial data, including money or confidential information from Android users. Recent years have seen a surge in research on Android malware, as its types continue to e…
View article: Machine learning model approach in cyber attack threat detection in security operation center
Machine learning model approach in cyber attack threat detection in security operation center Open
The evolution of technology roles attracted cyber security threats not only compromise stable technology but also cause significant financial loss for organizations and individuals. As a result, organizations must create and implement a co…
View article: User behavior analysis for insider attack detection using a combination of memory prediction model and recursive feature elimination algorithm
User behavior analysis for insider attack detection using a combination of memory prediction model and recursive feature elimination algorithm Open
Existing defense tools against the insider attacks are rare, not in real time fashion and suffer from low detection accuracy as the attacks become more sophisticated. Thus, a detection tool with online learning ability and better accuracy …
View article: Multilabel Classification of Bilingual Patents Using OneVsRestClassifier: A Semiautomated Approach
Multilabel Classification of Bilingual Patents Using OneVsRestClassifier: A Semiautomated Approach Open
View article: Peer-Review Statements
Peer-Review Statements Open
View article: A Robust and Efficient Machine Learning Framework for Enhancing Early Detection of Android Malware
A Robust and Efficient Machine Learning Framework for Enhancing Early Detection of Android Malware Open
The advancement of information technology has introduced new challenges in cybersecurity, especially related to the Android platform which is the main target of malicious software (malware) attacks. The National Cyber and Crypto Agency (BS…
View article: IoT Security: Botnet Detection Using Self-Organizing Feature Map and Machine Learning
IoT Security: Botnet Detection Using Self-Organizing Feature Map and Machine Learning Open
The rapid advancement of Internet of Things (IoT) technology has created potential for progress in various aspects of life. However, the increasing number of IoT devices also raises the risk of cyberattacks, particularly IoT botnets often …
View article: Klasifikasi Shellcode Dengan Machine Learning Berbasis Klasifikasi Biner
Klasifikasi Shellcode Dengan Machine Learning Berbasis Klasifikasi Biner Open
Internet dapat menghubungkan satu orang dengan orang lain dengan menggunakan perangkat masing-masing. Internet sendiri memiliki dampak positif dan negatif. Salah satu contoh dampak negatif dari internet adalah adanya malware yang dapat men…
View article: The incorporation of stacked long short-term memory into intrusion detection systems for botnet attack classification
The incorporation of stacked long short-term memory into intrusion detection systems for botnet attack classification Open
Botnets are a common cyber-attack method on the internet, causing infrastructure damage, data theft, and malware distribution. The continuous evolution and adaptation to enhanced defense tactics make botnets a strong and difficult th…
View article: Machine learning-based anomaly detection for smart home networks under adversarial attack
Machine learning-based anomaly detection for smart home networks under adversarial attack Open
As smart home networks become more widespread and complex, they are capable of providing users with a wide range of applications and services. At the same time, the networks are also vulnerable to attack from malicious adversaries who can …
View article: Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means
Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means Open
Network security on internet of things (IoT) devices in the IoT development process may open rooms for hackers and other problems if not properly protected, particularly in the addition of internet connectivity to computing device systems …
View article: Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means
Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means Open
Network security on internet of things (IoT) devices in the IoT development process may open rooms for hackers and other problems if not properly protected, particularly in the addition of internet connectivity to computing device systems …
View article: Machine learning-based anomaly detection for smart home networks under adversarial attack
Machine learning-based anomaly detection for smart home networks under adversarial attack Open
As smart home networks become more widespread and complex, they are capable of providing users with a wide range of applications and services. At the same time, the networks are also vulnerable to attack from malicious adversaries who can …
View article: Classification of Darknet Traffic Using the AdaBoost Classifier Method
Classification of Darknet Traffic Using the AdaBoost Classifier Method Open
Darknet is famous for its ability to provide anonymity which is often used for illegal activities. A security monitor report from BSSN highlights that 290.556 credential data from institution in Indonesia have been exposed on the darknet. …
View article: Proposed threshold-based and rule-based approaches to detecting duplicates in bibliographic database
Proposed threshold-based and rule-based approaches to detecting duplicates in bibliographic database Open
Bibliographic databases are used to measure the performance of researchers, universities and research institutions. Thus, high data quality is required and data duplication is avoided. One of the weaknesses of the threshold-based approach …
View article: Malware Detection in Portable Document Format (PDF) Files with Byte Frequency Distribution (BFD) and Support Vector Machine (SVM)
Malware Detection in Portable Document Format (PDF) Files with Byte Frequency Distribution (BFD) and Support Vector Machine (SVM) Open
Portable Document Format (PDF) files as well as files in several other formats such as (.docx, .hwp and .jpg) are often used to conduct cyber attacks. According to VirusTotal, PDF ranks fourth among document files that are frequently used …
View article: Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104 Open
Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion de…
View article: A Novel Dataset for Experimentation With Intrusion Detection Systems in SCADA Networks Using IEC 60870-5-104 Standard
A Novel Dataset for Experimentation With Intrusion Detection Systems in SCADA Networks Using IEC 60870-5-104 Standard Open
Supervisory Control and Data Acquisition (SCADA) systems, particularly Remote Terminal Units (RTUs), are vulnerable to cyber-attacks due to their limited computing resources. This study addresses the need for a reliable, publicly available…
View article: Effective and efficient approach in IoT Botnet detection
Effective and efficient approach in IoT Botnet detection Open
Internet of Things (IoT) technology presents an advantage to daily life, but this advantage is not a guarantee of security. This is because cyber-attacks, such as botnets, remain a threat to the user. Detection systems are one of the alter…
View article: CNN-LSTM Hybrid Model for Improving Bitcoin Price Prediction Results
CNN-LSTM Hybrid Model for Improving Bitcoin Price Prediction Results Open
LSTM is a promising tool for predicting the stock exchange. Still, when the LSTM Model faces an anomaly problem with a dataset of Bitcoin that has hit more change in value by fluctuation, it can be a problem for producing good evaluation r…
View article: IoT botnet attack detection using deep autoencoder and artificial neural networks
IoT botnet attack detection using deep autoencoder and artificial neural networks Open
As Internet of Things (IoT) applications and devices rapidly grow, cyber-attacks on IoT networks/systems also have an increasing trend, thus increasing the threat to security and privacy.Botnet is one of the threats that dominate the attac…