Deris Stiawan

Orcid: 0000-0002-9302-1868

According to our database1, Deris Stiawan authored at least 16 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104.
IET Cyper-Phys. Syst.: Theory & Appl., September, 2024

An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction.
Int. J. Inf. Sec., June, 2024

2023
An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection.
Comput. Syst. Sci. Eng., 2023

2022
Improvement of attack detection performance on the internet of things with PSO-search and random forest.
J. Comput. Sci., 2022

2021
Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm.
Inf. Technol. Control., 2021

Attack classification of an intrusion detection system using deep learning and hyperparameter optimization.
J. Inf. Secur. Appl., 2021

Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network.
IEEE Access, 2021

An Approach for Optimizing Ensemble Intrusion Detection Systems.
IEEE Access, 2021

2020
CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection.
IEEE Access, 2020

2019
Investigating Brute Force Attack Patterns in IoT Network.
J. Electr. Comput. Eng., 2019

TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis.
Int. J. Online Biomed. Eng., 2019

Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method.
Int. J. Commun. Networks Inf. Secur., 2019

2017
Cyber-Attack Penetration Test and Vulnerability Analysis.
Int. J. Online Eng., 2017

2016
Penetration Testing and Mitigation of Vulnerabilities Windows Server.
Int. J. Netw. Secur., 2016

2015
Penetration Testing and Network Auditing: Linux.
J. Inf. Process. Syst., 2015

2011
Research on Heteregeneous Data for Recognizing Threat.
Proceedings of the ICSOFT 2011, 2011


  Loading...