Deris Stiawan

Orcid: 0000-0002-9302-1868

According to our database1, Deris Stiawan authored at least 18 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
3
2
1
4
1
3
1
1
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104.
IET Cyper-Phys. Syst.: Theory & Appl., September, 2024

An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction.
Int. J. Inf. Sec., June, 2024

A Novel Dataset for Experimentation With Intrusion Detection Systems in SCADA Networks Using IEC 60870-5-104 Standard.
IEEE Access, 2024

2023
IoT botnet attack detection using deep autoencoder and artificial neural networks.
KSII Trans. Internet Inf. Syst., 2023

An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection.
Comput. Syst. Sci. Eng., 2023

2022
Improvement of attack detection performance on the internet of things with PSO-search and random forest.
J. Comput. Sci., 2022

2021
Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm.
Inf. Technol. Control., 2021

Attack classification of an intrusion detection system using deep learning and hyperparameter optimization.
J. Inf. Secur. Appl., 2021

Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network.
IEEE Access, 2021

An Approach for Optimizing Ensemble Intrusion Detection Systems.
IEEE Access, 2021

2020
CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection.
IEEE Access, 2020

2019
Investigating Brute Force Attack Patterns in IoT Network.
J. Electr. Comput. Eng., 2019

TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis.
Int. J. Online Biomed. Eng., 2019

Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method.
Int. J. Commun. Networks Inf. Secur., 2019

2017
Cyber-Attack Penetration Test and Vulnerability Analysis.
Int. J. Online Eng., 2017

2016
Penetration Testing and Mitigation of Vulnerabilities Windows Server.
Int. J. Netw. Secur., 2016

2015
Penetration Testing and Network Auditing: Linux.
J. Inf. Process. Syst., 2015

2011
Research on Heteregeneous Data for Recognizing Threat.
Proceedings of the ICSOFT 2011, 2011


  Loading...