Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Benni Purnama"'
Autor:
Benni Purnama, Deris Stiawan, Darmawijoyo Hanapi, Eko Arip Winanto, Rahmat Budiarto, Mohd Yazid Bin Idris
Publikováno v:
2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI).
Autor:
Bedine Kerim, Kurniabudi Kurniabudi, Benni Purnama, Rahmat Budiarto, Darmawijoyo Hanapi, Mohd. Yazid Idris, Eko Arip Winanto, Sharipuddin Sharipuddin, Deris Stiawan
Publikováno v:
Indonesian Journal of Electrical Engineering and Informatics (IJEEI). 9
Heterogeneous network is one of the challenges that must be overcome in Internet of Thing Intrusion Detection System (IoT IDS). The difficulty of the IDS significantly is caused by various devices, protocols, and services, that make the network becom
Autor:
Darmawiiovo Hanapi, Benni Purnama, Sharipuddin, Deris Stiawan, Mohd. Yazid Idris, Rahmat Budiarto, Kurniabudi, Eko Arip Winanto
Publikováno v:
2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI).
Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effect
Autor:
Sharipuddin Sharipuddin, Benni Purnama, Rahmat Budiarto, Deris Stiawan, Darmawijoyo Hanapi, Mohd. Yazid Idris, Eko Arip Winanto, Kurniabudi Kurniabudi
Publikováno v:
IAES International Journal of Artificial Intelligence (IJ-AI). 10:735
The difficulty of the intrusion detection system in heterogeneous networks is significantly affected by devices, protocols, and services, thus the network becomes complex and difficult to identify. Deep learning is one algorithm that can classify dat
Autor:
Darmawijoyo Darmawijoyo, Sharipuddin Sharipuddin, Rahmat Budiarto, Samsuryadi Samsuryadi, Ahmad Heryanto, Kurniabudi Kurniabudi, Benni Purnama, Deris Stiawan
Publikováno v:
Indonesian Journal of Electrical Engineering and Informatics (IJEEI). 7
Data analysis to identifying attacks/anomalies is a crucial task in anomaly detection and network anomaly detection itself is an important issue in network security. Researchers have developed methods and algorithms for the improvement of the anomaly
Autor:
Deris Stiawan, Dimas Wahyudi, Kurniabudi, Sharipuddin, Fepiliana, Darmawijoyo, Rahmat Budiarto, Sri Suryani, Benni Purnama
Publikováno v:
2018 International Conference on Electrical Engineering and Computer Science (ICECOS).
This study presents the testing of several devices (sensors) in obtaining sensor performance, there are several experiments and evaluations of the results obtained in the topology. Each sensor must be able to provide some results in the form of accur
Publikováno v:
2018 International Conference on Electrical Engineering and Computer Science (ICECOS).
Internet of Things (IoT) networks operators may not be fully aware whether each IoT device in their network is functioning safe enough from cyber-attacks. This paper develops an IoT traffic dataset with the purpose of of network traffic analytics to
Autor:
A.H. Hetty Rohayani, Benni Purnama
Publikováno v:
Procedia Computer Science. 59:195-204
In a secret message, cryptography is more directed to the encrypted message while steganography is more directed at the hidden message. However, both methods have the same goal, namely the attempt to conceal the message. On the other side, it turns o