Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Maya Hilda Lestari Louk"'
Publikováno v:
Teknika, Vol 13, Iss 1, Pp 77-85 (2024)
A honeypot is a tool or system used to record, redirect, and even lure hackers into penetrating and exploiting a system. The increasing development of technology causes cyber hackers to realize the existence of honeypots using various other software
Externí odkaz:
https://doaj.org/article/5b31c4ff871c4466aecea8d1d71d6003
Publikováno v:
Jurnal Teknologi Pendidikan, Vol 25, Iss 2 (2023)
Merdeka Learning is one of the breakthroughs in education carried out by the Government of Indonesia. One form of activity from Merdeka Learning is student exchange. However, not all universities in Indonesia have implemented e-learning properly due
Externí odkaz:
https://doaj.org/article/6c10022118cb42368d53c9b79f8559e2
Publikováno v:
Big Data and Cognitive Computing, Vol 6, Iss 4, p 137 (2022)
As a system capable of monitoring and evaluating illegitimate network access, an intrusion detection system (IDS) profoundly impacts information security research. Since machine learning techniques constitute the backbone of IDS, it has been challeng
Externí odkaz:
https://doaj.org/article/6ca182d5d93342fd9cdf2d424fe1b89a
Publikováno v:
Algorithms, Vol 15, Iss 9, p 332 (2022)
Given their escalating number and variety, combating malware is becoming increasingly strenuous. Machine learning techniques are often used in the literature to automatically discover the models and patterns behind such challenges and create solution
Externí odkaz:
https://doaj.org/article/e31aa7a9cade4fc1ba487cffdfd7fc98
Publikováno v:
Big Data and Cognitive Computing, Vol 6, Iss 2, p 41 (2022)
Gradient boosting ensembles have been used in the cyber-security area for many years; nonetheless, their efficacy and accuracy for intrusion detection systems (IDSs) remain questionable, particularly when dealing with problems involving imbalanced da
Externí odkaz:
https://doaj.org/article/30862cd694d34c01ad0697fad80adba6
Publikováno v:
Big Data and Cognitive Computing, Vol 5, Iss 4, p 72 (2021)
Classifier ensembles have been utilized in the industrial cybersecurity sector for many years. However, their efficacy and reliability for intrusion detection systems remain questionable in current research, owing to the particularly imbalanced data
Externí odkaz:
https://doaj.org/article/8e0c64362d764084b408cb913446c098
Autor:
Maya Hilda Lestari Louk
Publikováno v:
Teknika, Vol 7, Iss 1 (2018)
Komputasi awan adalah sebuah metode komputasi yang sedang berkembang saat ini untuk berbagi data dan pemrosesan data baik secara terbuka/umum atau pribadi. Komputasi awan adalah jawaban atas lingkungan komputasi yang lebih efektif dan efisien. Hal it
Externí odkaz:
https://doaj.org/article/0becb1742624431c8af08760a61452df
A transition in learning model implementation occurred in higher education during the COVID-19 pandemic. Online learning answers the needs of long-distance learning. However, not all higher education institutions are thoroughly prepared for online le
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::210697ba259057e5424600935972ccb4
https://zenodo.org/record/7256027
https://zenodo.org/record/7256027
Publikováno v:
Expert Systems with Applications. 213:119030