Missing data is a common problem in vital sign datasets and is one of the most complex topics in computer science. The large number of missing values in the data makes it more difficult to process.…
Anomaly traffic is a condition that results in an abnormality in network traffic. Anomaly detections is a monitoring to monitor the movement that occurs in the network system. DDoS attack or Distri…
This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers prese…
This open access book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to the fundamental description of the formats, there are hints ab…
This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full p…
Recently, wireless communication is growing rapidly, due to its practicality and the many features that have been developed along with current technological developments, especially features that c…
Along with the development of the era of globalization, the use of technology has been very widespread in various industrial sectors, so data accumulates in a very fast time to grow into large-scal…
In recent years, blockchain technology has found widespread applications across various domains, including cryptocurrency, financial services, and risk management. Cryptocurrency, in particular, ha…
CV. Multi Mandiri is a company engaged in housing development or development. In its activities there are still many obstacles, namely, the transaction process is still ongoing manually, relying on…
The rapid growth and anonymity offered by cryptocurrencies have made them vulnerable to being used for illegal activities. In this study, Long Short-Term Memory (LSTM) neural network is used to ide…
Blockchain is a digital data bank that stores transaction data transparently. With so much interest in bitcoin, making bitcoin wallets are an attractive target for hackers. This research uses the D…
With the existence of attack models such as phishing and malware distribution, these actions begin by accessing a Uniform Resource Locator (URL) or files containing harmful links within them. A Uni…
Building a secure socket tunneling protocol method to access port services on the MikroTikrouterboard. Limiting ports that are easy to access remotely on the MikroTikrouterboard. Knowing the steps …
The reconstruction of two-dimensional images into three-dimensional using transventricular objects plays a crucial role in the medical field, particularly in the diagnosis and treatment within neur…
This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented we…
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines th…
Cyber Attack is a crime that attacks computer systems that can shut down or damage information technology services. Every act of attack will have an impact on gaining access to services, manipulati…
One of the threats to the internet network is botnet (robot network). although there are many methods used to detect botnet, but there are still less accurate. this can be seen from the results of …
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October…
Port Scanning attacks are quite dangerous attacks, this technique can map characteristics, detect open ports and even obtain important information on a network or host to then forward to further at…
Learning new words can be difficult, it helps if it’s possible to look up the new word in a dictionary, however, a word in English often sounds alike to another word, therefore a speech to text s…
This research discusses four scenarios in developing a Faster Region-based Convolutional Neural Network (Faster R-CNN) model to detect bleeding in radiological images of the human brain. We specifi…
ARI is a disease that attacks the respiratory tract which can be caused by a viral infection or can also be caused by other diseases or other conditions, under certain conditions ARI can cause comp…
IPTV minipacks are small packages of various additional channels owned by IndiHome. This package can be selected and purchased according to customer needs. currently used traditional methods of ana…
The increase in the number of vehicles and the urban population has led to high levels of traffic congestion in urban areas. The focus of this research is to find the best alternative routes using …
This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The g…
This open access book constitutes the proceedings of the 25th International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2022, which was held during April 4-6…