Time series forecasting (TSF) is the task of predicting future values of a particular time sequence. It used in various fields including forecast vital signs data. Vital signs data that are include…
Cyber attacks on SCADA systems are becoming an increasingly worrying threat. Because they have security holes and attackers can weaken the Intrusion Detection System (IDS) security sensors, especia…
DDoS attacks are one of the main threats to security issues on the internet today which have quite a severe impact. As for knowing the best DDoS attack detection, this study applies several selecti…
This study focuses on visualize the UDP Flood Attack Pattern on Internet of Things Network Dataset ( doi.org/10.528 /zenodo.4436127). The purpose of this study is to obtain a visual form of the dat…
Brute force is one of many attacks that are often used by hackers in carrying out the cyber crimes. For recognizing the attack patterns visualization is carried out, so that in presenting this rese…
Congestion is a problem that often occurs in big cities caused by the increasing number of vehicles each year without being accompanied by the expansion of highways. There are 3 methods proposed, n…
DDoS is one of many attacks used by hackes in carrying out cyber crimes. As for knowing attacks detectors, in presenting this research looking for parameters that play a major role ini the DDoS dat…
Kemacetan lalu lintas masih menjadi permasalahan yang sering dihadapi masyarakat di kota Palembang hingga saat ini masih kesulitan dalam melakukan mobilitas untuk mendukung aktivitas sehari-hari. D…
Botnet is a group of programs that have been infected by malware and connected to the internet network that has been controlled by certain parties. Using Long Short-Term Memory (LSTM) can help dete…
The Internet of things (IoT) is a network that can connect any device to the internet. Denial of Service (DoS) attacks on IoT use reasonable service requests to gain excessive processing and networ…
Bruteforce attack is a form of attack to be able to enter network services by making various pairs of usernames and passwords illegally. To avoid this attack you can use different character combina…
Bruteforce attack is an attack that uses the trial-error method to obtain user information, especially passwords. To overcome these problems, previous research has applied learning algorithms to cy…
Brute Force Attack is an attack that targets private information such as usernames, passwords, passphrases and other information. Brute force attack sends combinations continuously in the form of d…
Distributed Denial Of Service (DDoS) attacks are a type of cyber attack against websites. DDoS is marked by the amount of fake traffic that floods the server, system or internet network. As a resul…
Traffic congestion is currently a major problem in big cities in Indonesia. Therefore, a system for determining the best paths is needed to address traffic congestion issues. This system is part of…
Propagation is the existence of a signal sharing area from one place to another and is one of the most important perspectives of cellular wireless network planning. Prediction of path loss or commo…
Advances in information technology make many human activities easier and faster. One form of information technology advancement that exists is the existence of a mobile application that can help us…
K-Means clustering is a method to grouping data based on the similarity of features and detect the hidden patterns in dataset. The dataset is from GARUDA Repository which contains raw data of PDF f…
Remote Access Trojan (RAT) is a special type of remote access software commonly used for malicious purposes, in which the installation is performed without the user's consent, the remote control th…
Bitcoin has a low transaction throughput. Shortening the block interval is important to improving output. However, it is still difficult to simply shorten the block interval because the interval is…
This research aims to develop a detection model by combining Convolutional Neural Networks (CNN) and Recurrent Neural Network (RNN) architectures to detect QRS Complex signal waves in fetal electro…
The amount of Malware is constantly increasing. Most Malware is a modification of previous Malware data. The datasets used from CIC-MalMem-2022 are Benign and Spyware-CWS. This study used the Naïv…
The development of technology is very rapid so that many applications have emerged, such as smart transportation applications. Smart transport is considered as an umbrella term that includes route …
The increasing use of vehicles in urban areas has resulted in high levels of road congestion. The focus of this research is the application of smart transportation in smart city to find the best ro…
The problem in this research is that the number of attack data is much less than the number of non-attack samples, which results in a high error rate in attack detection. The use of Support Vector …
In bibliographic data analysis, accurate author matching is crucial for various applications such as citation analysis and research profiling. This research focuses on the classification of author …
The role of technology in vehicle monitoring systems in traffic is still widely used, one of which is the use of RFID (Radio Frequency Identification) technology as a vehicle tracking sensor in tra…
DDoS attacks can cause targeted servers to become slow and web server services unavailable, but DDoS attacks are difficult to detect in a network because their traffic patterns are similar to those…
Sekarang semakin banyak munculnya website baru, maka tingkat traffic Cybercrime akan semakin meningkat juga. Cybercrime adalah tindak kejahatan yang dilakukan dengan memanfaatkan teknologi komputer…
This study focuses on the dataset from DDoS Attack SDN Dataset (2020) where the Smurf DDoS attack focuses on the ICMP protocol. The purpose of this study is to detect Smurf DDoS attacks on the Soft…