Showing
1 - 11
results of
11
for search '
Stiawan, Deris
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Stiawan, Deris
Showing
1 - 11
results of
11
for search '
Stiawan, Deris
'
, query time: 0.08s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Attack and vulnerability penetration testing: freebsd
by
Stiawan
,
Deris
,
Idris, Mohd. Yazid
,
Abdullah, Abdul Hanan
Published 2013
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
2
Classification of habitual activities in behavior-based network detection
by
Stiawan
,
Deris
,
Abdullah, Abdul Hanan
,
Idris, Mohd. Yazid
Published 2010
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
3
The prevention threat of behavior-based signature using pitcher flow architecture
by
Stiawan
,
Deris
,
Abdullah, Abdul Hanan
,
Idris, Mohd. Yazid
Published 2010
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
4
Mobile Application of Electronic Prescribing for Supporting E-Health Services
by
Amin M. Miftakul
,
Sutrisman Adi
,
Stiawan
Deris
,
Ermatita
Published 2019-01-01
Get full text
Article
5
A study of economic value estimation on cryptocurrency value back by gold, methods, techniques, and tools
by
Ferdiansyah, Ferdiansyah
,
Othman, Siti Hajar
,
Md. Radzi, Raja Zahilah
,
Stiawan
,
Deris
Published 2019
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
6
Penetration testing and mitigation of vulnerabilities windows server
by
Stiawan
,
Deris
,
Idris, Mohd. Yazid
,
Abdullah, Hanan
,
AlQurashi, M.
,
Budiarto, Rahmat
Published 2016
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
7
Cyber-Attack Penetration Test and Vulnerability Analysis
by
Stiawan
,
Deris
,
Idris, Mohd. Yazid
,
Abdullah, Abdul Hanan
,
Aljaber, Fahad
,
Budiarto, Rahmat
Published 2017
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
8
CICIDS-2017 dataset feature analysis with information gain for anomaly detection
by
Kurniabudi, Kurniabudi
,
Stiawan
,
Deris
,
Darmawijoyo, Darmawijoyo
,
Idris, Mohd. Yazid
,
Bamhdi, Alwi M.
,
Budiarto, Rahmat
Published 2020
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
9
Investigating brute force attack patterns in IoT network
by
Stiawan
,
Deris
,
Idris, Mohd. Yazid
,
Malik, Reza Firsandaya
,
Siti Nurmaini, Siti Nurmaini
,
Alsharif, Nizar
,
Budiarto, Rahmat
Published 2019
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
10
Ransomware detection based on opcode behaviour using k-nearest neighbours algorithm
by
Stiawan
,
Deris
,
Daely, Somame Morianus
,
Heryanto, Ahmad
,
Nurul Afifah, Nurul Afifah
,
Idris, Mohd. Yazid
,
Budiarto, Rahmat
Published 2021
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
11
TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis
by
Stiawan
,
Deris
,
Wahyudi, Dimas
,
Heryanto, Ahmad
,
Samsuryadi, Samsuryadi
,
Idris, Mohd. Yazid
,
Muchtar, Farkhana
,
Alzahrani, Mohammed Abdullah
,
Budiarto, Rahmat
Published 2019
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
QA75 Electronic computers. Computer science
TA Engineering (General). Civil engineering (General)
Loading...