default search action
IWBIS 2020: Depok, Indonesia
- International Workshop on Big Data and Information Security, IWBIS 2020, Depok, Indonesia, October 17-18, 2020. IEEE 2020, ISBN 978-1-7281-9098-3
- Amarulla Octavian, Wisnu Jatmiko:
Designing Intelligent Coastal Surveillance based on Big Maritime Data. 1-8 - Zainal A. Hasibuan:
Towards Using Universal Big Data in Artificial Intelligence Research and Development to Gain Meaningful Insights and Automation Systems. 9-18 - Muhammad Yogi Ilham, Isti Surjandari, Enrico Laoh:
Analyzing Highway Road Accident Characteristic Using Data Mining. 17-22 - Intania Cahya Sari, Yova Ruldeviyani:
Sentiment Analysis of the Covid-19 Virus Infection in Indonesian Public Transportation on Twitter Data: A Case Study of Commuter Line Passengers. 23-28 - Corry Elsa Noviyanti, Yova Ruldeviyani:
Risk Classification of Peer-to-Peer Lending Platform Using SVM Algorithm. 29-34 - Gede Rizky Gustisa Wisnu, Ahmadi, Ahmad Rizaqu Muttaqi, Aris Budi Santoso, Prabu Kresna Putra, Indra Budi:
Sentiment Analysis and Topic Modelling of 2018 Central Java Gubernatorial Election using Twitter Data. 35-40 - Petrus Mursanto, Ari Wibisono, Wendy D. W. T. Bayu, Valian Fil Ahli, May Iffah Rizki, Lintang Matahari Hasani, Jihan Adibah:
Time-Series Big Data Stream Evaluation. 41-46 - Iffa Maula Nur Prasasti, Arian Dhini, Enrico Laoh:
Automobile Insurance Fraud Detection using Supervised Classifiers. 47-52 - Wahyu Andhyka Kusuma, Agus Eko Minarno, Mochamad Satriyo Wibowo:
Triaxial accelerometer-based human activity recognition using 1D convolution neural network. 53-58 - Made Wira Dhanar Santika, Muhammad Anwar Ma'sum, Aria Kekalih, Alhadi Bustamam, Adila Alfa Krisnadhi, Noor Akhmad Setiawan, I Made Agus Dwi Suarjaya, Adi Nurhadiyatna, Wisnu Jatmiko:
Fast Ellipse Fitting Implementation on USG Mobile Telehealth Application. 59-64 - Kezia Irene, M. Anwar Ma'sum, Reyhan Eddy Yunus, Wisnu Jatmiko:
Segmentation and Approximation of Blood Volume in Intracranial Hemorrhage Patients Based on Computed Tomography Scan Images Using Deep Learning Method. 65-72 - Alif Kurniawan, Wisnu Jatmiko, Rukman Hertadi, Novian Habibie:
Prediction of Protein Tertiary Structure Using Pre-Trained Self-Supervised Learning Based on Transformer. 73-80 - Syafiq Hidayattullah, Isti Surjandari, Enrico Laoh:
Financial Statement Fraud Detection in Indonesia Listed Companies using Machine Learning based on Meta-Heuristic Optimization. 79-84 - Rizki Agung Muzaki, Obrina Candra Briliyant, Maulana Andika Hasditama, Hamzah Ritchi:
Improving Security of Web-Based Application Using ModSecurity and Reverse Proxy in Web Application Firewall. 85-90 - Muhammad Mahavira Prawira P, Rizki Kurniandi, Amiruddin Amiruddin:
Secure SMS Using Pseudo-Random Bit Generator Based on Chaotic Map, and AES on Arduino UNO Board and SIM 900 Module. 91-96 - Muhammad Fauzi, Grafika Jati, Muhammad Febrian Rachmadi, Wisnu Jatmiko:
Improved Logistic-Sine Chaotic Map based S-box and Bit-Plane Scrambling Encryption Schemes Performance on Compressed ECG Data. 97-102 - Puspita Kencana Sari, Setiadi Yazid:
Design of Blockchain-based Electronic Health Records for Indonesian Context: Narrative Review. 103-108 - Poorva Tiwari, C. S. Skanda, U. Sanjana, S. Aruna, Prasad B. Honnavalli:
Secure Wipe Out in BYOD Environment. 109-114 - Mauli Bayu Segoro, Prasetyo Adi Wibowo Putro:
Implementation of Two Factor Authentication (2FA) and Hybrid Encryption to Reduce the Impact of Account Theft on Android-Based Instant Messaging (IM) Applications. 115-120 - Rizal Dwi Prayogo, Siti Amatullah Karimah:
Optimization of Phishing Website Classification Based on Synthetic Minority Oversampling Technique and Feature Selection. 121-126 - Nungky Awang Chandra, Anak Agung Putri Ratna, Kalamullah Ramli:
Development of a Cyber-Situational Awareness Model of Risk Maturity Using Fuzzy FMEA. 127-136 - Prabhat Pokharel, Roshan Pokhrel, Sandeep Sigdel:
Intrusion Detection System based on Hybrid Classifier and User Profile Enhancement Techniques. 137-144 - Ghina Fitriya, Arif Rahman Hakim, Mohammed Abozied Hassan Abozied:
Capture The Flag Simulation Based on STRIDE Threat Model. 145-152 - Venia Noella Nanisura Damanik, Septia Ulfa Sunaringtyas:
Secure Code Recommendation Based on Code Review Result Using OWASP Code Review Guide. 153-158 - Satvik Dasari, Vishal Madipadga:
Aegis: A Framework to Detect Compromised Components in the Supply Chain of Information Technology Infrastructure. 159-164
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.