School of Strategic and Global Studies

Filter
Conference contribution

Search results

  • 2019

    Combating threat-alert fatigue with online anomaly detection using isolation forest

    Aminanto, M. E., Zhu, L., Ban, T., Isawa, R., Takahashi, T. & Inoue, D., 2019, Neural Information Processing - 26th International Conference, ICONIP 2019, Proceedings. Gedeon, T., Wong, K. W. & Lee, M. (eds.). Springer, p. 756-765 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11953 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Citations (Scopus)
  • Method for Linear Satellite Pay Television Censor Inappropriate Movie Scene in Indonesia

    Satryoko, A. & Munandar, A. I., Dec 2019, 2019 2nd International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2019. Wibowo, F. W. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 473-477 5 p. 9034595. (2019 2nd International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    Deep learning in intrusion detection perspective: Overview and further challenges

    Kim, K. & Aminanto, M. E., 29 Jan 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 5-10 6 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    52 Citations (Scopus)
  • Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning

    Aminanto, M. E. & Kim, K., 2018, Information Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers. Kang, B. B. & Kim, T. (eds.). Springer Verlag, p. 212-223 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10763 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    27 Citations (Scopus)
  • Pantura water quality: Comparing the pollution distribution model of comal river and garang river

    Gumelar, A. R., Akhwady, R. & Alamsyah, A. T., 18 Jan 2018, Proceedings of the 2018 8th International Conference on Bioscience, Biochemistry and Bioinformatics, ICBBB 2018. Association for Computing Machinery, p. 146-152 7 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Wi-Fi intrusion detection using weighted-feature selection for neural networks classifier

    Aminanto, M. E., Tanuwidjaja, H. C., Yoo, P. D. & Kim, K., 29 Jan 2018, Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security. Institute of Electrical and Electronics Engineers Inc., p. 99-104 6 p. (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Citations (Scopus)
  • 2017

    Detecting impersonation attack in wifi networks using deep learning approach

    Aminanto, M. E. & Kim, K., 2017, Information Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers. Choi, D. & Guilley , S. (eds.). Springer Verlag, p. 136-147 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10144 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    39 Citations (Scopus)
  • 2015

    Development of protection profile and security target for Indonesia electronic ID card's (KTP-el) card reader based on common criteria V3.1:2012/SNI ISO/IEC 15408:2014

    Aminanto, M. E. & Sutikno, S., 9 Jan 2015, Proceedings - 2014 International Conference on Advanced Informatics: Concept, Theory and Application, ICAICTA 2014. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. 7005905. (Proceedings - 2014 International Conference on Advanced Informatics: Concept, Theory and Application, ICAICTA 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)