Suryani, Vera
46  results:
Search for persons X
?
1

Adversary Simulation of Structured Query Language (SQL) Inj..:

, In: Lecture Notes in Networks and Systems; Intelligent Systems and Applications,
 
?
2

Benchmarking Machine Learning Algorithm for Routing Attack ..:

, In: 2023 International Conference on Data Science and Its Applications (ICoDSA),
 
?
3

DDoS Attack Detection Analysis Using Ensemble Learning with..:

, In: 2023 11th International Conference on Information and Communication Technology (ICoICT),
 
?
4

Intrusion Detection System Using Incremental Learning Metho:

, In: 2023 11th International Conference on Information and Communication Technology (ICoICT),
 
?
5

Classification of SQL Injection Attacks using ensemble lear..:

, In: 2023 International Conference on Data Science and Its Applications (ICoDSA),
Ibrohim, Maulana Malik ; Suryani, Vera - p. 230-236 , 2023
 
?
6

Prototype of Iot-Based Keyless Security System For Motorcyc..:

, In: 2023 6th International Conference on Information and Communications Technology (ICOIACT),
 
?
8

DDoS Attack Detection on MQTT Protocol Using Semi-supervise..:

, In: 2023 11th International Conference on Information and Communication Technology (ICoICT),
 
?
9

Video Injection Attack Detection on CCTV Using Ensemble Lea..:

, In: 2023 11th International Conference on Information and Communication Technology (ICoICT),
 
?
10

Evaluation of the Hybrid Classification and Regression Tree..:

, In: 2023 11th International Conference on Information and Communication Technology (ICoICT),
Aziz, Muhammad Abdul ; Suryani, Vera - p. 622-626 , 2023
 
?
11

Performance Analysis of TCP Fractional Window Increment and..:

Sofyan, Arnas ; Suryani, Vera ; Nuha, Hilal Hudan
International Journal on Information and Communication Technology (IJoICT).  9 (2023)  1 - p. 86-94 , 2023
 
?
12

Semi-supervised approach for detecting distributed denial o..:

Setiawan Sumadi, Fauzi Dwi ; Kusuma Aditya, Christian Sri ; Maulana, Ahmad Akbar..
IAES International Journal of Artificial Intelligence (IJ-AI).  11 (2022)  3 - p. 1094 , 2022
 
?
13

The Detection of Mirai Botnet Attack on the Internet of Thi..:

, In: 2022 10th International Conference on Information and Communication Technology (ICoICT),
 
?
14

Implementation of Sleep Detector Using Histogram of Oriente..:

, In: 2022 International Conference on Information Technology Systems and Innovation (ICITSI),
 
?
15

Secure Two-Factor Authentication for IoT Device:

, In: 2022 10th International Conference on Information and Communication Technology (ICoICT),
 
1-15