The era of the Internet of Things with billions of connected devices has created an increasingly large surface for cyber attackers to exploit, resulting in the need for faster, up-to-date and accurate detection of such attacks. In the last few years the growth of data in volume, correctness, speed, and variation of data is extremely fast. When large data sets or better known as Big Data are collected from or generated by different devices and sources, intelligent big data analysis techniques are required to mine, interpret and visualize the data. In terms of information system security, there is no protection that can guarantee that there will be no attacks or cyber simulation actions against a company or organization. Moreover, the laws go...
Attacks on critical information infrastructure are increasing in volume and sophistication with dest...
Human rights are individual privacy that must or must be protected by the state and recognized inter...
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer n...
This paper describes the analysis of security vulnerabilities in the national defense system, especi...
Abstrak – Data merupakan unsur terpenting dalam setiap penelitian dan pendekatan ilmiah. Metodolog...
Tingginya angka kasus dan angka kematian pasien terkonfirmasi positif COVID-19 masih merupakan masal...
Abstract – Data are the prominent elements in scientific researches and approaches. Data Science m...
Nowadays threat of previously unknown cyber- attacks are increasing because existing security system...
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of comp...
The number and complexity of cyber-attacks has been increasing steadily in recent years. The major p...
Abstract- In current digital world, Security has become the major issue for the organization. Every ...
Teknologi dan Kesehatan. Dua bagian yang tidak dapat dipisahkan dan semakin lekat seiring dengan per...
This book presents the latest advances in machine intelligence and big data analytics to improve ear...
Submitted in partial fulfillment of the requirements for the Degree of Masters of Science in Informa...
While many jargons are abound surrounding the “Big Data”, its legal risks are real and potentially d...
Attacks on critical information infrastructure are increasing in volume and sophistication with dest...
Human rights are individual privacy that must or must be protected by the state and recognized inter...
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer n...
This paper describes the analysis of security vulnerabilities in the national defense system, especi...
Abstrak – Data merupakan unsur terpenting dalam setiap penelitian dan pendekatan ilmiah. Metodolog...
Tingginya angka kasus dan angka kematian pasien terkonfirmasi positif COVID-19 masih merupakan masal...
Abstract – Data are the prominent elements in scientific researches and approaches. Data Science m...
Nowadays threat of previously unknown cyber- attacks are increasing because existing security system...
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of comp...
The number and complexity of cyber-attacks has been increasing steadily in recent years. The major p...
Abstract- In current digital world, Security has become the major issue for the organization. Every ...
Teknologi dan Kesehatan. Dua bagian yang tidak dapat dipisahkan dan semakin lekat seiring dengan per...
This book presents the latest advances in machine intelligence and big data analytics to improve ear...
Submitted in partial fulfillment of the requirements for the Degree of Masters of Science in Informa...
While many jargons are abound surrounding the “Big Data”, its legal risks are real and potentially d...
Attacks on critical information infrastructure are increasing in volume and sophistication with dest...
Human rights are individual privacy that must or must be protected by the state and recognized inter...
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer n...