A novel multi-stage approach for hierarchical intrusion detection M Verkerken, L D’hooge, D Sudyana, YD Lin, T Wauters, B Volckaert, ... IEEE Transactions on Network and Service Management 20 (3), 3915-3929, 2023 | 22 | 2023 |
Analysis of Security Awareness in using Technology and Social Media at Muhammadiyah University of Riau S Soni, A Hafid, D Sudyana International Journal of Computer Applications 975, 8887, 2019 | 20 | 2019 |
Optimalisasi Penggunaan VirtualBox Sebagai Virtual Computer Laboratory untuk Simulasi Jaringan dan Praktikum pada SMK Taruna Mandiri Pekanbaru MK ANam, D Sudyana, AN Ulfah, N Lizarti J-PEMAS-Jurnal Pengabdian Masyarakat 1 (2), 39-44, 2020 | 13 | 2020 |
Analysis and Evaluation Digital Forensic Investigation Framework using ISO 27037: 2012 D Sudyana, Y Prayudi, B Sugiantoro International Journal of Cyber-Security and Digital Forensics (IJCSDF) 8 (1 …, 2019 | 13 | 2019 |
Pelatihan secure computer user untuk meningkatkan kesadaran siswa terhadap keamanan data dan informasi AN Ulfah, N Lizarti, MK Anam, D Sudyana, H Asnal J-PEMAS-Jurnal Pengabdian Masyarakat 2 (1), 17-24, 2021 | 12 | 2021 |
Belajar Mengenali Forensika Digital D Sudyana Diandra Creative 1, 125, 2016 | 12 | 2016 |
Instrumen Evaluasi Framework Investigasi Forensik Digital Menggunakan SNI 27037:2014 D Sudyana, B Sugiantoro, A Luthfi JURNAL INFORMATIKA SUNAN KALIJAGA 1 (2), 75-83, 2016 | 12 | 2016 |
Server Virtualization Acquisition Using Live Forensics Method S Soni, Y Prayudi, B Sugiantoro, D Sudyana, H Mukhtar International Conference of CELSciTech 2019-Science and Technology track …, 2019 | 9 | 2019 |
Analisis Kesadaran Mahasiswa UMRI Terkait Penggunaan Teknologi & Media Sosial Terhadap Bahaya Cyber Crime S Soni, A Hafid, D Sudyana JURNAL FASILKOM 9 (3), 28-34, 2019 | 8 | 2019 |
Virtualisasi Server dengan Proxmox untuk Pengoptimalisasian Penggunaan Resource Server pada Upt Teknologi dan Komunikasi Pendidikan D Sudyana, E Ali Sains dan Teknologi Informasi 3 (2), 99-106, 2018 | 8 | 2018 |
Digital evidence acquisition system on iaas cloud computing model using live forensic method D Sudyana, L Nora Scientific Journal of Informatics 6 (1), 2019 | 7 | 2019 |
Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037 : 2014 D Sudyana, RT Putra, Soni Sinkron - Journal Publications & Informatics Engineering Research 3 (2), 67-72, 2019 | 6 | 2019 |
Task assignment and capacity allocation for ml-based intrusion detection as a service in a multi-tier architecture YC Lai, D Sudyana, YD Lin, M Verkerken, L D’hooge, T Wauters, ... IEEE Transactions on Network and Service Management 20 (1), 672-683, 2022 | 5 | 2022 |
Forensic Investigation Framework on Server Side of Private Cloud Computing D Sudyana, N Lizarti, E Erlin Lontar Komputer: Jurnal Ilmiah Teknologi Informasi 10 (3), 181-192, 2019 | 5 | 2019 |
Etika Dan Profesionalisme Saksi Ahli Forensik D Sudyana, S Soni Jurnal CoSciTech (Computer Science and Information Technology) 1 (1), 13-20, 2020 | 4 | 2020 |
Etika dan profesionalisme saksi ahli D Sudyana, HD Utami Yogyakarta: Universitas Islam Indonesia, 2015 | 4 | 2015 |
Machine Learning Based Intrusion Detection as a Service: Task Assignment and Capacity Allocation in a Multi-Tier Architecture YC Lai, D Sudyana, YD Lin, M Verkerken, L D'hooge, T Wauters, ... Proceedings of the 14th IEEE/ACM International Conference on Utility and …, 2021 | 3 | 2021 |
Virtualization Technology for Optimizing Server Resource Usage E Ali, D Sudyana International Conference on Engineering and Technology Development (ICETD), 2014 | 2 | 2014 |
Artificial Intelligence for Internet of Things as a Service: Small or Big Data, Private or Public Model, Centralized or Federated Learning? YD Lin, YC Lai, D Sudyana, RH Hwang Computer 56 (12), 65-79, 2023 | 1 | 2023 |
ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions YD Lin, JH Pratama, D Sudyana, YC Lai, RH Hwang, PC Lin, HY Lin, ... Journal of Information Security and Applications 71, 103348, 2022 | 1 | 2022 |