default search action
IWBIS 2017: Jakarta, Indonesia
- International Workshop on Big Data and Information Security, IWBIS 2017, Jakarta, Indonesia, September 23-24, 2017. IEEE 2017, ISBN 978-1-5386-2038-0
- Hironori Washizaki:
Security patterns: Research direction, metamodel, application and verification. 1-4 - Kwangjo Kim, Muhamad Erza Aminanto:
Deep learning in intrusion detection perspective: Overview and further challenges. 5-10 - Tsukasa Hirashima, Ahmad Afif Supianto, Yusuke Hayashi:
Model-based approach for educational big data analysis of learners thinking with process data. 11-16 - Setia Pramana, Budi Yuniarto, Robert Kurniawan, Ricky Yordani, Jong Gun Lee, Imaduddin Amin, P. P. Ni Luh Putu Satyaning, Yulistina Riyadi, Atika Nashirah Hasyyati, Rina Indriani:
Big data for government policy: Potential implementations of bigdata for official statistics in Indonesia. 17-21 - Yohanes Gultom, Wahyu Catur Wibowo:
Automatic open domain information extraction from Indonesian text. 23-30 - Ari Wibisono, Machmud Roby Alhamidi, Adi Nurhadiyatna, Wisnu Jatmiko:
Hyperbolic tangent activation function on FIMT-DD algorithm analysis for airline big data. 31-36 - Machmud Roby Alhamidi, Ito Wasito:
Improved microarray images cancer classification using k-nearest neighbor with canonical Particle Swarm Optimization. 37-42 - Setiadi Yazid, Ana Uluwiyah:
Improving data quality through big data: Case study on big data-mobile positioning data in Indonesia tourism statistics. 43-48 - Dentiy, I. Putu Medagia Atmaja, Ari Saptawijaya, Siti Aminah:
Implementation of change data capture in ETL process for data warehouse using HDFS and apache spark. 49-55 - Raditya Herwando, Meganingrum Arista Jiwanggi, Mirna Adriani:
Medical entity recognition using conditional random field (CRF). 57-62 - Dewa Made Sri Arsa, M. Anwar Ma'sum, Muhammad Febrian Rachmadi, Wisnu Jatmiko:
Optimization of Stacked Unsupervised Extreme Learning Machine to improve classifier performance. 63-68 - Yulistiyan Wardhana, H. S. Putra, S. I. Sakinah, Wisnu Jatmiko, Petrus Mursanto, Prahesa Kusuma Setia:
Block and booth floating point number multiplication algorithms in FPGA's generalized learning vector quantization implementation. 69-75 - M. Anwar Ma'sum, Dewa Made Sri Arsa, Novian Habibie, Wisnu Jatmiko:
Enhance generalized learning vector quantization using unsupervised extreme learning machine and intelligent K-means clustering. 77-83 - Valdi Rachman, M. Anwar Ma'sum:
Comparative analysis of ant colony extended and mix-min ant system in software project scheduling problem. 85-91 - Muhamad Soleh, Grafika Jati, Ananto Tri Sasongko, Wisnu Jatmiko, Muhammad Hafizhuddin Hilman:
A real time vehicle counting based on adaptive tracking approach for highway videos. 93-98 - Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja, Paul D. Yoo, Kwangjo Kim:
Wi-Fi intrusion detection using weighted-feature selection for neural networks classifier. 99-104 - Kouichi Sakurai, Takashi Nishide, Amril Syalim:
Improved proxy re-encryption scheme for symmetric key cryptography. 105-111 - Puspita Kencana Sari, Adhi Prasetio:
Knowledge sharing and electronic word of mouth to promote information security awareness in social network site. 113-117 - M. T. Kurniawan, Setiadi Yazid:
Mitigation strategy of sinkhole attack in Wireless Sensor Network. 119-125 - Petrus Mursanto, Erwin Oky Sutjonong:
Rijndael cipher optimization using low complexity serial multiplier based on Karatsuba technology. 127-132 - Amril Syalim, Kouichi Sakurai:
How to sign multiple versions of digital documents. 133-136 - Bayu Anggorojati, Ramjee Prasad:
Securing communication in inter domains Internet of Things using identity-based cryptography. 137-142 - Abidzar Gifari, Bayu Anggorojati, Setiadi Yazid:
On preventing bitcoin transaction from money laundering in Indonesia: Analysis and recommendation on regulations. 143-148 - Rifki Nurfaiz, Bintang Wibowo, Gladhi Guarddin, Petrus Mursanto:
Low power wireless network for efficient peatland monitoring system. 149-154 - Grafika Jati, Ardina Rizqy Rachmasari, Wisnu Jatmiko, Petrus Mursanto, Wahju Sediono:
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm. 155-160
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.