咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 信息与通信工程
    • 1 篇 计算机科学与技术...
    • 1 篇 软件工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 2 篇 fake news
  • 2 篇 network security
  • 2 篇 accuracy
  • 1 篇 surveys
  • 1 篇 scalability
  • 1 篇 approximation al...
  • 1 篇 deep learning
  • 1 篇 informatics
  • 1 篇 natural language...
  • 1 篇 videos
  • 1 篇 computer securit...
  • 1 篇 optimization
  • 1 篇 real-time system...
  • 1 篇 pandemics
  • 1 篇 home automation
  • 1 篇 social networkin...
  • 1 篇 performance eval...
  • 1 篇 organizations
  • 1 篇 testing
  • 1 篇 data visualizati...

机构

  • 2 篇 cyber security e...
  • 1 篇 faculty of infor...
  • 1 篇 college of compu...
  • 1 篇 cyber security e...
  • 1 篇 department of in...
  • 1 篇 the informatic s...
  • 1 篇 department of in...
  • 1 篇 information syst...
  • 1 篇 department of cy...
  • 1 篇 department of in...
  • 1 篇 center for cyber...

作者

  • 2 篇 dinar ajeng kris...
  • 2 篇 irmawati
  • 2 篇 david agustriawa...
  • 1 篇 shahrin sahib
  • 1 篇 eka hero ramadha...
  • 1 篇 p.m. winarno
  • 1 篇 mohd faizal abdo...
  • 1 篇 sunaringtyas sep...
  • 1 篇 yusuf durachman
  • 1 篇 rivo juicer wowo...
  • 1 篇 roshayu mohamad
  • 1 篇 febrian rachmad ...
  • 1 篇 sy.yuliani yakub
  • 1 篇 candra kurniawan
  • 1 篇 septia ulfa suna...
  • 1 篇 rosilah hassan
  • 1 篇 amiruddin amirud...
  • 1 篇 sy. yuliani yaku...
  • 1 篇 mohammed nasser ...
  • 1 篇 randy zahran raz...

语言

  • 5 篇 英文
检索条件"机构=Cyber Security Engineering Study Program"
5 条 记 录,以下是1-10 订阅
排序:
Design an Intrusion Detection System, Multiple Honeypot and Packet Analyzer Using Raspberry Pi 4 for Home Network  17
Design an Intrusion Detection System, Multiple Honeypot and ...
收藏 引用
17th International Conference on Quality in Research, QIR 2021: International Symposium on Electrical and Computer engineering
作者: Hariawan, Febrian Rachmad Sunaringtyas, Septia Ulfa Cyber Security Engineering Study Program Politeknik Siber dan Sandi Negara Bogor Indonesia
Increased crime and cyber-attacks make network security an essential prerequisite for organizations. However, organizations cannot guarantee this because the COVID-19 pandemic has forced organizations to suspend activ... 详细信息
来源: 评论
Deep Learning for cyber security: Deephoax Detection
Deep Learning for Cyber Security: Deephoax Detection
收藏 引用
Advanced Innovations in Smart Cities (ICAISC), International Conference on
作者: SY. Yuliani Yakub Rivo Juicer Wowor David Agustriawan Irmawati Dinar Ajeng Kristiyanti P.M. Winarno Rosilah Hassan Roshayu Mohamad Randy Zahran Razzaq Department of Informatics Universitas Multimedia Nusantara Tangerang Indonesia Information System Study Program Universitas Multimedia Nusantara Tangerang Indonesia Center for Cyber Security (CYBER) Universiti Kebangsaan Malaysia Selangor Malaysia College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia Department of Informatics UIN Sultan Maulana Hasanuddin Banten Indonesia
The increasing prevalence of deep hoaxes, such as fake news and phishing schemes, poses a significant threat to cybersecurity, undermining trust and spreading misinformation. In Indonesia, surveys indicate that more t... 详细信息
来源: 评论
Design an Intrusion Detection System, Multiple Honeypot and Packet Analyzer Using Raspberry Pi 4 for Home Network
Design an Intrusion Detection System, Multiple Honeypot and ...
收藏 引用
International Conference on QiR (Quality in Research)
作者: Febrian Rachmad Hariawan Septia Ulfa Sunaringtyas Cyber Security Engineering Study Program Politeknik Siber dan Sandi Negara Bogor Indonesia
Increased crime and cyber-attacks make network security an essential prerequisite for organizations. However, organizations cannot guarantee this because the COVID-19 pandemic has forced organizations to suspend activ... 详细信息
来源: 评论
cyber security for Hoax News Detection with Similarity Algorithm
Cyber Security for Hoax News Detection with Similarity Algor...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Sy.Yuliani Yakub David Agustriawan Irmawati Dinar Ajeng Kristiyanti Shahrin Sahib Mohd Faizal Abdollah Mohammed Nasser Al-Mhiqani Yusuf Durachman The Informatic Study Program Faculty of Engineering and Informatics Universitas Multimedia Nusantara Tangerang Indonesia Faculty of Information Communication Technology Universiti Teknikal Malaysia Melaka Melaka Malaysia Department of Cyber Security University of Huddersfield United Kingdom Department of Information System State Islamic University of Syarif Hidayatullah Jakarta Jakarta Indonesia
Hoax news is false information disseminated to deceive or mislead audiences, often with the aim of swaying opinions or creating confusion. The rise of social media has amplified the spread of hoax news, particularly i... 详细信息
来源: 评论
Learning the Basic Strcuture of Several Ransomwares Using Static Analysis Tecgnique
收藏 引用
IOP Conference Series: Materials Science and engineering 2020年 第1期1007卷
作者: Amiruddin Amiruddin Candra Kurniawan Eka Hero Ramadhani Julio Rinaldi Cyber Security Engineering Study Program Politeknik Siber dan Sandi Negara
The ransomware can encrypt the files on the victim's device and then offer a keyword to decrypt them with a ransom of money. Information about the basic structure of ransomware is needed so that an antivirus can d...
来源: 评论