photo
photo

AHMAD HERYANTO

Sistem Komputer

NIDN/NIDK : 0022018703

Lektor

AHMAD HERYANTO

Sistem Komputer

NIDN/NIDK : 0022018703

Lektor

H-INDEX

WoS H-Index : 0

Scopus H-Index : 6

Google H-Index : 8

H-INDEX

WoS H-Index : 0

Scopus H-Index : 6

Google H-Index : 8

Scopus Documents

Total : 11

Q2
An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection
Authors : AHMAD HERYANTO
Citation : 5
Cover Date : 2023-01-01
Type Doc : Journal
Publication Name : Computer Systems Science and Engineering
ISSN : 02676192
DOI : 10.32604/csse.2023.034047
-
Cyberattack Feature Selection using Correlation-Based Feature Selection Method in an Intrusion Detection System
Authors : AHMAD HERYANTO
Citation : 3
Cover Date : 2022-01-01
Type Doc : Conference Proceeding
Publication Name : International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)
ISSN : 2407439X
DOI : 10.23919/EECSI56542.2022.9946449
Q3
Ransomware detection based on opcode behaviour using k-nearest neighbours algorithm
Authors : AHMAD HERYANTO
Citation : 8
Cover Date : 2021-09-24
Type Doc : Journal
Publication Name : Information Technology and Control
ISSN : 1392124X
DOI : 10.5755/j01.itc.50.3.25816
Q1
An Approach for Optimizing Ensemble Intrusion Detection Systems
Authors : AHMAD HERYANTO
Citation : 22
Cover Date : 2021-01-01
Type Doc : Journal
Publication Name : IEEE Access
ISSN :
DOI : 10.1109/ACCESS.2020.3046246
Q3
A malicious URLs detection system using optimization and machine learning classifiers
Authors : AHMAD HERYANTO
Citation : 11
Cover Date : 2020-01-01
Type Doc : Journal
Publication Name : Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752
DOI : 10.11591/ijeecs.v17.i3.pp1210-1214
Q3
Network anomaly detection research: A survey
Authors : AHMAD HERYANTO
Citation : 19
Cover Date : 2019-03-01
Type Doc : Journal
Publication Name : Indonesian Journal of Electrical Engineering and Informatics
ISSN :
DOI : 10.11591/ijeei.v7i1.773
Q2
Behavior pattern recognition of game Dragon Nest using bloom filter method
Authors : AHMAD HERYANTO
Citation : 1
Cover Date : 2019-01-01
Type Doc : Journal
Publication Name : International Journal of Communication Networks and Information Security
ISSN : 20760930
DOI :
Q4
TCP FIN flood attack pattern recognition on Internet of Things with rule based signature analysis
Authors : AHMAD HERYANTO
Citation : 6
Cover Date : 2019-01-01
Type Doc : Journal
Publication Name : International journal of online and biomedical engineering
ISSN :
DOI : 10.3991/ijoe.v15i07.9848
Q2
Proposal of the S-score for measuring the performance of researchers, institutions, and journals in Indonesia
Authors : AHMAD HERYANTO
Citation : 12
Cover Date : 2018-01-01
Type Doc : Journal
Publication Name : Science Editing
ISSN : 22888063
DOI : 10.6087/KCSE.138
-
Payload recognition and detection of Cross Site Scripting attack
Authors : AHMAD HERYANTO
Citation : 6
Cover Date : 2017-04-19
Type Doc : Conference Proceeding
Publication Name : 2017 2nd International Conference on Anti-Cyber Crimes, ICACC 2017
ISSN :
DOI : 10.1109/Anti-Cybercrime.2017.7905285