Tri Wanda Septian
Cited by
Cited by
Payload recognition and detection of Cross Site Scripting attack
MR Zalbina, TW Septian, D Stiawan, MY Idris, A Heryanto, R Budiarto
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 172-176, 2017
Real Time Environmental Monitoring in Palm Oil Plantation Using Wireless Sensor Network
RF Malik, M Hafiz, A Nopransyah, MR Zalbina, TW Septian
2nd International Conference on Electrical Engineering, Computer Science and …, 2015
Analysis of custody transfer on moving bundle protocol of wireless router in delay tolerant network (DTN)
F Noviani, D Stiawan, SD Siswanti, TW Septian, MA Riyadi, F Aljaber, ...
2017 4th International Conference on Information Technology, Computer, and …, 2017
Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method
D Stiawan
Kohat University of Science and Technology, 2019
Denial of service attack visualization with clustering using K-means algorithm
NA Putri, D Stiawan, A Heryanto, TW Septian, L Siregar, R Budiarto
2017 International Conference on Electrical Engineering and Computer Science …, 2017
Intrusion Prevention in Heterogeneous System based on Behavior Approaches
D Stiawan, AF Oklilas, A Heryanto, TW Septian, R Budiarto
Analysis WhatsApp Forensic and Visualization in Android Smartphone with Support Vector Machine (SVM) Method
D Stiawan, TW Septian, RF Malik, A Heriyanto, R Budiarto
Journal of Physics: Conference Series 1196 (1), 012064, 2019
Integrasi Wireless Sensor Network Pada Sistem Tertanam Menggunakan Metode Proxy Agent Layer
H Ahmad, N Siti, S Triwanda, F Ricy
The system can't perform the operation now. Try again later.
Articles 1–8