Tridharma

(Journal Internasional)

  1.  Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdullah, Fahad Aljaber, Rahmat Budiarto. 2017. Cyber-Attack Penetration Test and Vulnerability Analysis. International Journal of Online Engineering. Vol 13, No 01 (2017) pp 125-132
  2. Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdulah, Rahmat Budiarto, Mohammed AlQurashi. 2016. Penetration Testing and Mitigation of Windows Server VulnerabilitiesInternational Journal of Network Security. Vol.18, No.3, PP.501-513
  3. Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdulah. 2015.Penetration Testing and Network Auditing: LinuxJournal of Information Processing Systems Vol 11 (1) pp. 104-115. Indexing in SCOPUS.
  4. Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdulah, 2013. Threat and Vulnerability Penetration Testing: Linux. Journal of Internet Technology (IF = 0.481). Vol 15 (3) pp. 333-342.
  5. Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdulah, “Attack and Vulnerability Penetration Testing: FreeBSD” . TELKOMNIKA. Vol 11, No 2 June 2013, pp. 399-408.
  6. Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdulah, “Heterogeneous Parameters for Accuracy Threat“. Journal of Theoretical and Applied Information Technology. Indexing in SCOPUS. Vol 33 Issue 2, 2011.
  7. Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdulah, “Survey on Heterogeneous Data for Recognizing Threat” . Journal of Computational Information Systems. Vol 7: 12 (2011). pp: 4212-4224. Indexing bySCOPUS & IF 0.252
  8. Deris Stiawan, Ala’Yaseen Ibrahim Shakhatreh., Mohd. Yazid Idris., Kamarulnizam Abu Bakar.,  Abdul Hanan Abdulah. “Intrusion Prevention System: A Survey“. Journal of Theoretical and Applied Information Technology.  Vol 40 No 1 (2012), pp. 44-54. Indexing in SCOPUS
  9. Deris Stiawan, Abdul Hanan Abdulah, Mohd. Yazid Idris, “Characterising Network Intrusion Prevention System” Accepted in International Journal of Computer Application. Volume 14 (1) Januari 2011, pp. 11–18.
  10. Deris Stiawan, Abdul Hanan Abdulah, Mohd. Yazid Idris, “Classification of Habitual Activity in Behavior-based Network Detection“, Accepted in Journal of Computing. Volume 2, Issue 8, August 2010.
  11. Deris Stiawan, Abdul Hanan Abdulah, Mohd. Yazid Idris , “The Prevention Threat of Behavior-based Signature using Pitcher Flow Architecture“, International Journal of Computer Science & Network Security (IJCSNS). Vol. 10  No. 4  pp. 289-294

Book Chapter

  1. Adil Fahad Alharthi, Mohammed Alzahrani, Deris Stiawan, Ismat Aldmour, Muhammad Fermi Pasha, Rahmat Budiarto,” Powering the Internet of Things With 5G Networks” Chapter : Smart Real-Time Internet-of-Things Network Monitoring System,  IGI-Global
  2. Zohair Ihsan, Mohd. Yazid Idris, Khalid Husain, Deris Stiawan,Protocol Share Based Traffic Rate Analysis (PSBTRA) for UDP Bandwidth Attack” . Communications in Computer and Information Science (CCIS) Series of Springer. The International Conference on Informatics Engineering & Information Science (ICIEIS2011)

(Proceeding International / Indexing)

  1. Deris Stiawan, S. Sandra, E. Alzahrani, and R. Budiarto, “Comparative analysis of K-Means method and Naive Bayes method for brute force attack visualization,” in 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017, pp. 177-182.
  2. Deris Stiawan, Mohd. Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Rahmat Budiarto, ”Anomaly Detection and Monitoring in Internet of Things Communication”,  International Conference on Information Technology & Electrical Engineering  (ICITEE). October 5, 2016.
  3. Deris Stiawan, Ahmad Fali Oklilas, Ahmad Heryanto, Tri Wanda Septian, Rahmat Budiarto,”Intrusion Prevention in Heteregeneous System based on Behavior Approaches”,  International Conference on Science in Information Technology (ICSITech 2015). October 27,2015.
  4. Deris Stiawan, Abdul Hanan Abdulah, Mohd. Yazid Idris,” Research on Heteregeneous Data for Recognizing Threat“. International Conference on Software & Data Technologies (ICSOFT), Spain.  Seville, Spain on 18-20 July 2011. Indexing in Thomson Reuters CPCI, INSPEC, DBLP and EI.
  5. Deris Stiawan, Abdul Hanan Abdulah, Mohd. Yazid Idris, “Research on Event Parameters for Accuracy Detection and  Prevention System“, International Conference on Future Networks (ICFN 2011). 27-28 August 2011 in Qingdao, China. September 2011.
  6. Deris Stiawan, Abdul Hanan Abdulah, Mohd. Yazid Idris, “Pitcher Flow: Unified Integration for Intrusion Prevention System“. International Conference on Computer Communication and Management – ICCCM 2011. Sydney, Australia. Will be held on 2-4 May 2011 & ready publishing Indexing in ISI / SCOPUS / EI in June 2011.
  7. Deris Stiawan, Abdul Hanan Abdulah, Mohd. Yazid Idris, ”Classification of Habitual Activity in Behavior-based Detection“, IEEE Conference, The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010) London,UK
  8. Deris Stiawan, Abdul Hanan Abdulah, Mohd. Yazid Idris, “Accuracy and Precision in Behavior-based approach for Intrusion Prevention System: Research on progress“, The 2nd International Conference on Multimedia Information Networking and Security (MINES 2010), Nanjing, China.
  9. Deris Stiawan, Abdul Hanan Abdulah, Mohd. Yazid Idris, “The Trends of Intrusion Prevention System Network“, International Conference on Education Technology and Computer (ICETC 2010) in Shanghai,China.  Published in IEEE Xplore (IEEE Catalog Number: CFP1052G-PRT) , and indexed by Ei Compendex, ISTP and Scopus.
  10. Deris Stiawan, Abdul Hanan Abdulah, Mohd. Yazid Idris, “Reliability Measurement of Internet Services“, Submitted to International Conference on Green Computer 2010, Indonesia
  11. Dian Palupi Rini, Deris Stiawan “Study On Solution Web Hosting Selection : Outsourcing or Inhouse “,Submitted to 5th International Conference on Information & Communication Technology and Systems (ICTS) 2009, ITS Surabaya
  12. Deris Stiawan, Dian Palupi Rini, “ The Study of IT Security Policy Procedures Implementation on the Enterprise Computer Network“(submitted to Proceeding Journal International Industrial Informatics Seminar 2009) Universitas Islam Negeri Jogyakarta

(Kolaborasi Naskah Ilmiah)

  1. M. R. Zalbina, T. W. Septian, D. Stiawan, M. Y. Idris, A. Heryanto, and R. Budiarto, “Payload recognition and detection of Cross Site Scripting attack,” in 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 2017, pp. 172-176.
  2. Z Eskandari, SA Hosseini Seno, D Stiawan, B Kerim, R Budiarto, Energy-Aware Optimal Clustering in Wireless Sensor Network Using Integer/Linear Programming. International Conference on Information Technology & Electrical Engineering  (ICITEE). October 5, 2016
  3. Sutikno, T., Handayani. L., Stiawan, D., Subroto, I.M.I., 2016, “WhatsApp, Viber and Telegram which is Best for Instant Messaging?” .International Journal of Electrical and Computer Engineering ( IJECE)
  4. Rahardjo, B., Stiawan, D., 2015. Optimal Clustering in Wireless Sensor Network Using Integer/Linear Programming. NETAPPS2015
  5. Dadkhah, M., Sutikno, T., Jazi, M.D., Stiawan, D. 2015, “An introduction to journal phishings and their detection approach”. TELKOMNIKA 13 (2), pp. 373-380
  6. Sutikno, T., Stiawan, D., Subroto, I.M.I., 2015, “Fortifying big data infrastructures to face security and privacy issues”, TELKOMNIKA 12 (4), pp. 751-752
  7. Subroto, I.M.I., Sutikno, T., Stiawan, D.2014, “The architecture of indonesian publication index: A major indonesian academic database”. TELKOMNIKA 12 (1), pp. 1-5