Rahmat Budiarto

Orcid: 0000-0002-6374-4731

According to our database1, Rahmat Budiarto authored at least 59 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection.
Comput. Syst. Sci. Eng., 2023

Efficient-Cost Task Offloading Scheme in Fog-Internet of Vehicle Networks.
Comput. Syst. Sci. Eng., 2023

WormGPT: A Large Language Model Chatbot for Criminals.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
Improvement of attack detection performance on the internet of things with PSO-search and random forest.
J. Comput. Sci., 2022

Bibliometric analysis of spatio-temporal model using a general product-sum based on a hydrological distance.
Frontiers Appl. Math. Stat., 2022

An Improved Robust Misbehavior Detection Scheme for Vehicular Ad Hoc Network.
IEEE Access, 2022

Analysis of Waste Transportation Volume in Jakarta Province using Linear Regression and Random Forest Regression.
Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry, 2022

Analysis of Tuberculosis Disease Spreading Pattern in Muara Enim District using KNN Algorithm.
Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry, 2022

2021
Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm.
Inf. Technol. Control., 2021

Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network.
IEEE Access, 2021

An Approach for Optimizing Ensemble Intrusion Detection Systems.
IEEE Access, 2021

Developing Software Signature Search Engines Using Paragraph Vector Model: A Triage Approach for Digital Forensics.
IEEE Access, 2021

Cost-Effective Survivable Controller Placement in Software-Defined Networks.
IEEE Access, 2021

An Enhanced Quality of Service-Based Trust Model for Cloud Computing.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
Towards Social Capital in a Network Organization: A Conceptual Model and an Empirical Approach.
Entropy, 2020

CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection.
IEEE Access, 2020

Evaluating Trust Prediction and Confusion Matrix Measures for Web Services Ranking.
IEEE Access, 2020

2019
Investigating Brute Force Attack Patterns in IoT Network.
J. Electr. Comput. Eng., 2019

TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis.
Int. J. Online Biomed. Eng., 2019

Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method.
Int. J. Commun. Networks Inf. Secur., 2019

A Measurement of Social Capital in an Open Source Software Project.
CoRR, 2019

2017
Cyber-Attack Penetration Test and Vulnerability Analysis.
Int. J. Online Eng., 2017

2016
Penetration Testing and Mitigation of Vulnerabilities Windows Server.
Int. J. Netw. Secur., 2016

2015
A gene-regulated nested neural network.
Int. Arab J. Inf. Technol., 2015

Incorporating R&D Activities Into Computer Engineering Teaching & Learning Program in Albaha University.
Proceedings of the 2015 International Conference on Learning and Teaching in Computing and Engineering, 2015

Teaching and Learning Computer Science at Al Baha University, Saudi Arabia: Insights from a Staff Development Course.
Proceedings of the 2015 International Conference on Learning and Teaching in Computing and Engineering, 2015

2014
A fast inter-domain network-based IP mobility scheme for urban areas.
J. Commun. Networks, 2014

Provisioning virtual IPTV delivery networks using hybrid genetic algorithm.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

2013
Flowgraph models for estimating total time of authentication process in RFID system.
J. Frankl. Inst., 2013

Wireless Communication Technologies for Vehicular Nodes: A Survey.
Int. J. Mob. Comput. Multim. Commun., 2013

Fuzzy Based Diagnostics System for Identifying Network Traffic Flow Anomalies
CoRR, 2013

A Hybrid Rule Based Fuzzy-Neural Expert System For Passive Network Monitoring
CoRR, 2013

Holistic network selection using dynamic weights to achieve personalized ABC.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013

2012
Holistic network selection for wireless mobile nodes in a 4G environment.
Proceedings of the 18th Asia-Pacific Conference on Communications, 2012

2011
A note on the security of PAP.
Comput. Commun., 2011

EMS-MAC: Energy Efficient Contention-Based Medium Access Control Protocol for Mobile Sensor Networks.
Comput. J., 2011

A routing layer-based hierarchical service advertisement and discovery for MANETs.
Ad Hoc Networks, 2011

Machine Loading Optimization in Flexible Manufacturing System Using a Hybrid of Bio-inspired and Musical-Composition Approach.
Proceedings of the Sixth International Conference on Bio-Inspired Computing: Theories and Applications, 2011

A comparative study of short range wireless sensor network on high density networks.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

A comparative performance evaluation of inter-domain network-based IP mobility solutions.
Proceedings of the AINTEC '11, Asian Internet Engineering Conference, Bangkok, Thailand, November 09, 2011

2010
Management of Energy Consumption on Cluster Based Routing Protocol for MANET.
IEICE Trans. Inf. Syst., 2010

A Fuzzy Inference System Approach for Knowledge Management Tools Evaluation.
Proceedings of the 12th UKSim, 2010

Scalable network controlled handover with aggregated binding scheme in IP-based cellular networks.
Proceedings of the AINTEC '10, 2010

2009
A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model.
Proceedings of the 2009 International Conference on Signal Acquisition and Processing, 2009

Evaluating the Best of Knowledge Management Technology for Small Medium Enterprise Based on Fuzzy Analytic Hierarchy Process.
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009

Priority-based QoS mechanism for multiple multicast IPTV streams.
Proceedings of the AINTEC '09, 2009

Transformation of Spatial Data Format for Interoperability between GIS Applications.
Proceedings of the Sixth International Conference on Computer Graphics, 2009

2008
A Sequential Hierarchical Superset Implementation of Neocortex Memory System and its Case Study of Automated Network Forensic Analysis.
Proceedings of the 2008 International Conference on Artificial Intelligence, 2008

2007
Unidirectional Lightweight Encapsulation with Header Compression for IP Based Satellite Communication over DVB-S.
Proceedings of the Sustainable Internet, Third Asian Internet Engineering Conference, 2007

2006
Honeynet in network security using multi-layer data control and data capture mechanisms.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2006

2005
EFIS: Evolvable-Neural-Based Fuzzy Inference System and Its Application for Adaptive Network Anomaly Detection.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

Adaptive real-time network monitoring system detecting anomalous activity with evolving connectionist system.
Proceedings of the ICETE 2005, 2005

Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist System.
Proceedings of the E-business and Telecommunication Networks, 2005

Load Balancing QoS Multicast Routing Protocol in Mobile Ad Hoc Networks.
Proceedings of the Technologies for Advanced Heterogeneous Networks, 2005

2004
Comic Image Decomposition for Reading Comics on Cellular Phones.
IEICE Trans. Inf. Syst., 2004

2003
An intelligent method for processing string in 3-D based on its minimum energy.
Neural Parallel Sci. Comput., 2003

Satellite Bandwidth Requirements for an MCS Based Multimedia Conference.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

Secure Groups Communication Using Mobile Agents Technologies.
Proceedings of the 3th International Conference on IT in Asia, 2003

1997
A 3-D string figure display system for animating cat's cradle game.
Proceedings of the 5th Pacific Conference on Computer Graphics and Applications, 1997


  Loading...