default search action
Rahmat Budiarto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]M. Agus Syamsul Arifin, Deris Stiawan, Bhakti Yudho Suprapto, Susanto, Tasmi Salim, Mohd Yazid Idris, Mohamed Shenify, Rahmat Budiarto:
A Novel Dataset for Experimentation With Intrusion Detection Systems in SCADA Networks Using IEC 60870-5-104 Standard. IEEE Access 12: 170553-170569 (2024) - [j29]M. Agus Syamsul Arifin, Deris Stiawan, Bhakti Yudho Suprapto, Susanto, Tasmi Salim, Mohd Yazid Idris, Rahmat Budiarto:
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104. IET Cyper-Phys. Syst.: Theory & Appl. 9(3): 282-292 (2024) - 2023
- [j28]Alla Abbas Khadir, Seyed-Amin Hosseini-Seno, Baydaa Fadhil Dhahir, Rahmat Budiarto:
Efficient-Cost Task Offloading Scheme in Fog-Internet of Vehicle Networks. Comput. Syst. Sci. Eng. 45(2): 2223-2234 (2023) - [j27]Deris Stiawan, Ali Bardadi, Nurul Afifah, Lisa Melinda, Ahmad Heryanto, Tri Wanda Septian, Mohd Yazid Idris, Imam Much Ibnu Subroto, Lukman, Rahmat Budiarto:
An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection. Comput. Syst. Sci. Eng. 46(2): 1759-1774 (2023) - [c28]Mohamed Fazil Mohamed Firdhous, Walid Elbreiki, Ibrahim Abdullahi, B. H. Sudantha, Rahmat Budiarto:
WormGPT: A Large Language Model Chatbot for Criminals. ACIT 2023: 1-6 - 2022
- [j26]Mohammed Alzahrani, Mohd Yazid Idris, Fuad A. Ghaleb, Rahmat Budiarto:
An Improved Robust Misbehavior Detection Scheme for Vehicular Ad Hoc Network. IEEE Access 10: 111241-111253 (2022) - [j25]Achmad Bachrudin, Budi Nurani Ruchjana, Atje Setiawan Abdullah, Rahmat Budiarto:
Bibliometric analysis of spatio-temporal model using a general product-sum based on a hydrological distance. Frontiers Appl. Math. Stat. 8 (2022) - [j24]Kurniabudi, Deris Stiawan, Darmawijoyo, Mohammad Yazid Bin Idris, Defit Sarjon, Yaya Sudarya Triana, Rahmat Budiarto:
Improvement of attack detection performance on the internet of things with PSO-search and random forest. J. Comput. Sci. 64: 101833 (2022) - [c27]Rahmat Budiarto, Hilwa Lelisa, Yaya Sudarya Triana:
Analysis of Tuberculosis Disease Spreading Pattern in Muara Enim District using KNN Algorithm. ICONETSI 2022: 31:1-31:5 - [c26]Eka Pramudianzah, Yaya Sudarya Triana, Rahmat Budiarto:
Analysis of Waste Transportation Volume in Jakarta Province using Linear Regression and Random Forest Regression. ICONETSI 2022: 58:1-58:8 - 2021
- [j23]Deris Stiawan, Ahmad Heryanto, Ali Bardadi, Dian Palupi Rini, Imam Much Ibnu Subroto, Kurniabudi, Mohammad Yazid Bin Idris, Abdul Hanan Abdullah, Bedine Kerim, Rahmat Budiarto:
An Approach for Optimizing Ensemble Intrusion Detection Systems. IEEE Access 9: 6930-6947 (2021) - [j22]Somayeh Soltani, Seyed-Amin Hosseini-Seno, Rahmat Budiarto:
Developing Software Signature Search Engines Using Paragraph Vector Model: A Triage Approach for Digital Forensics. IEEE Access 9: 55814-55832 (2021) - [j21]Deris Stiawan, Meilinda Eka Suryani, Susanto, Mohd Yazid Idris, Muawya N. Aldalaien, Nizar Alsharif, Rahmat Budiarto:
Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network. IEEE Access 9: 116475-116484 (2021) - [j20]Ali Abdi Seyedkolaei, Seyed-Amin Hosseini-Seno, Ahmad Moradi, Rahmat Budiarto:
Cost-Effective Survivable Controller Placement in Software-Defined Networks. IEEE Access 9: 129130-129140 (2021) - [j19]Deris Stiawan, Somame Morianus Daely, Ahmad Heryanto, Nurul Afifah, Mohd Yazid Idris, Rahmat Budiarto:
Ransomware Detection Based On Opcode Behavior Using K-Nearest Neighbors Algorithm. Inf. Technol. Control. 50(3): 495-506 (2021) - [c25]Mohamed Fazil Mohamed Firdhous, Rahmat Budiarto:
An Enhanced Quality of Service-Based Trust Model for Cloud Computing. ICMC 2021: 525-538 - 2020
- [j18]Muhammad Hasnain, Muhammad Fermi Pasha, Imran Ghani, Muhammad Imran, Mohammed Yahya Alzahrani, Rahmat Budiarto:
Evaluating Trust Prediction and Confusion Matrix Measures for Web Services Ranking. IEEE Access 8: 90847-90861 (2020) - [j17]Kurniabudi, Deris Stiawan, Darmawijoyo, Mohammad Yazid Bin Idris, Alwi M. Bamhdi, Rahmat Budiarto:
CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection. IEEE Access 8: 132911-132921 (2020) - [j16]Saad Alqithami, Rahmat Budiarto, Musaad Alzahrani, Henry Hexmoor:
Towards Social Capital in a Network Organization: A Conceptual Model and an Empirical Approach. Entropy 22(5): 519 (2020)
2010 – 2019
- 2019
- [j15]Deris Stiawan, Diky Aryandi, Ahmad Heryanto, Tri Wanda Septian, Farkhana Binti Muchtar, Mohd Yazid Idris, Rahmat Budiarto:
Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - [j14]Deris Stiawan, Dimas Wahyudi, Ahmad Heryanto, Samsuryadi Samsuryadi, Mohd Yazid Idris, Farkhana Binti Muchtar, Mohammed Abdullah Alzahrani, Rahmat Budiarto:
TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis. Int. J. Online Biomed. Eng. 15(7): 124-139 (2019) - [j13]Deris Stiawan, Mohd Yazid Idris, Reza Firsandaya Malik, Siti Nurmaini, Nizar Alsharif, Rahmat Budiarto:
Investigating Brute Force Attack Patterns in IoT Network. J. Electr. Comput. Eng. 2019: 4568368:1-4568368:13 (2019) - [i3]Saad Alqithami, Musaad Alzahrani, Fahad Alghamdi, Rahmat Budiarto, Henry Hexmoor:
A Measurement of Social Capital in an Open Source Software Project. CoRR abs/1911.10283 (2019) - 2017
- [j12]Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah, Fahad Aljaber, Rahmat Budiarto:
Cyber-Attack Penetration Test and Vulnerability Analysis. Int. J. Online Eng. 13(1): 125-132 (2017) - 2016
- [j11]Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah, Mohammed AlQurashi, Rahmat Budiarto:
Penetration Testing and Mitigation of Vulnerabilities Windows Server. Int. J. Netw. Secur. 18(3): 501-513 (2016) - 2015
- [j10]Romi Rahmat, Muhammad Fermi Pasha, Mohammad Syukur, Rahmat Budiarto:
A gene-regulated nested neural network. Int. Arab J. Inf. Technol. 12(6): 532-539 (2015) - [c24]Anders Berglund, Arnold Pears, Aletta Nylén, Farooq Ahmad, Bader Alghamdi, Khalid Alghamdi, Ahmed Alhabish, Abdullah Aljoufi, Eidah Alzahrani, Rami Alzahrani, Ismat Aldmour, Areej Athama, Hamada Shihab Alsadoon, Rahmat Budiarto, Abdul Hafeez, Nadeem Hassan Daudpota, Dhafer Faiz, Lubna Abdel Kareim Gabralla, Mohammad Gamar, Abdul Hannan, Bedine Kerim, F. A. Mazarbhuiya, Ahmed Rabea, Muhammad Qaiser Saleem, Nimir Saleh, Mohamed Shenify:
Teaching and Learning Computer Science at Al Baha University, Saudi Arabia: Insights from a Staff Development Course. LaTiCE 2015: 1-6 - [c23]Mohamed Shenify, Rahmat Budiarto, Sultan Aljahdali, Hisham M. Alsaghier:
Incorporating R&D Activities Into Computer Engineering Teaching & Learning Program in Albaha University. LaTiCE 2015: 7-8 - 2014
- [j9]Alireza Taghizadeh, Tat Chee Wan, Rahmat Budiarto:
A fast inter-domain network-based IP mobility scheme for urban areas. J. Commun. Networks 16(6): 645-655 (2014) - [c22]Suliman Mohamed Fati, Rahmat Budiarto, Putra Sumari:
Provisioning virtual IPTV delivery networks using hybrid genetic algorithm. ICUIMC 2014: 106:1-106:6 - 2013
- [j8]Vasuky Mohanan, Rahmat Budiarto:
Wireless Communication Technologies for Vehicular Nodes: A Survey. Int. J. Mob. Comput. Multim. Commun. 5(2): 58-77 (2013) - [j7]Aik Theng Tan, Zurinahni Zainol, Rahmat Budiarto:
Flowgraph models for estimating total time of authentication process in RFID system. J. Frankl. Inst. 350(5): 1298-1311 (2013) - [c21]Vasuky Mohanan, Rahmat Budiarto, Mohd Azam Osman:
Holistic network selection using dynamic weights to achieve personalized ABC. APCC 2013: 196-201 - [i2]Azruddin Ahmad, Gobithasan Rudrusamy, Rahmat Budiarto, Azman Samsudin, Sureswaran Ramadass:
A Hybrid Rule Based Fuzzy-Neural Expert System For Passive Network Monitoring. CoRR abs/1304.7843 (2013) - [i1]Gobithasan Rudrusamy, Azrudin Ahmad, Rahmat Budiarto, Azman Samsudin, Sureswaran Ramadass:
Fuzzy Based Diagnostics System for Identifying Network Traffic Flow Anomalies. CoRR abs/1304.7864 (2013) - 2012
- [c20]Vasuky Mohanan, Rahmat Budiarto, Wan Mohd Nazmee Wan Zainon:
Holistic network selection for wireless mobile nodes in a 4G environment. APCC 2012: 53-58 - 2011
- [j6]Seyed-Amin Hosseini-Seno, Rahmat Budiarto, Tat Chee Wan:
A routing layer-based hierarchical service advertisement and discovery for MANETs. Ad Hoc Networks 9(3): 355-367 (2011) - [j5]Mahdi Zareei, Alireza Taghizadeh, Rahmat Budiarto, Tat Chee Wan:
EMS-MAC: Energy Efficient Contention-Based Medium Access Control Protocol for Mobile Sensor Networks. Comput. J. 54(12): 1963-1972 (2011) - [j4]Mu'awya Naser, Pedro Peris-Lopez, Rahmat Budiarto, Benjamín Ramos Álvarez:
A note on the security of PAP. Comput. Commun. 34(18): 2248-2249 (2011) - [c19]Alireza Taghizadeh, Tat Chee Wan, Rahmat Budiarto:
A comparative performance evaluation of inter-domain network-based IP mobility solutions. AINTEC 2011: 136-139 - [c18]Mahdi Zareei, Azar Zarei, Rahmat Budiarto, Mohd. Adib Omar:
A comparative study of short range wireless sensor network on high density networks. APCC 2011: 247-252 - [c17]Umi Kalsom Yusof, Rahmat Budiarto, Ibrahim Venkat, Safaai Deris:
Machine Loading Optimization in Flexible Manufacturing System Using a Hybrid of Bio-inspired and Musical-Composition Approach. BIC-TA 2011: 89-96 - 2010
- [j3]Seyed-Amin Hosseini-Seno, Tat Chee Wan, Rahmat Budiarto, Masashi Yamada:
Management of Energy Consumption on Cluster Based Routing Protocol for MANET. IEICE Trans. Inf. Syst. 93-D(3): 550-559 (2010) - [c16]Alireza Taghizadeh, Tat Chee Wan, Rahmat Budiarto:
Scalable network controlled handover with aggregated binding scheme in IP-based cellular networks. AINTEC 2010: 72-79 - [c15]Ferdinand Murni Hamundu, Rahmat Budiarto:
A Fuzzy Inference System Approach for Knowledge Management Tools Evaluation. UKSim 2010: 305-310
2000 – 2009
- 2009
- [c14]Rahmat Budiarto, Pradeep Isawasan, Maulana Abdul Aziz:
Transformation of Spatial Data Format for Interoperability between GIS Applications. CGIV 2009: 536-539 - [c13]Primantara Hari Trisnawan, Rahmat Budiarto:
Priority-based QoS mechanism for multiple multicast IPTV streams. AINTEC 2009: 19-24 - [c12]Ferdinand Murni Hamundu, Lelyzar Siregar, Rahmat Budiarto:
Evaluating the Best of Knowledge Management Technology for Small Medium Enterprise Based on Fuzzy Analytic Hierarchy Process. Asia International Conference on Modelling and Simulation 2009: 200-205 - [c11]Mu'awya Naser, Mohammad Al Majaly, Muhammad Rafie, Rahmat Budiarto:
A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model. ICSAP 2009: 103-107 - 2008
- [c10]Muhammad Fermi Pasha, Rahmat Budiarto, Sureswaran Ramadass, Mohammad Syukur:
A Sequential Hierarchical Superset Implementation of Neocortex Memory System and its Case Study of Automated Network Forensic Analysis. IC-AI 2008: 490-495 - 2007
- [c9]Chee-Hong Teh, Tat Chee Wan, Rahmat Budiarto, Way-Chuang Ang:
Unidirectional Lightweight Encapsulation with Header Compression for IP Based Satellite Communication over DVB-S. AINTEC 2007: 99-113 - 2006
- [c8]Ong Chin Joo, Rahmat Budiarto, Gian Chand Sodhy:
Honeynet in network security using multi-layer data control and data capture mechanisms. Communications and Computer Networks 2006: 114-119 - 2005
- [c7]Mohammed Saghir, Tat Chee Wan, Rahmat Budiarto:
Load Balancing QoS Multicast Routing Protocol in Mobile Ad Hoc Networks. AINTEC 2005: 83-97 - [c6]Muhammad Fermi Pasha, Rahmat Budiarto, Mohammad Syukur, Masashi Yamada:
Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist System. ICETE (Selected Papers) 2005: 113-125 - [c5]Muhammad Fermi Pasha, Rahmat Budiarto, Masashi Yamada:
Adaptive real-time network monitoring system detecting anomalous activity with evolving connectionist system. ICETE 2005: 201-209 - [c4]Muhammad Fermi Pasha, Rahmat Budiarto, Mohammad Syukur, Masashi Yamada:
EFIS: Evolvable-Neural-Based Fuzzy Inference System and Its Application for Adaptive Network Anomaly Detection. ICMLC 2005: 662-671 - 2004
- [j2]Masashi Yamada, Rahmat Budiarto, Mamoru Endo, Shinya Miyazaki:
Comic Image Decomposition for Reading Comics on Cellular Phones. IEICE Trans. Inf. Syst. 87-D(6): 1370-1376 (2004) - 2003
- [j1]Rahmat Budiarto, Abdullah Zawawi Hj. Talib, Zaharin Yusoff, Masashi Yamada:
An intelligent method for processing string in 3-D based on its minimum energy. Neural Parallel Sci. Comput. 11(1 & 2): 119-126 (2003) - [c3]Muhammad Aiman Mazlan, Azman Samsudin, Rahmat Budiarto:
Secure Groups Communication Using Mobile Agents Technologies. CITA 2003: 269-274 - [c2]Sureswaran Ramadass, Rahmat Budiarto, V. Siva:
Satellite Bandwidth Requirements for an MCS Based Multimedia Conference. SAINT Workshops 2003: 56-59
1990 – 1999
- 1997
- [c1]Rahmat Budiarto, Masashi Yamada, Hirohisa Seki, Hidenori Itoh:
A 3-D string figure display system for animating cat's cradle game. PG 1997: 30-
Coauthor Index
aka: Mohd Yazid Idris
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint