Showing
1 - 10
results of
10
for search '
Budiarto, Rahmat
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Budiarto, Rahmat
Showing
1 - 10
results of
10
for search '
Budiarto, Rahmat
'
, query time: 0.11s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
The Tsunami Transformation: How Agency For Reconstruction And Rehabilitation [Brr] Convert Disaster Into An Opportunity To Sustainably Develop Tsunami Affected Regions Of Aceh...
by
Arifin, A. Hadi
,
Budiarto
,
Rahmat
Published 2008
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
2
A Neural Network-Based Application to Identify Cubic Structures in Multi Component Crystalline Materials Using X-Ray Diffraction Data.
by
Syukur, Mohammad
,
Pasha, Muhammad Fermi
,
Budiarto
,
Rahmat
Published 2007
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
3
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by
Ramadass, Sureswaran
,
Budiarto
,
Rahmat
,
Ho, Cheah Luan
Published 2007
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
4
Survey And New Approach In Service Discovery And Advertisement For Mobile Ad Hoc Networks.
by
Seno, Seyed Amin Hosseini
,
Budiarto
,
Rahmat
,
Wan, Tat-Chee
Published 2007
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
5
Penetration testing and mitigation of vulnerabilities windows server
by
Stiawan, Deris
,
Idris, Mohd. Yazid
,
Abdullah, Hanan
,
AlQurashi, M.
,
Budiarto
,
Rahmat
Published 2016
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
6
Cyber-Attack Penetration Test and Vulnerability Analysis
by
Stiawan, Deris
,
Idris, Mohd. Yazid
,
Abdullah, Abdul Hanan
,
Aljaber, Fahad
,
Budiarto
,
Rahmat
Published 2017
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
7
CICIDS-2017 dataset feature analysis with information gain for anomaly detection
by
Kurniabudi, Kurniabudi
,
Stiawan, Deris
,
Darmawijoyo, Darmawijoyo
,
Idris, Mohd. Yazid
,
Bamhdi, Alwi M.
,
Budiarto
,
Rahmat
Published 2020
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
8
Investigating brute force attack patterns in IoT network
by
Stiawan, Deris
,
Idris, Mohd. Yazid
,
Malik, Reza Firsandaya
,
Siti Nurmaini, Siti Nurmaini
,
Alsharif, Nizar
,
Budiarto
,
Rahmat
Published 2019
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
9
Ransomware detection based on opcode behaviour using k-nearest neighbours algorithm
by
Stiawan, Deris
,
Daely, Somame Morianus
,
Heryanto, Ahmad
,
Nurul Afifah, Nurul Afifah
,
Idris, Mohd. Yazid
,
Budiarto
,
Rahmat
Published 2021
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
10
TCP FIN flood attack pattern recognition on internet of things with rule based signature analysis
by
Stiawan, Deris
,
Wahyudi, Dimas
,
Heryanto, Ahmad
,
Samsuryadi, Samsuryadi
,
Idris, Mohd. Yazid
,
Muchtar, Farkhana
,
Alzahrani, Mohammed Abdullah
,
Budiarto
,
Rahmat
Published 2019
Call Number:
Loading...
Located:
Loading...
Get fulltext
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
QA75 Electronic computers. Computer science
QA75.5-76.95 Electronic computers. Computer science
HD28-70 Management. Industrial Management
Loading...