Fitur Protokol IoT Dalam Komunikasi Jaringan Cerdas

A Tohir - Jurnal Portal Data, 2022 - portaldata.org
Abstract Teknologi Internet of Things (IoT), yang memiliki potensi menghubungkan semua
objek di seluruh dunia melalui Internet, unggul dalam menyediakan infrastruktur transmisi …

Explainable artificial intelligence for intrusion detection system

S Patil, V Varadarajan, SM Mazhar, A Sahibzada… - Electronics, 2022 - mdpi.com
Intrusion detection systems are widely utilized in the cyber security field, to prevent and
mitigate threats. Intrusion detection systems (IDS) help to keep threats and vulnerabilities out …

An innovative perceptual pigeon galvanized optimization (PPGO) based likelihood Naïve Bayes (LNB) classification approach for network intrusion detection system

S Shitharth, PR Kshirsagar, PK Balachandran… - IEEE …, 2022 - ieeexplore.ieee.org
Intrusion detection and classification have gained significant attention recently due to the
increased utilization of networks. For this purpose, there are different types of Network …

A systematic literature review of intrusion detection systems in the cloud‐based IoT environments

G Luo, Z Chen, BO Mohammed - … and Computation: Practice …, 2022 - Wiley Online Library
As the number of Internet of Things (IoT) subscribers, services, and applications grows, there
is a pressing need for a reliable and lightweight security solution that can be used in IoT …

Filtering Spam Email Menggunakan Metode Naive Bayes

A Wibisono - Jurnal Teknologi Pintar, 2023 - teknologipintar.org
Spam adalah email yang tidak diminta yang berisi promosi produk, pornografi, virus dan
content-content yang tidak penting, yang dikirim ke banyak orang. Masalah spam dapat …

Intrusion detection in networks using cuckoo search optimization

M Imran, S Khan, H Hlavacs, FA Khan, S Anwar - Soft Computing, 2022 - Springer
One of the key problems for researchers and network managers is anomaly detection in
network traffic. Anomalies in network traffic might signal a network intrusion, requiring the …

Rancang Bangun Sistem Informasi Inventarisasi Barang Menggunakan Metode Extreme Programming

N Wahyuningsih - Jurnal Teknologi Terkini, 2023 - teknologiterkini.org
Selama ini dengan semakin meningkatnya pengawasan terhadap suatu pekerjaan, maka
diperlukan sistem informasi agar dapat lebih mudah dipantau. Sebuah sistem informasi …

Random projection neural networks of best approximation: Convergence theory and practical applications

G Fabiani - arXiv preprint arXiv:2402.11397, 2024 - arxiv.org
We investigate the concept of Best Approximation for Feedforward Neural Networks (FNN)
and explore their convergence properties through the lens of Random Projection (RPNNs) …

Metode Naive Bayes Untuk Klasifikasi Masa Studi Sarjana

AD Cahyo - Jurnal Teknologi Pintar, 2023 - teknologipintar.org
Pengumpulan data alumni mahasiswa sangat perlu dilakukan untuk memprediksi kelulusan
mahasiswa apakah mahasiswa tersebut dapat lulus tepat waktu atau terlambat sesuai …

Intrusion Detection System (IDS) in Cloud Computing using Machine Learning Algorithms: A Comparative Study.

G Rathod, V Sabnis, JK Jain - Grenze International Journal …, 2024 - search.ebscohost.com
Organizations have witnessed a significant transformation in the realm of data storage and
processing owing to the advent of cloud computing. Nonetheless, with its advantages, cloud …