Fitur Protokol IoT Dalam Komunikasi Jaringan Cerdas
A Tohir - Jurnal Portal Data, 2022 - portaldata.org
Abstract Teknologi Internet of Things (IoT), yang memiliki potensi menghubungkan semua
objek di seluruh dunia melalui Internet, unggul dalam menyediakan infrastruktur transmisi …
objek di seluruh dunia melalui Internet, unggul dalam menyediakan infrastruktur transmisi …
Explainable artificial intelligence for intrusion detection system
S Patil, V Varadarajan, SM Mazhar, A Sahibzada… - Electronics, 2022 - mdpi.com
Intrusion detection systems are widely utilized in the cyber security field, to prevent and
mitigate threats. Intrusion detection systems (IDS) help to keep threats and vulnerabilities out …
mitigate threats. Intrusion detection systems (IDS) help to keep threats and vulnerabilities out …
An innovative perceptual pigeon galvanized optimization (PPGO) based likelihood Naïve Bayes (LNB) classification approach for network intrusion detection system
S Shitharth, PR Kshirsagar, PK Balachandran… - IEEE …, 2022 - ieeexplore.ieee.org
Intrusion detection and classification have gained significant attention recently due to the
increased utilization of networks. For this purpose, there are different types of Network …
increased utilization of networks. For this purpose, there are different types of Network …
A systematic literature review of intrusion detection systems in the cloud‐based IoT environments
G Luo, Z Chen, BO Mohammed - … and Computation: Practice …, 2022 - Wiley Online Library
As the number of Internet of Things (IoT) subscribers, services, and applications grows, there
is a pressing need for a reliable and lightweight security solution that can be used in IoT …
is a pressing need for a reliable and lightweight security solution that can be used in IoT …
Filtering Spam Email Menggunakan Metode Naive Bayes
A Wibisono - Jurnal Teknologi Pintar, 2023 - teknologipintar.org
Spam adalah email yang tidak diminta yang berisi promosi produk, pornografi, virus dan
content-content yang tidak penting, yang dikirim ke banyak orang. Masalah spam dapat …
content-content yang tidak penting, yang dikirim ke banyak orang. Masalah spam dapat …
Intrusion detection in networks using cuckoo search optimization
One of the key problems for researchers and network managers is anomaly detection in
network traffic. Anomalies in network traffic might signal a network intrusion, requiring the …
network traffic. Anomalies in network traffic might signal a network intrusion, requiring the …
Rancang Bangun Sistem Informasi Inventarisasi Barang Menggunakan Metode Extreme Programming
N Wahyuningsih - Jurnal Teknologi Terkini, 2023 - teknologiterkini.org
Selama ini dengan semakin meningkatnya pengawasan terhadap suatu pekerjaan, maka
diperlukan sistem informasi agar dapat lebih mudah dipantau. Sebuah sistem informasi …
diperlukan sistem informasi agar dapat lebih mudah dipantau. Sebuah sistem informasi …
Random projection neural networks of best approximation: Convergence theory and practical applications
G Fabiani - arXiv preprint arXiv:2402.11397, 2024 - arxiv.org
We investigate the concept of Best Approximation for Feedforward Neural Networks (FNN)
and explore their convergence properties through the lens of Random Projection (RPNNs) …
and explore their convergence properties through the lens of Random Projection (RPNNs) …
Metode Naive Bayes Untuk Klasifikasi Masa Studi Sarjana
AD Cahyo - Jurnal Teknologi Pintar, 2023 - teknologipintar.org
Pengumpulan data alumni mahasiswa sangat perlu dilakukan untuk memprediksi kelulusan
mahasiswa apakah mahasiswa tersebut dapat lulus tepat waktu atau terlambat sesuai …
mahasiswa apakah mahasiswa tersebut dapat lulus tepat waktu atau terlambat sesuai …
Intrusion Detection System (IDS) in Cloud Computing using Machine Learning Algorithms: A Comparative Study.
Organizations have witnessed a significant transformation in the realm of data storage and
processing owing to the advent of cloud computing. Nonetheless, with its advantages, cloud …
processing owing to the advent of cloud computing. Nonetheless, with its advantages, cloud …