Abstract is missing.
- Security patterns: Research direction, metamodel, application and verificationHironori Washizaki. 1-4 [doi]
- Deep learning in intrusion detection perspective: Overview and further challengesKwangjo Kim, Muhamad Erza Aminanto. 5-10 [doi]
- Model-based approach for educational big data analysis of learners thinking with process dataTsukasa Hirashima, Ahmad Afif Supianto, Yusuke Hayashi. 11-16 [doi]
- Big data for government policy: Potential implementations of bigdata for official statistics in IndonesiaSetia Pramana, Budi Yuniarto, Robert Kurniawan, Ricky Yordani, Jong Gun Lee, Imaduddin Amin, P. P. Ni Luh Putu Satyaning, Yulistina Riyadi, Atika Nashirah Hasyyati, Rina Indriani. 17-21 [doi]
- Automatic open domain information extraction from Indonesian textYohanes Gultom, Wahyu Catur Wibowo. 23-30 [doi]
- Hyperbolic tangent activation function on FIMT-DD algorithm analysis for airline big dataAri Wibisono, Machmud Roby Alhamidi, Adi Nurhadiyatna, Wisnu Jatmiko. 31-36 [doi]
- Improved microarray images cancer classification using k-nearest neighbor with canonical Particle Swarm OptimizationMachmud Roby Alhamidi, Ito Wasito. 37-42 [doi]
- Improving data quality through big data: Case study on big data-mobile positioning data in Indonesia tourism statisticsSetiadi Yazid, Ana Uluwiyah. 43-48 [doi]
- Implementation of change data capture in ETL process for data warehouse using HDFS and apache sparkDentiy, I. Putu Medagia Atmaja, Ari Saptawijaya, Siti Aminah. 49-55 [doi]
- Medical entity recognition using conditional random field (CRF)Raditya Herwando, Meganingrum Arista Jiwanggi, Mirna Adriani. 57-62 [doi]
- Optimization of Stacked Unsupervised Extreme Learning Machine to improve classifier performanceDewa Made Sri Arsa, M. Anwar Ma'sum, Muhammad Febrian Rachmadi, Wisnu Jatmiko. 63-68 [doi]
- Block and booth floating point number multiplication algorithms in FPGA's generalized learning vector quantization implementationYulistiyan Wardhana, H. S. Putra, S. I. Sakinah, Wisnu Jatmiko, Petrus Mursanto, Prahesa Kusuma Setia. 69-75 [doi]
- Enhance generalized learning vector quantization using unsupervised extreme learning machine and intelligent K-means clusteringM. Anwar Ma'sum, Dewa Made Sri Arsa, Novian Habibie, Wisnu Jatmiko. 77-83 [doi]
- Comparative analysis of ant colony extended and mix-min ant system in software project scheduling problemValdi Rachman, M. Anwar Ma'sum. 85-91 [doi]
- A real time vehicle counting based on adaptive tracking approach for highway videosMuhamad Soleh, Grafika Jati, Ananto Tri Sasongko, Wisnu Jatmiko, M. H. Hilman. 93-98 [doi]
- Wi-Fi intrusion detection using weighted-feature selection for neural networks classifierMuhamad Erza Aminanto, Harry Chandra Tanuwidjaja, Paul D. Yoo, Kwangjo Kim. 99-104 [doi]
- Improved proxy re-encryption scheme for symmetric key cryptographyKouichi Sakurai, Takashi Nishide, Amril Syalim. 105-111 [doi]
- Knowledge sharing and electronic word of mouth to promote information security awareness in social network sitePuspita Kencana Sari, Adhi Prasetio. 113-117 [doi]
- Mitigation strategy of sinkhole attack in Wireless Sensor NetworkM. T. Kurniawan, Setiadi Yazid. 119-125 [doi]
- Rijndael cipher optimization using low complexity serial multiplier based on Karatsuba technologyPetrus Mursanto, Erwin Oky Sutjonong. 127-132 [doi]
- How to sign multiple versions of digital documentsAmril Syalim, Kouichi Sakurai. 133-136 [doi]
- Securing communication in inter domains Internet of Things using identity-based cryptographyBayu Anggorojati, Ramjee Prasad. 137-142 [doi]
- On preventing bitcoin transaction from money laundering in Indonesia: Analysis and recommendation on regulationsAbidzar Gifari, Bayu Anggorojati, Setiadi Yazid. 143-148 [doi]
- Low power wireless network for efficient peatland monitoring systemRifki Nurfaiz, Bintang Wibowo, Gladhi Guarddin, Petrus Mursanto. 149-154 [doi]
- An efficient secure ECG compression based on 2D-SPIHT and SIT algorithmGrafika Jati, Ardina Rizqy Rachmasari, Wisnu Jatmiko, Petrus Mursanto, Wahju Sediono. 155-160 [doi]