People
Management
Head : Prof. Ir. Deris Stiawan. Ph.D., IPU. ASEAN Eng.
Secretary : Dr. Ir. Ahmad Heryanto. S.Kom. M.T
Prof. Ir. Deris Stiawan, M.T., Ph.D, IPU., ASEAN Eng., CPENT., LPT Master., CEH., CHFI
![]() |
Prof., Lecturer, Researchers, Head of Computer Network, Enterprise and Information Security (COMNETS) Research Group |
Faculty of Computer Science, Universitas Sriwijaya | |
Research Information ![]() |
|
deris@unsri.ac.id |
Research Interests
Intrusion Detection/ Prevention System, Cyberwar/ Homeland Security and Heterogeneous Network
Biography
Hold Ph.D from Universiti Teknologi Malaysia in 2013. He is senior lecturer in Faculty of Computer Science University of Sriwijaya and also a senior member of IAES, member of IEEE and his professional profile has derived to computer and network security fields, focused on network attack and intrusion prevention / detection system. In 2011, He holds Certified Ethical Hacker (C|EH) & Certified Hacker Forensic Investigator (C|HFI) licensed from EC-Council USA. He has professional experience serving as Editor in prestigious scientific journal.
Publications
- Cahyani, N. S., Stiawan, D., Abdiansah, A., Afifah, N., & Permana, D. R. (2025). Classification and similarity detection of Indonesian scientific journal articles. Computer Science and Information Technologies, 6(2), 147–158.
- Kurniawan, F., Stiawan, D., Antoni, D., Idris, M. Y., & Budiarto, R. (2025). A Robust and Efficient Machine Learning Framework for Enhancing Early Detection of Android Malware. IEEE Access, 1–1.
- Maulana, R., Stiawan, D., & Budiarto, R. (2025). Detection of Android Malware with Deep Learning Method using Convolutional Neural Network Model. Computer Science and Information Technologies, 6(1).
- Saputra, M. A., Stiawan, D., & Budiarto, R. (2025). Machine Learning Model Approach in Cyber Attack Threat Detection in Security Operation Center. Computer Science and Information Technologies, 6(1).
- Triana, Y. S., Osman, M. A., Stiawan, D., & Budiarto, R. (2025). User behavior analysis for insider attack detection using a combination of memory prediction model and recursive feature elimination algorithm. International Journal of Electrical and Computer Engineering (IJECE), 15(2), 1793.
- Agus Syamsul Arifin, M., Stiawan, D., Suprapto, B. Y., Susanto, Salim, T., Idris, M. Y., Shenify, M., & Budiarto, R. (2024). A Novel Dataset for Experimentation with Intrusion Detection Systems in SCADA Networks using IEC 60870-5-104 Standard. IEEE Access.
- Arifin, M. A. S., Stiawan, D., Yudho Suprapto, B., Susanto, S., Salim, T., Idris, M. Y., & Budiarto, R. (2024). Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104. IET Cyber-Physical Systems: Theory and Applications, 9(3), 282–292.
- Heryanto, A., Stiawan, D., Hermansyah, A., Firnando, R., Pertiwi, H., Idris, M. Y., & Budiarto, R. (2024). The incorporation of stacked long short-term memory into intrusion detection systems for botnet attack classification. IAES International Journal of Artificial Intelligence, 13(3), 3657–3670.
- Kunang, Y. N., Nurmaini, S., Stiawan, D., & Suprapto, B. Y. (2024). An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction. International Journal of Information Security, 23(3), 1619–1648.
- Nuzulastri, S., Stiawan, D., Satria, H., & Budiarto, R. (2024). Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means. Computer Science and Information Technologies, 5(2), 176–185.
- Rejito, J., Stiawan, D., Alshaflut, A., & Budiarto, R. (2024). Machine learning-based anomaly detection for smart home networks under adversarial attack. Computer Science and Information Technologies, 5(2), 122–129.
- Stiawan, D., Bardadi, A., Afifah, N., Melinda, L., Heryanto, A., Septian, T. W., Idris, M. Y., Subroto, I. M. I., Lukman, & Budiarto, R. (2023). An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection. Computer Systems Science and Engineering, 46(2), 1759–1774.
- Stiawan, D., Susanto, Bimantara, A., Idris, M. Y., & Budiarto, R. (2023). IoT botnet attack detection using deep autoencoder and artificial neural networks. KSII Transactions on Internet and Information Systems, 17(5), 1310–1338.
- Stiawan, D., Wahyudi, D., Septian, T. W., Idris, M. Y., & Budiarto, R. (2023). The Development of an Internet of Things (IoT) Network Traffic Dataset with Simulated Attack Data. Journal of Internet Technology, 24(2), 345–356.
- Susanto, Stiawan, D., Rini, D. P., Arifin, M. A. S., Idris, M. Y., Alsharif, N., & Budiarto, R. (2023). Dimensional Reduction With Fast ICA for IoT Botnet Detection. Journal of Applied Security Research, 18(4), 665–688.
- Heryanto, A., Stiawan, D., Bin Idris, M. Y., Bahari, M. R., Hafizin, A. Al, & Budiarto, R. (2022). Cyberattack Feature Selection using Correlation-Based Feature Selection Method in an Intrusion Detection System. International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2022-Octob, 79–85.
- Saputra Elsi, Z. R., Stiawan, D., Oklilas, A. F., Susanto, Kurniabudi, Kunang, Y. N., Idris, M. Y., & Budiarto, R. (2022). Feature Selection using Chi Square to Improve Attack Detection Classification in IoT Network: Work in Progress. International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2022-October.
- Stiawan, D., Aryandi, D., Heryanto, A., Septian, T. W., Muchtar, F., Idris, M. Y., & Budiarto, R. (2022). Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method. International Journal of Communication Networks and Information Security (IJCNIS), 11(1).
- Sutikno, T., & Stiawan, D. (2022). Cyberattacks and data breaches in Indonesia by Bjorka: hacker or data collector? Bulletin of Electrical Engineering and Informatics, 11(6), 2989–2994.
- Arifin, M. A. S., Susanto, Stiawan, D., Idris, M. Y., & Budiarto, R. (2021). The trends of supervisory control and data acquisition security challenges in heterogeneous networks. Indonesian Journal of Electrical Engineering and Computer Science, 22(2), 874–883.
- Stiawan, D., Heryanto, A., Bardadi, A., Rini, D. P., Subroto, I. M. I., Kurniabudi, Idris, M. Y. Bin, Abdullah, A. H., Kerim, B., & Budiarto, R. (2021). An Approach for Optimizing Ensemble Intrusion Detection Systems. IEEE Access, 9, 6930–6947.
- Stiawan, D., Suryani, M. E., Susanto, Idris, M. Y., Aldalaien, M. N., Alsharif, N., & Budiarto, R. (2021). Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network. IEEE Access, 9, 116475–116484.
- Susanto, Stiawan, D., Arifin, M. A. S., Rejito, J., Idris, M. Y., & Budiarto, R. (2021). A Dimensionality Reduction Approach for Machine Learning Based IoT Botnet Detection. International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2021-Octob, 26–30.
- Kunang, Y. N., Nurmaini, S., Stiawan, D., & Suprapto, B. Y. (2020). Improving Classification Attacks in IOT Intrusion Detection System using Bayesian Hyperparameter Optimization. 2020 3rd International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2020, 146–151.
- Kurniabudi, Stiawan, D., Darmawijoyo, Bin Idris, M. Y. Bin, Bamhdi, A. M., & Budiarto, R. (2020). CICIDS-2017 Dataset Feature Analysis with Information Gain for Anomaly Detection. IEEE Access, 8, 132911–132921.
- Muchtar, F., Al-Adhaileh, M. H., Alubady, R., Singh, P. K., Ambar, R., & Stiawan, D. (2020). Congestion Control for Named Data Networking-Based Wireless Ad Hoc Network. In Lecture Notes in Networks and Systems (Vol. 121, pp. 121–138).
- Nurfatih, M. S., Idris, M. Y. Bin, Stiawan, D., & Winanto, E. A. (2020). Enhancing Trust Model of Information Vehicular Ad-Hoc Networks through Blockchain Consensus Algorithm. 2020 3rd International Conference on Information and Communications Technology, ICOIACT 2020, 487–492.
- Susanto, Stiawan, D., Arifin, M. A. S., Idris, M. Y., & Budiarto, R. (2020). Iot botnet malware classification using weka tool and scikit-learn machine learning. International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2020-Octob, 15–20.
- Zaini, N. S., Stiawan, D., Razak, M. F. A., Firdaus, A., Din, W. I. S. W., Kasim, S., & Sutikno, T. (2020). Phishing detection system using machine learning classifiers. Indonesian Journal of Electrical Engineering and Computer Science, 17(3), 1165–1171.
- Kurniabudi, Purnama, B., Sharipuddin, Darmawijoyo, Stiawan, D., Samsuryadi, Heryanto, A., & Budiarto, R. (2019). Network anomaly detection research: A survey. Indonesian Journal of Electrical Engineering and Informatics, 7(1), 36–49.
- Stiawan, D., Idris, M. Y., Malik, R. F., Nurmaini, S., Alsharif, N., & Budiarto, R. (2019). Investigating Brute Force Attack Patterns in IoT Network. Journal of Electrical and Computer Engineering, 2019.
- Stiawan, D., Wahyudi, D., Heryanto, A., Samsuryadi, Idris, M. Y., Muchtar, F., Alzahrani, M. A., & Budiarto, R. (2019). TCP FIN flood attack pattern recognition on Internet of Things with rule based signature analysis. International Journal of Online and Biomedical Engineering, 15(7), 124–139.
- Tasmi, Setiawan, H., Stiawan, D., Husnawati, & Valiata, S. A. (2019). Determining attributes of encrypted data traffic using feature selection method. International Journal of Engineering and Advanced Technology, 9(1), 3500–3504.
- Lukman, L., Dimyati, M., Rianto, Y., Subroto, I. M. I., Sutikno, T., Hidayat, D. S., Nadhiroh, I. M., Stiawan, D., Haviana, S. F. C., Heryanto, A., & Yuliansyah, H. (2018). Proposal of the S-score for measuring the performance of researchers, institutions, and journals in Indonesia. Science Editing, 5(2), 135–141.
- Miftakul Amin, M., Sutrisman, A. D. I., Stiawan, D., Ermatita, & Maseleno, A. (2018). Design restful web service of national population database for supporting e-health interoperability service. Journal of Theoretical and Applied Information Technology, 96(15), 4794–4805.
- Stiawan, D., Idris, M. Y., Abdullah, A. H., Aljaber, F., & Budiarto, R. (2017). Cyber-attack penetration test and vulnerability analysis. International Journal of Online Engineering, 13(1), 125–132.
- Yazid Idris, M., Stiawan, D., Habibullah, N. M., Fikri, A. H., Abd Rahim, M. R., & Dasuki, M. (2017). IoT Smart Device for e-Learning Content Sharing on Hybrid Cloud Environment. Proceeding of the Electrical Engineering Computer Science and Informatics, 4(1).
- Stiawan, D., Idris, M. Y., Abdullah, A. H., AlQurashi, M., & Budiarto, R. (2016). Penetration testing and mitigation of vulnerabilities windows server. International Journal of Network Security, 18(3), 501–513.
- Dadkhah, M., Sutikno, T., Jazi, M. D., & Stiawan, D. (2015). An introduction to journal phishings and their detection approach. Telkomnika (Telecommunication Computing Electronics and Control), 13(2), 373–380.
- Stiawan, D., Idris, M. Y., & Abdullah, A. H. (2015). Penetration testing and network auditing: Linux. Journal of Information Processing Systems, 11(1), 104–115.
- Stiawan, D., Abdullah, A. H., & Idris, M. Y. (2014). Threat and vulnerability penetration testing: Linux. Journal of Internet Technology, 15(3), 333–342.
- Stiawan, D., Idris, M. Y., & Abdullah, A. H. (2013). Attack and vulnerability penetration testing: FreeBSD. Telkomnika, 11(2), 399–408.
- Deris Stiawan. (2012). Intrusion threat detection from insider attack using learning behavior-based. International Journal of the Physical Sciences, 7(4), 624–637.
- Stiawan, D., Shakhatreh, A. Y. I., Idris, M. Y., Kamarulnizam, A. B., & Abdul, H. A. (2012). Intrusion prevention system: A survey. Journal of Theoretical and Applied Information Technology, 40(1), 44–54.
Dr. Ir. Ahmad Heryanto, M.T
![]() |
Lecturer, Researcher, Head of Association Computer Machinery Student Chapter Universitas Sriwijaya |
Faculty of Computer Science, Universitas Sriwijaya | |
Research Information ![]() |
|
hery@unsri.ac.id |
Research Interests
Parallel Processing, Distributed Computing, Software Security, and Network Intrusion Detection
Biography
received the M.Eng. degree in electrical engineering from the Institut Teknologi Sepuluh Nopember (ITS), Surabaya, Indonesia, in 2014. He is currently pursuing the Ph.D. degree with Sriwijaya University, Indonesia.
Publications
- Heryanto, A., Stiawan, D., Hermansyah, A., Firnando, R., Pertiwi, H., Idris, M. Y., & Budiarto, R. (2024). The incorporation of stacked long short-term memory into intrusion detection systems for botnet attack classification. IAES International Journal of Artificial Intelligence, 13(3), 3657–3670.
- Stiawan, D., Bardadi, A., Afifah, N., Melinda, L., Heryanto, A., Septian, T. W., Idris, M. Y., Subroto, I. M. I., Lukman, & Budiarto, R. (2023). An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection. Computer Systems Science and Engineering, 46(2), 1759–1774.
- Stiawan, D., Wahyudi, D., Heryanto, A., Samsuryadi, Idris, M. Y., Muchtar, F., Alzahrani, M. A., & Budiarto, R. (2019). TCP FIN flood attack pattern recognition on Internet of Things with rule based signature analysis. International Journal of Online and Biomedical Engineering, 15(7), 124–139.
- Heryanto, A., Stiawan, D., Bin Idris, M. Y., Bahari, M. R., Hafizin, A. Al, & Budiarto, R. (2022). Cyberattack Feature Selection using Correlation-Based Feature Selection Method in an Intrusion Detection System. International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2022-Octob, 79–85.
- Stiawan, D., Aryandi, D., Heryanto, A., Septian, T. W., Muchtar, F., Idris, M. Y., & Budiarto, R. (2022). Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method. International Journal of Communication Networks and Information Security (IJCNIS), 11(1).
- Stiawan, D., Heryanto, A., Bardadi, A., Rini, D. P., Subroto, I. M. I., Kurniabudi, Idris, M. Y. Bin, Abdullah, A. H., Kerim, B., & Budiarto, R. (2021). An Approach for Optimizing Ensemble Intrusion Detection Systems. IEEE Access, 9, 6930–6947.
- Kurniabudi, Purnama, B., Sharipuddin, Darmawijoyo, Stiawan, D., Samsuryadi, Heryanto, A., & Budiarto, R. (2019). Network anomaly detection research: A survey. Indonesian Journal of Electrical Engineering and Informatics, 7(1), 36–49.
- Lukman, L., Dimyati, M., Rianto, Y., Subroto, I. M. I., Sutikno, T., Hidayat, D. S., Nadhiroh, I. M., Stiawan, D., Haviana, S. F. C., Heryanto, A., & Yuliansyah, H. (2018). Proposal of the S-score for measuring the performance of researchers, institutions, and journals in Indonesia. Science Editing, 5(2), 135–141.
Huda Ubaya. ST. MT
![]() |
Lecturer, Researcher |
Faculty of Computer Science, Universitas Sriwijaya | |
Research Information ![]() |
|
hudaubaya@unsri.ac.id |
Research Interests
Control, Drone
Biography
Publications
- Passarella, R., Ubaya, H., & Sutarno, S. (2024). ANALYSIS OF TAKEOFF BEHAVIOR OF A320 AND B738 AIRCRAFT AT SULTAN HASANUDDIN INTERNATIONAL AIRPORT BASED ON UNSUPERVISED LEARNING.
- Zarkasi, A., Ubaya, H., Exaudi, K., & Duri, A. H. (2024). Implementation of Fisherface Algorithm for Eye and Mouth Recognition in Face-Tracking Mobile Robot. Jurnal Ilmiah Teknik Elektro Komputer Dan Informatika, 10(3), 556–565.
- Ubaya, H., & Juairiah, R. S. (2020). Performance of RUS and SMOTE Method on Twitter Spam Data Using Random Forest. Journal of Physics: Conference Series, 1500(1), 12130.
- Firsandaya Malik, R., Rizky Perdana, A., Zulfahmi, R., & Ubaya, H. (2019). Dual-channel lora gateway using channel assignment on raspberry Pi. Journal of Physics: Conference Series, 1196(1), 12075.
- Ubaya, H., Sukemi, & Oktavian, D. (2019). Determination of fertilizer doses of plants utilizing the results of aerial photographs using fuzzy tsukamoto. Journal of Physics: Conference Series, 1196(1), 12023.
- Ubaya, H., Passarella, R., Imam Suganda, M., Exaudi, K., Reza, F. M., & Veny, H. (2019). Developing tree height calculation by using aerial photographs for monitoring results of revegetation ex-mining land based on government regulation in Indonesia. Journal of Physics: Conference Series, 1196(1), 12061.
- Passarella, R., Utami, P. S., Ubaya, H., & Widyastuti, R. (n.d.). Using machine learning to identify clustering patterns of traffic accidents.
Iman Saladin B.Azhar, S.Kom. MMSI
![]() |
Lecturer, Researcher |
Faculty of Computer Science, Universitas Sriwijaya | |
Research Information | |
imansaladin@unsri.ac.id |
Research Interests
Biography
Publications
Adi Hermansyah, M.T.
![]() |
Lecturer, Researcher |
Faculty of Computer Science, Universitas Sriwijaya | |
Research Information ![]() |
|
adihermansyah@unsri.ac.id |
Research Interests
Distributed System, Cloud Computing
Biography
Publications
- Heryanto, A., Stiawan, D., Hermansyah, A., Firnando, R., Pertiwi, H., Idris, M. Y., & Budiarto, R. (2024). The incorporation of stacked long short-term memory into intrusion detection systems for botnet attack classification. IAES International Journal of Artificial Intelligence, 13(3), 3657–3670.
- Hermansyah, A., Hardiyanti, R., & Prasetyo, A. P. P. (2022). Sistem Perekam Detak Jantung Berbasis Internet Of Things (IoT) dengan Menggunakan Pulse Heart Rate Sensor. JTEV (Jurnal Teknik Elektro Dan Vokasional), 8(2), 338.
- Hermansyah, A., Nugroho, A., Kurniawan, A., Nugroho, S. M. S., & Yuniarno, E. M. (2019). Panoramic of Image Reconstruction Based on Geospatial Data using SIFT (Scale Invariant Feature Transform). Proceedings – 2019 International Seminar on Intelligent Technology and Its Application, ISITIA 2019, 308–313.
Nurul Afifah M.Kom
![]() |
Lecturer, Researcher |
Faculty of Computer Science, Universitas Sriwijaya | |
Research Information ![]() |
|
nurul@unsri.ac.id |
Research Interests
Information Security, IoT system & security, Blockchain and Machine learning.
Biography
Received the Bachelor Degree in Computer Engineering and master’s degrees in Computer Science at 2014 and 2019. She joined Universitas Sriwijaya as a Lecturer in January 2020. She is currently a Researcher at COMNETS RG.
Publications
- Cahyani, N. S., Stiawan, D., Abdiansah, A., Afifah, N., & Permana, D. R. (2025). Classification and similarity detection of Indonesian scientific journal articles. Computer Science and Information Technologies, 6(2), 147–158.
- Darmawahyuni, A., Sari, W. K., Afifah, N., Tutuko, B., Nurmaini, S., Marcelino, J., Isdwanta, R., & Khairunnisa, C. Z. (2025). A deep learning-based myocardial infarction classification based on single-lead electrocardiogram signal. International Journal of Advances in Applied Sciences, 14(2), 352.
- Zarkasi, A., Satria, H., Primanita, A., Abdurahman, Afifah, N., & Sutarno. (2024). A new system for underwater vehicle balancing control based on weightless neural network and fuzzy logic methods. IAES International Journal of Artificial Intelligence, 13(3), 2870–2882.
- Permana Arrasyid, F., Stiawan, D., Afifah, N., Heryanto, A., Azhar, I. S. B., Bardadi, A., Yudho Suprapto, B., & Pahendra Anto Saputra, I. (2024). Optimizing Web Server Performance: A Comparative Analysis of Central Manager and Round Robin Load Balancing Algorithms. ICECOS 2024 – 4th International Conference on Electrical Engineering and Computer Science, Proceeding, 280–285.
- Sari, R. E., Stiawan, D., Afifah, N., Idris, M. Y., & Budiarto, R. (2024). Classification of Darknet Traffic Using the AdaBoost Classifier Method. Indonesian Journal of Electrical Engineering and Informatics, 12(2), 384–396.
- Afifah, N., Fadli, M., Septian, T. W., Sari, W. K., Hermansyah, A., & Marieska, M. D. (2024). Black Hole Attacks Detection in Mobile Ad Hoc Networks (MANETs) using Bayesian Inference Method. International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 262–265.
- Permana, D. R., Stiawan, D., Rini, D. P., Afifah, N., Ningrum, S. K., & Budiarto, R. (2024). An Enhanced Method with Part of Speech Tagging and Named Entity Recognition Techniques Towards Advanced Persistent Threat in Cyber Threat Intelligence: Work in Progress. International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 493–498.
- Stiawan, D., Susanto, Wahyudi, J., Afifah, N., Idris, M. Y., & Budiarto, R. (2024). Rule-Based DDOS Attack Detection Using Machine Learning for Internet of Things. Ssrn.
- Stiawan, D., Bardadi, A., Afifah, N., Melinda, L., Heryanto, A., Septian, T. W., Idris, M. Y., Subroto, I. M. I., Lukman, & Budiarto, R. (2023). An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection. Computer Systems Science and Engineering, 46(2), 1759–1774.
- Purnama, B., Stiawan, D., Hanapi, D., Idris, M. Y. Bin, Sharipuddin, Afifah, N., & Budiarto, R. (2022). Time Efficiency on Computational Performance of PCA, FA and TSVD on Ransomware Detection. Indonesian Journal of Electrical Engineering and Informatics, 10(1), 102–111.
- Stiawan, D., Daely, S. M., Heryanto, A., Afifah, N., Idris, M. Y., & Budiarto, R. (2021). Ransomware detection based on opcode behaviour using k-nearest neighbours algorithm. Information Technology and Control, 50(3), 495–506.
Tri Wanda Septian,S.Kom.,M.Sc
![]() |
Industrial Researcher, Cybersecurity Consultant |
PT Mitra Integrasi Informatika | |
Research Information ![]() |
|
twseptian@unsri.ac.id |
Research Interests
Penetration Testing, Vulnerability Analyst, Vulnerability Assessment
Biography
Publications
Distinguished / Visiting Lecturer
- Prof. Dr. Tetsuo Asano, JAIST, Japan
- Assoc. Prof. Dr. Bryan