Pahlevi, R. R., Suryani, V. ., Nuha, H. H., & Yasirandi, R. . (2022). Secure Two-Factor Authentication for IoT Device. In (p. 407—412). http://doi.org/10.1109/ICoICT55009.2022.9914866 (Original work published 2024)
First name
Hilal
Middle name
Hudan
Last name
Nuha
Fauzi, N. ., Yulianto, F. A., & Nuha, H. H. (2023). The Effectiveness of Anomaly-Based Intrusion Detection Systems in Handling Zero-Day Attacks Using AdaBoost, J48, and Random Forest Methods. In (pp. 57–62). Bali, Indonesia: IEEE. http://doi.org/10.1109/APWiMob59963.2023.10365642 (Original work published 2024)
Pahlevi, R. R., Suryani, V. ., Nuha, H. H., & Yasirandi, R. . (2022). Secure Two-Factor Authentication for IoT Device. In (pp. 407–412). Bandung, Indonesia: IEEE. http://doi.org/10.1109/ICoICT55009.2022.9914866 (Original work published 2024)
Pahlevi, R. R., Suryani, V. ., Nuha, H. H., & Yasirandi, R. . (2022). Secure Two-Factor Authentication for IoT Device. In 2022 10th International Conference on Information and Communication Technology (ICoICT) (pp. 407–412).