Publications

2026

  1. To Appear
    Attack Lifecycle Extraction and Mapping from CTF Writeups Using an Enhanced LLM Approach
    Wei-Chian Kew, Ying-Dar Lin, Fietyata Yudha, and 3 more authors
    Journal of Network and Computer Applications, 2026

2025

  1. Published
    Reproducing ATT&CK Techniques and Lifecycles to Train Machine Learning Classifier
    Fietyata Yudha, Ying-Dar Lin, Yuan-Cheng Lai, and 2 more authors
    IEEE Network, 2025
  2. Published
    A Scalable Multi-Datasource IDS Dataset with Technique and Lifecycle Labels Based on MITRE ATT&CK
    Fietyata Yudha, Ying-Dar Lin, Yuan-Cheng Lai, and 2 more authors
    In 2025 IEEE Conference on Dependable and Secure Computing (DSC), 2025
  3. Published
    From Flow to Packet: A Unified Machine Learning Approach for Advanced Intrusion Detection
    Didik Sudyana, Fietyata Yudha, Ying-Dar Lin, and 3 more authors
    Security and Communication Networks, 2025
  4. Published
    Hybrid Flow and Packet Anomaly Detection System and Method
    Ying-Dar Lin, Didik Sudyana, Fietyata Yudha, and 1 more author
    2025
    TW Patent TW202,508,258 A

2024

  1. Published
    Quality Analysis in IDS Dataset: Impact on Model Generalization
    Didik Sudyana, Miel Verkerken, Laurens D’Hooge, and 7 more authors
    In 2024 IEEE Conference on Communications and Network Security (CNS), 2024
  2. Published
    Two-Stage Multi-Datasource Machine Learning for Attack Technique and Lifecycle Detection
    Ying-Dar Lin, Shin-Yi Yang, Didik Sudyana, and 3 more authors
    Computers & Security, 2024

2023

  1. Published
    Analisis Investigasi Forensik Digital pada Layanan Private Cloud Computing Menggunakan SNI 27037: 2014
    Didik Sudyana, Irwan Hadi, and Fietyata Yudha
    Buletin Profesi Insinyur, 2023
  2. Published
    A Custom Recovery Approach for Physical Forensic Imaging of Android Device
    Fietyata Yudha, Erika Ramadhani, Didik Sudyana, and 1 more author
    In AIP Conference Proceedings, 2023

2021

  1. Published
    Teknik Audio Forensik dengan Metode Minkowski untuk Pengenalan Rekaman Suara Pelaku Kejahatan
    Muhamad Azwar, Syarif Hidayat, and Fietyata Yudha
    Cyber Security dan Forensik Digital, 2021
  2. Published
    Penerapan CFTT untuk Pengujian Aplikasi Web-Based Android Analysis Tools (WAAT) Dengan Federated Testing
    Yasir Muin, Yudi Prayudi, and Fietyata Yudha
    JATISI, 2021
  3. Published
    Optimalisasi Performa Akses Halaman Web Dengan Memanfaatkan Teknik Load Balancing Pada Google Cloud
    Ivan Firmansyah and Fietyata Yudha
    Journal of Education, 2021
  4. Published
    A Prototype of Portable Digital Forensics Imaging Tools using Raspberry Device
    Fietyata Yudha, Erika Ramadhani, and RM Komaryan
    In IOP Conference Series: Materials Science and Engineering, 2021

2020

  1. Published
    Pendekatan dd sebagai Salah Satu Teknik Akuisisi Perangkat Android
    Fietyata Yudha, Erika Ramadhani, Fayruz Rahma, and 1 more author
    Cyber Security dan Forensik Digital, 2020
  2. Published
    Pemanfaatan Google Cloud dan Teknik Load Balancing untuk Optimalisasi Performa Akses Halaman Web
    Fietyata Yudha
    2020

2019

  1. Published
    Web Crawling Technique for Vulnerability Assessment on Web
    Fietyata Yudha, Andi Muhamad Panji, Laksono Adiputro, and 1 more author
    In Lecture Notes in Electrical, Electronic and Computer Engineering, 2019
  2. Published
    Study on Implementing Tor Communication in Connection to Storage Service Provider
    Erika Ramadhani and Fietyata Yudha
    In IOP Conference Series: Materials Science and Engineering, 2019

2018

  1. Published
    Perancangan Aplikasi Pengujian Celah Keamanan pada Aplikasi Berbasis Web
    Fietyata Yudha and Andi Muhammad Panji
    Cyber Security dan Forensik Digital, 2018
  2. Published
    Perancangan Nenggala Disk Duplicator (NDD) untuk Mendukung Proses Investigasi Forensik Digital
    Fietyata Yudha
    Teknoin, 2018