Profil Calon Promotor

# Tahun Penelitian
1 2021 Pemodelan dan Simulasi Keputusan dan Penjadwalan Off-loading untuk Peningkatan Kinerja Proses Eksekusi Job pada Lingkungan Fog dan Cloud Computing
Peran: Ketua Sumber Dana: ITS
2 2021 Metode Proteksi untuk Meningkatkan Keamanan Data pada Jaringan Komputer
Peran: Ketua Sumber Dana: KEMENRISTEK/BRIN
3 2020 Pengembangan Metode Data Hiding dan Optimasi Intrusion Detection System pada Jaringan Komputer untuk Proteksi Data
Peran: Ketua Sumber Dana: Departemen Teknik Informatika, ITS
4 2020 Metode Proteksi untuk Meningkatkan Keamanan Data pada Jaringan Komputer
Peran: Ketua Sumber Dana: KEMENRISTEK/BRIN
5 2019 Metode Proteksi untuk Meningkatkan Keamanan Data pada Jaringan Komputer
Peran: Ketua Sumber Dana: DIKTI - KEMENRISTEKDIKTI
6 2019 Pengembangan Metode Pengamanan Data
Peran: Ketua Sumber Dana: DIKTI - KEMENRISTEKDIKTI
7 2018 Pengembangan Protokol Pengiriman dan Agregasi Data Untuk Penghematan Energi dan Penjaminan Reliabilitas Pengiriman Data Pada Lingkungan Wireless Sensor Network
Peran: Anggota Sumber Dana: DIKTI - KEMENRISTEKDIKTI
8 2018 Pengembangan Metode Proteksi untuk Menjaga Keamanan Data dan privasi Pengguna
Peran: Ketua Sumber Dana: DIKTI - KEMENRISTEKDIKTI
9 2017 Pengembangan Metode Proteksi untuk Menjaga Keamanan Data dan privasi Pengguna
Peran: Ketua Sumber Dana: DIKTI - KEMENRISTEKDIKTI
10 2017 Pengembangan Protokol Pengiriman dan Agregasi Data Untuk Penghematan Energi dan Penjaminan Reliabilitas Pengiriman Data Pada Lingkungan Wireless Sensor Network
Peran: Anggota Sumber Dana: DIKTI - KEMENRISTEKDIKTI
11 2016 Rancang bangun mekanisme transformasi untuk pengamanan data
Peran: Ketua Sumber Dana: DIKTI - KEMENRISTEKDIKTI
12 2015 Rancang bangun mekanisme transformasi untuk pengamanan data
Peran: Ketua Sumber Dana: DIKTI - KEMENRISTEKDIKTI
13 2014 Pengembangan teknik steganography pada citra medis untuk menjaga privasi pasien
Peran: Ketua Sumber Dana: DIKTI - KEMENDIKNAS
# Tahun Publikasi
1 2021 Clustering under-sampling data for improving the performance of intrusion detection system
Jurnal: Journal of Engineering Science and Technology, Volume 16, Issue 2, April 2021
2 2021 Reversible difference expansion multi-layer data hiding technique for medical images
Jurnal: International Journal of Advances in Intelligent Informatics, Vol 7, No 1 (2021): March 2021
3 2021 ANOVA-SVM for Selecting Subset Features in Encrypted Internet Traffic Classification
Jurnal: International Journal of Intelligent Engineering and Systems, 2021, 14(2), pp. 536–546
4 2021 Enhancing Quality of the Stego Image by Using Histogram Partition and Prediction Error
Jurnal: International Journal of Intelligent Engineering and Systems, 2021, 14(2), pp. 511–520
5 2021 Protecting Data by Improving the Performance of Controlling Expansion Method
Jurnal: Communications in Computer and Information Science, 2021, 1347, pp. 577–587
6 2020 Reversible data hiding with segmented secrets and smoothed samples in various audio genres
Jurnal: Journal of Big Data, 2020, 7(1), 80
7 2020 B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis
Jurnal: KSII Transactions on Internet and Information Systems, 2020, 14(10), pp. 4176–4197
8 2020 Utilizing fuzzy logic in developing reversible data hiding method
Jurnal: International Journal of Intelligent Engineering and Systems, 2020, 13(5), pp. 327–336
9 2020 A node density-based approach for energy-efficient data gathering protocol in wireless sensor network environments
Jurnal: International Journal of Innovative Computing, Information and Control, 2020, 16(2), pp. 681–700
10 2020 Hiding data in audio files: A smoothing-based approach to improve the quality of the stego audio
Jurnal: Heliyon, 2020, 6(3), e03464
11 2020 Reversible Data Hiding Scheme based on General Difference Expansion Cluster
Jurnal: International Journal of Advances in Soft Computing and its Applications, 2020, 12(3), pp. 11–24
12 2020 Data Reduction for Optimizing Feature Selection in Modeling Intrusion Detection System
Jurnal: International Journal of Intelligent Engineering and Systems, 2020, 13(6), pp. 199–207
13 2020 Improving the performance of data hiding by designing three samples-based smoothing in audio
Jurnal: International Journal of Intelligent Engineering and Systems, 2020, 13(2), pp. 196–204
14 2020 Improving the performance of histogram-based data hiding method in the video environment
Jurnal: Journal of King Saud University - Computer and Information Sciences, [in press]
15 2020 Analyzing the performance of intrusion detection model using weighted one-against-one support vector machine and feature selection for imbalanced classes
Jurnal: International Journal of Intelligent Engineering and Systems, 2020, 13(2), pp. 151–160
16 2020 Detecting intrusions in computer network traffic with machine learning approaches
Jurnal: International Journal of Intelligent Engineering and Systems, 2020, 13(3), pp. 433–445
17 2020 Improving Intrusion Detection System by Estimating Parameters of Random Forest in Boruta
Jurnal: Proceeding - ICoSTA 2020: 2020 International Conference on Smart Technology and Applications: Empowe, vol.
18 2020 Pearson Correlation Attribute Evaluation-based Feature Selection for Intrusion Detection System
Jurnal: Proceeding - ICoSTA 2020: 2020 International Conference on Smart Technology and Applications: Empowe, vol.
19 2020 Improving the Capacity of Data Hiding by Modifying the Interpolation of Audio Samples
Jurnal: 2020 8th International Conference on Information and Communication Technology, ICoICT 2020, vol.
20 2020 Cancellable fingerprint generation by projection based transformation and quantization
Jurnal: Proceedings - 2020 International Seminar on Application for Technology of Information and Communicat, vol.
21 2020 Reducing Computational Cost of Pair-Polar Coordinate-based Cancelable Fingerprint Template Matching
Jurnal: 2020 3rd International Conference on Computer and Informatics Engineering, IC2IE 2020, vol.
22 2020 Feature Importance Ranking for Increasing Performance of Intrusion Detection System
Jurnal: 2020 3rd International Conference on Computer and Informatics Engineering, IC2IE 2020, vol.
23 2020 Evaluating the Performance of Fibbing Architecture in the Hybrid Software Defined Network
Jurnal: Proceeding - 2020 International Conference on Radar, Antenna, Microwave, Electronics and Telecommuni, vol.
24 2020 Anomaly-based Intrusion Detection Approach for IoT Networks Using Machine Learning
Jurnal: CENIM 2020 - Proceeding: International Conference on Computer Engineering, Network, and Intelligent , vol.
25 2020 A New Approach of Botnet Activity Detection Model based on Time Periodic Analysis
Jurnal: CENIM 2020 - Proceeding: International Conference on Computer Engineering, Network, and Intelligent , vol.
26 2020 Path selection in software defined network data plane using least loaded path
Jurnal: 2020 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2020, vol.
27 2019 Histogram-based multilayer reversible data hiding method for securing secret data
Jurnal: Bulletin of Electrical Engineering and Informatics, 2019, 8(3), pp. 1128–1134
28 2019 Reversible data hiding method by extending reduced difference expansion
Jurnal: International Journal of Advances in Intelligent Informatics, 2019, 5(2), pp. 101–112
29 2019 Information hiding scheme for digital images using difference expansion and modulus function
Jurnal: Journal of King Saud University - Computer and Information Sciences, 2019, 31(3), pp. 335–347
30 2019 Reversible data hiding in audio based on discrete cosine transform and location maps
Jurnal: International Journal of Intelligent Engineering and Systems, 2019, 12(3), pp. 41–49
31 2019 High quality PVM based reversible data hiding method for digital images
Jurnal: International Journal of Innovative Computing, Information and Control, 2019, 15(2), pp. 667–680
32 2019 A grid-based clustering with dynamic forwarding path for energy-efficient data gathering in wireless sensor network environments
Jurnal: ICIC Express Letters, Part B: Applications, 2019, 10(3), pp. 185–193
33 2019 Improving the quality of stego image using prediction error and histogram modification
Jurnal: International Journal of Intelligent Engineering and Systems, 2019, 12(5), pp. 95–103
34 2019 Cluster analysis-based approach features selection on machine learning for detecting intrusion
Jurnal: International Journal of Intelligent Engineering and Systems, 2019, 12(4), pp. 233–243
35 2019 Data preprocessing and feature selection for machine learning intrusion detection systems
Jurnal: ICIC Express Letters, 2019, 13(2), pp. 93–101
36 2019 Digital image information hiding methods for protecting transmitted data: A survey
Jurnal: Journal of Communications, 2019, 14(1), pp. 9–16
37 2019 Improving the capability of reduced difference expansion based digital image data hiding
Jurnal: IAENG International Journal of Computer Science, 2019, 46(4), pp. 1–14
38 2019 Increasing accuracy and completeness of intrusion detection model using fusion of normalization, feature selection method and support vector machine
Jurnal: International Journal of Intelligent Engineering and Systems, 2019, 12(4), pp. 378–389
39 2019 Developing audio data hiding scheme using random sample bits with logical operators
Jurnal: Indonesian Journal of Electrical Engineering and Computer Science, 2019, 13(1), pp. 147–154
40 2019 Assessing centroid-based classification models for intrusion detection system using composite indicators
Jurnal: Procedia Computer Science, 2019, 161, pp. 665–676
41 2019 Analyzing the effect of block size on the quality of the stego audio
Jurnal: Proceedings - 2019 5th International Conference on Science and Technology, ICST 2019, vol.
42 2019 A new data hiding method for protecting bigger secret data
Jurnal: Proceedings of 2019 International Conference on Information and Communication Technology and Systems, vol.
43 2019 Protecting Secret Data using RDE and Fuzzy Logic to Specify the Embedding Level
Jurnal: Proceedings of the 2019 IEEE International Conference on Signal and Image Processing Applications, I, vol.
44 2019 Multiple embedding process for increasing the capacity of the embedded secret message
Jurnal: Proceedings of 2019 International Conference on Information and Communication Technology and Systems, vol.
45 2019 Hiding secret data in grayscale images by improving the method of reduced difference expansion
Jurnal: Proceedings of 2019 International Conference on Information and Communication Technology and Systems, vol.
46 2019 An Energy-Aware Computation Offloading Framework for a Mobile Crowdsensing Cluster Using DMIPS Appro
Jurnal: ICICOS 2019 - 3rd International Conference on Informatics and Computational Sciences: Accelerating I, vol.
47 2018 Securing secret data by enhancing the controlling expansion method
Jurnal: ICIC Express Letters, Part B: Applications, 2018, 9(11), pp. 1091–1099
48 2018 Protecting data by improving quality of stego image based on enhanced reduced difference expansion
Jurnal: International Journal of Electrical and Computer Engineering, 2018, 8(4), pp. 2468–2476
49 2018 Adaptive pixel value grouping for protecting secret data in public computer networks
Jurnal: Journal of Communications, 2018, 13(6), pp. 325–332
50 2018 Enhancing the performance of audio data hiding method by smoothing interpolated samples
Jurnal: International Journal of Innovative Computing, Information and Control, 2018, 14(3), pp. 767–779
51 2018 Detecting malicious activities in a computer cluster for developing dynamic honeypot
Jurnal: ICIC Express Letters, Part B: Applications, 2018, 9(3), pp. 257–264
52 2018 Enhancing the capability of data hiding method based on reduced difference expansion
Jurnal: Engineering Letters, 2018, 26(1), pp. 45–55
53 2018 Improving Prediction Error Expansion based data hiding method for securing confidential data
Jurnal: IAENG International Journal of Computer Science, 2018, 45(4), pp. 540–551
54 2018 An adaptive offloading framework for improving performance of applications in IoT devices using fuzzy multi criteria decision making
Jurnal: International Journal of Engineering and Technology(UAE), 2018, 7(4), pp. 31–36
55 2018 Analyzing the Performance of Machine Learning Algorithms in Anomaly Network Intrusion Detection Syst
Jurnal: Proceedings - 2018 4th International Conference on Science and Technology, ICST 2018, vol.
56 2018 A data hiding approach using enhanced-RDE in grayscale images
Jurnal: Proceeding - ICAMIMIA 2017: International Conference on Advanced Mechatronics, Intelligent Manufactu, vol.
57 2018 Enhanced pixel value modification based on modulus function for RGB image steganography
Jurnal: Proceedings of the 11th International Conference on Information and Communication Technology and Sys, vol. 2018-January
58 2018 Position-Based Scheme for Multi-Hop Routing Protocol in Cluster-Based Wireless Sensor Networks
Jurnal: Proceeding of 2018 4th International Conference on Wireless and Telematics, ICWT 2018, vol.
59 2018 SCFT: Sector-based cancelable fingeprint template
Jurnal: Proceedings - 9th Asia-Pacific Signal and Information Processing Association Annual Summit and Confe, vol. 2018-February
60 2018 Continuous Top-k Dominating Query of Incomplete Data over Data Streams
Jurnal: 3rd International Conference on Sustainable Information Engineering and Technology, SIET 2018 - Proc, vol.
61 2018 An Improved Secret Message Capacity Using Modulus Function Based Color Image Data Hiding
Jurnal: 2018 International Conference on Computer Engineering, Network and Intelligent Multimedia, CENIM 201, vol.
62 2017 Medical record protection with improved grde data hiding method on audio files
Jurnal: Engineering Letters, 2017, 25(2), pp. 112–124
63 2017 Increasing performance of IDS by selecting and transforming features
Jurnal: 2016 IEEE International Conference on Communication, Network, and Satellite, COMNETSAT 2016 - Procee, vol.
64 2017 A Study on Intrusion Detection Using Centroid-Based Classification
Jurnal: Procedia Computer Science, vol. 124
65 2017 Hiding secret data by using modulo function in quad difference expansion
Jurnal: 2016 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2016, vol.
66 2017 Adaptive image compression using Adaptive Huffman and LZW
Jurnal: Proceedings of 2016 International Conference on Information and Communication Technology and Systems, vol.
67 2017 Using Quality Threshold distance to detect intrusion in TCP/IP network
Jurnal: 2016 IEEE International Conference on Communication, Network, and Satellite, COMNETSAT 2016 - Procee, vol.
68 2017 Overlapped scheme for neighboring similarity method in video-based data hiding
Jurnal: IEEE Region 10 Annual International Conference, Proceedings/TENCON, vol.
69 2017 Edit distance weighting modification using phonetic and typographic letter grouping over homomorphic
Jurnal: Proceeding - 2017 3rd International Conference on Science in Information Technology: Theory and Appl, vol. 2018-January
70 2017 A mobile crowdsensing framework for integrating smartphone and IoT devices to cloud computing servic
Jurnal: ACM International Conference Proceeding Series, vol.
71 2017 Difference expansion-based data hiding method by changing expansion media
Jurnal: Advances in Intelligent Systems and Computing, vol. 549 AISC
72 2016 L-SCANN: Logarithmic subcentroid and nearest neighbor
Jurnal: Journal of Telecommunications and Information Technology, 2016, 2016(4), pp. 71–80
73 2016 Audio data hiding based on sample value modification using modulus function
Jurnal: Journal of Information Processing Systems, 2016, 12(3), pp. 525–537
74 2016 Increasing accuracy of process-based fraud detection using a behavior model
Jurnal: International Journal of Software Engineering and its Applications, 2016, 10(5), pp. 175–188
75 2016 Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale
Jurnal: Proceedings of 2015 International Conference on Information and Communication Technology and Systems, vol.
76 2016 Improving the performance of projection-based cancelable fingerprint template method
Jurnal: Proceedings of the 2015 7th International Conference of Soft Computing and Pattern Recognition, SoCP, vol.
77 2016 Enhancing DE-based data hiding method by controlling the expansion
Jurnal: Proceedings of 2016 4th International Conference on Cyber and IT Service Management, CITSM 2016, vol.
78 2016 An improved neighbouring similarity method for video steganography
Jurnal: Proceedings of 2016 4th International Conference on Cyber and IT Service Management, CITSM 2016, vol.
79 2015 Detecting Intrusion Using Recursive Clustering and Sum of Log Distance to Sub-centroid
Jurnal: Procedia Computer Science, 2015, 72, pp. 446–452
80 2015 Fuzzy MADM approach for rating of process-based fraud
Jurnal: Journal of ICT Research and Applications, 2015, 9(2), pp. 111–128
81 2015 Hybrid association rule learning and process mining for fraud detection
Jurnal: IAENG International Journal of Computer Science, 2015, 42(2), pp. 59–72
82 2015 Secret data hiding by optimizing general smoothness difference expansionbased method
Jurnal: Journal of Theoretical and Applied Information Technology, vol. 72
83 2015 Transforming minutiae for protecting fingerprint data
Jurnal: 2nd International Symposium on Technology Management and Emerging Technologies, ISTMET 2015 - Procee, vol.
84 2015 A context-awareness approach for improving reporting protocol for activity and position tracking for
Jurnal: Proceedings - 2015 7th International Conference on Information Technology and Electrical Engineering, vol.
85 2014 Identification of process-based fraud patterns in credit application
Jurnal: 2014 2nd International Conference on Information and Communication Technology, ICoICT 2014, vol.
86 2014 Shared secret-based steganography for protecting medical data
Jurnal: Proceeding - 2014 International Conference on Computer, Control, Informatics and Its Applications: ", vol.
87 2014 Emoticon-based steganography for securing sensitive data
Jurnal: Proceedings - 2014 6th International Conference on Information Technology and Electrical Engineering, vol.
88 2014 A prototype of event-based tracking system for mobile users
Jurnal: 2014 4th World Congress on Information and Communication Technologies, WICT 2014, vol.