Follow
Supeno Djanali
Title
Cited by
Cited by
Year
Aggressive web application honeypot for exposing attacker's identity
S Djanali, FX Arunanto, BA Pratomo, A Baihaqi, H Studiawan, ...
2014 the 1st international conference on information technology, computer …, 2014
382014
SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker
S Djanali, FX Arunanto, BA Pratomo, H Studiawan, SG Nugraha
2014 International Symposium on Technology Management and Emerging …, 2014
242014
Increasing accuracy and completeness of intrusion detection model using fusion of normalization, feature selection method and support vector machine
B Setiawan, S Djanali, T Ahmad, I Nopember
Int. J. Intell. Eng. Syst 12 (4), 378-389, 2019
232019
Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale images
MHA Al Huti, T Ahmad, S Djanali
2015 International Conference on Information & Communication Technology and …, 2015
232015
Audio data hiding based on sample value modification using modulus function
MHA Al-Hooti, S Djanali, T Ahmad
Journal of information processing systems 12 (3), 525-537, 2016
202016
A study on intrusion detection using centroid-based classification
B Setiawan, S Djanali, T Ahmad
Procedia Computer Science 124, 672-681, 2017
192017
Feature extraction using combination of intrinsic mode functions and power spectrum for EEG signal classification
H Tjandrasa, S Djanali, FX Arunanto
2016 9th International Congress on Image and Signal Processing, BioMedical …, 2016
182016
Text mining for pest and disease identification on rice farming with interactive text messaging
E Da Costa, H Tjandrasa, S Djanali
International Journal of Electrical and Computer Engineering 8 (3), 1671, 2018
152018
Classification of EEG signals using single channel independent component analysis, power spectrum, and linear discriminant analysis
H Tjandrasa, S Djanali
Advances in Machine Learning and Signal Processing: Proceedings of MALSIP …, 2016
142016
Assessing centroid-based classification models for intrusion detection system using composite indicators
B Setiawan, S Djanali, T Ahmad, MN Aziz
Procedia Computer Science 161, 665-676, 2019
112019
Optimasi Routing pada Jaringan MANET Menggunakan MEDSR dan LET
AH Jatmika, S Djanali, M Husni
Magister, Institut Teknologi Sepuluh Nopember, Surabaya, 2011
112011
Kinerja Protokol Routing Pada Lingkungan Wireless Mesh Network Dengan Combined Scalable Video Coding
PH Rantelinggi
INA-Rxiv, 2015
102015
Aodv-pnt performance study with added factor number of neighbor nodes on vanet
G Arifiyan, S Djanali, R Anggoro
IPTEK Journal of Proceedings Series, 69-71, 2018
92018
Audio data hiding using octal modulus function based unsigned integer sample values
MHA Al-Hooti, T Ahmad, S Djanali
2018 International Conference on Computer Engineering, Network and …, 2018
82018
Classification of P300 event-related potentials using wavelet transform, MLP, and soft margin SVM
H Tjandrasa, S Djanali
2018 Tenth International Conference on Advanced Computational Intelligence …, 2018
82018
Performance analysis of resource-aware framework classification, clustering and frequent items in wireless sensor networks
JM Parenreng, MI Syarif, S Djanali, AM Shiddiqi
Proceeding of the International Conference on e-Education, Entertainment and …, 2011
82011
Analisa kinerja resource-aware framework pada algoritma light-weight frequent item (LWF)
JM Parenreng, S Djanali, AM Shiddiqi
Proceeding SNPI ITS Surabaya, 2010
82010
Current update of higher education in Indonesia
S Djanali
Seameo Rihed, 2005
82005
Coro: graph-based automatic intrusion detection system signature generator for evoting protection
S Djanali, PB Adi, H Studiawan, R Anggoro, TC Henning
Journal of Theoretical and Applied Information Technology 81 (3), 535-546, 2015
72015
Developing audio data hiding scheme using random sample bits with logical operators
MHA Al-Hooti, T Ahmad, S Djanali
Indonesian Journal of Electrical Engineering and Computer Science 13 (1 …, 2019
62019
The system can't perform the operation now. Try again later.
Articles 1–20