Supeno Djanali
Cited by
Cited by
Aggressive web application honeypot for exposing attacker's identity
S Djanali, FX Arunanto, BA Pratomo, A Baihaqi, H Studiawan, ...
2014 the 1st international conference on information technology, computer …, 2014
SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker
S Djanali, FX Arunanto, BA Pratomo, H Studiawan, SG Nugraha
2014 International Symposium on Technology Management and Emerging …, 2014
Increasing accuracy and completeness of intrusion detection model using fusion of normalization, feature selection method and support vector machine
B Setiawan, S Djanali, T Ahmad, ITS Nopember
Int. J. Intell. Eng. Syst 12 (4), 378-389, 2019
Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale images
MHA Al Huti, T Ahmad, S Djanali
2015 International Conference on Information & Communication Technology and …, 2015
A study on intrusion detection using centroid-based classification
B Setiawan, S Djanali, T Ahmad
Procedia Computer Science 124, 672-681, 2017
Audio data hiding based on sample value modification using modulus function
MHA Al-Hooti, S Djanali, T Ahmad
Journal of information processing systems 12 (3), 525-537, 2016
Feature extraction using combination of intrinsic mode functions and power spectrum for EEG signal classification
H Tjandrasa, S Djanali, FX Arunanto
2016 9th International Congress on Image and Signal Processing, BioMedical …, 2016
Text mining for pest and disease identification on rice farming with interactive text messaging
E Da Costa, H Tjandrasa, S Djanali
International Journal of Electrical and Computer Engineering 8 (3), 1671, 2018
Classification of EEG signals using single channel independent component analysis, power spectrum, and linear discriminant analysis
H Tjandrasa, S Djanali
Advances in Machine Learning and Signal Processing: Proceedings of MALSIP …, 2016
Assessing centroid-based classification models for intrusion detection system using composite indicators
B Setiawan, S Djanali, T Ahmad, MN Aziz
Procedia Computer Science 161, 665-676, 2019
Optimasi Routing pada Jaringan MANET Menggunakan MEDSR dan LET
AH Jatmika, S Djanali, M Husni
Magister, Institut Teknologi Sepuluh Nopember, Surabaya, 2011
Kinerja Protokol Routing Pada Lingkungan Wireless Mesh Network Dengan Combined Scalable Video Coding
PH Rantelinggi
INA-Rxiv, 2015
Audio data hiding using octal modulus function based unsigned integer sample values
MHA Al-Hooti, T Ahmad, S Djanali
2018 International Conference on Computer Engineering, Network and …, 2018
Classification of P300 event-related potentials using wavelet transform, MLP, and soft margin SVM
H Tjandrasa, S Djanali
2018 Tenth International Conference on Advanced Computational Intelligence …, 2018
Performance analysis of resource-aware framework classification, clustering and frequent items in wireless sensor networks
JM Parenreng, MI Syarif, S Djanali, AM Shiddiqi
Proceeding of the International Conference on e-Education, Entertainment and …, 2011
Analisa kinerja resource-aware framework pada algoritma light-weight frequent item (LWF)
JM Parenreng, S Djanali, AM Shiddiqi
Proceeding SNPI ITS Surabaya, 2010
Current update of higher education in Indonesia
S Djanali
Seameo Rihed, 2005
Design and development of voting data security for electronic voting (E-Voting)
S Djanali, BA Pratomo, KPN Cipto, A Koesriputranto, H Studiawan
2016 4th International Conference on Information and Communication …, 2016
Coro: graph-based automatic intrusion detection system signature generator for evoting protection
S Djanali, PB Adi, H Studiawan, R Anggoro, TC Henning
Journal of Theoretical and Applied Information Technology 81 (3), 535-546, 2015
Developing audio data hiding scheme using random sample bits with logical operators
MHA Al-Hooti, T Ahmad, S Djanali
Indonesian Journal of Electrical Engineering and Computer Science 13 (1 …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20