Aggressive web application honeypot for exposing attacker's identity S Djanali, FX Arunanto, BA Pratomo, A Baihaqi, H Studiawan, ... 2014 the 1st international conference on information technology, computer …, 2014 | 38 | 2014 |
SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker S Djanali, FX Arunanto, BA Pratomo, H Studiawan, SG Nugraha 2014 International Symposium on Technology Management and Emerging …, 2014 | 24 | 2014 |
Increasing accuracy and completeness of intrusion detection model using fusion of normalization, feature selection method and support vector machine B Setiawan, S Djanali, T Ahmad, I Nopember Int. J. Intell. Eng. Syst 12 (4), 378-389, 2019 | 23 | 2019 |
Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale images MHA Al Huti, T Ahmad, S Djanali 2015 International Conference on Information & Communication Technology and …, 2015 | 23 | 2015 |
Audio data hiding based on sample value modification using modulus function MHA Al-Hooti, S Djanali, T Ahmad Journal of information processing systems 12 (3), 525-537, 2016 | 20 | 2016 |
A study on intrusion detection using centroid-based classification B Setiawan, S Djanali, T Ahmad Procedia Computer Science 124, 672-681, 2017 | 19 | 2017 |
Feature extraction using combination of intrinsic mode functions and power spectrum for EEG signal classification H Tjandrasa, S Djanali, FX Arunanto 2016 9th International Congress on Image and Signal Processing, BioMedical …, 2016 | 18 | 2016 |
Text mining for pest and disease identification on rice farming with interactive text messaging E Da Costa, H Tjandrasa, S Djanali International Journal of Electrical and Computer Engineering 8 (3), 1671, 2018 | 15 | 2018 |
Classification of EEG signals using single channel independent component analysis, power spectrum, and linear discriminant analysis H Tjandrasa, S Djanali Advances in Machine Learning and Signal Processing: Proceedings of MALSIP …, 2016 | 14 | 2016 |
Assessing centroid-based classification models for intrusion detection system using composite indicators B Setiawan, S Djanali, T Ahmad, MN Aziz Procedia Computer Science 161, 665-676, 2019 | 11 | 2019 |
Optimasi Routing pada Jaringan MANET Menggunakan MEDSR dan LET AH Jatmika, S Djanali, M Husni Magister, Institut Teknologi Sepuluh Nopember, Surabaya, 2011 | 11 | 2011 |
Kinerja Protokol Routing Pada Lingkungan Wireless Mesh Network Dengan Combined Scalable Video Coding PH Rantelinggi INA-Rxiv, 2015 | 10 | 2015 |
Aodv-pnt performance study with added factor number of neighbor nodes on vanet G Arifiyan, S Djanali, R Anggoro IPTEK Journal of Proceedings Series, 69-71, 2018 | 9 | 2018 |
Audio data hiding using octal modulus function based unsigned integer sample values MHA Al-Hooti, T Ahmad, S Djanali 2018 International Conference on Computer Engineering, Network and …, 2018 | 8 | 2018 |
Classification of P300 event-related potentials using wavelet transform, MLP, and soft margin SVM H Tjandrasa, S Djanali 2018 Tenth International Conference on Advanced Computational Intelligence …, 2018 | 8 | 2018 |
Performance analysis of resource-aware framework classification, clustering and frequent items in wireless sensor networks JM Parenreng, MI Syarif, S Djanali, AM Shiddiqi Proceeding of the International Conference on e-Education, Entertainment and …, 2011 | 8 | 2011 |
Analisa kinerja resource-aware framework pada algoritma light-weight frequent item (LWF) JM Parenreng, S Djanali, AM Shiddiqi Proceeding SNPI ITS Surabaya, 2010 | 8 | 2010 |
Current update of higher education in Indonesia S Djanali Seameo Rihed, 2005 | 8 | 2005 |
Coro: graph-based automatic intrusion detection system signature generator for evoting protection S Djanali, PB Adi, H Studiawan, R Anggoro, TC Henning Journal of Theoretical and Applied Information Technology 81 (3), 535-546, 2015 | 7 | 2015 |
Developing audio data hiding scheme using random sample bits with logical operators MHA Al-Hooti, T Ahmad, S Djanali Indonesian Journal of Electrical Engineering and Computer Science 13 (1 …, 2019 | 6 | 2019 |