Follow
Supeno Djanali
Title
Cited by
Cited by
Year
Aggressive web application honeypot for exposing attacker's identity
S Djanali, FX Arunanto, BA Pratomo, A Baihaqi, H Studiawan, ...
2014 The 1st international conference on information technology, computer …, 2014
332014
Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale images
MHA Al Huti, T Ahmad, S Djanali
2015 International Conference on Information & Communication Technology and …, 2015
202015
SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker
S Djanali, FX Arunanto, BA Pratomo, H Studiawan, SG Nugraha
2014 International Symposium on Technology Management and Emerging …, 2014
192014
A study on intrusion detection using centroid-based classification
B Setiawan, S Djanali, T Ahmad
Procedia Computer Science 124, 672-681, 2017
162017
Audio data hiding based on sample value modification using modulus function
MHA Al-Hooti, S Djanali, T Ahmad
Journal of information processing systems 12 (3), 525-537, 2016
152016
Feature extraction using combination of intrinsic mode functions and power spectrum for EEG signal classification
H Tjandrasa, S Djanali, FX Arunanto
2016 9th International Congress on Image and Signal Processing, BioMedical …, 2016
132016
Classification of EEG signals using single channel independent component analysis, power spectrum, and linear discriminant analysis
H Tjandrasa, S Djanali
Advances in Machine Learning and Signal Processing, 259-268, 2016
132016
Increasing accuracy and completeness of intrusion detection model using fusion of normalization, feature selection method and support vector machine
B Setiawan, S Djanali, T Ahmad, ITS Nopember
Int. J. Intell. Eng. Syst 12 (4), 378-389, 2019
122019
Text mining for pest and disease identification on rice farming with interactive text messaging
E Da Costa, H Tjandrasa, S Djanali
International Journal of Electrical and Computer Engineering 8 (3), 1671, 2018
122018
Optimasi Routing pada Jaringan MANET Menggunakan MEDSR dan LET
AH Jatmika, S Djanali, M Husni
Magister, Institut Teknologi Sepuluh Nopember, Surabaya, 2011
102011
Assessing centroid-based classification models for intrusion detection system using composite indicators
B Setiawan, S Djanali, T Ahmad, MN Aziz
Procedia Computer Science 161, 665-676, 2019
82019
Analisa kinerja resource-aware framework pada algoritma light-weight frequent item (LWF)
JM Parenreng, S Djanali, AM Shiddiqi
Proceeding SNPI ITS Surabaya, 2010
82010
Current update of higher education in Indonesia
S Djanali
Seameo Rihed, 2005
82005
Kinerja Protokol Routing Pada Lingkungan Wireless Mesh Network Dengan Combined Scalable Video Coding
PH Rantelinggi
INA-Rxiv, 2018
72018
Performance analysis of resource-aware framework classification, clustering and frequent items in wireless sensor networks
JM Parenreng, MI Syarif, S Djanali, AM Shiddiqi
Proceeding of the International Conference on e-Education, Entertainment and …, 2011
72011
Design and development of voting data security for electronic voting (E-Voting)
S Djanali, BA Pratomo, KPN Cipto, A Koesriputranto, H Studiawan
2016 4th International Conference on Information and Communication …, 2016
62016
Audio data hiding using octal modulus function based unsigned integer sample values
MHA Al-Hooti, T Ahmad, S Djanali
2018 International Conference on Computer Engineering, Network and …, 2018
52018
Classification of P300 event-related potentials using wavelet transform, MLP, and soft margin SVM
H Tjandrasa, S Djanali
2018 Tenth International Conference on Advanced Computational Intelligence …, 2018
52018
AODV-PNT performance study with added factor number of neighbor nodes on vanet
G Arifiyan, S Djanali, R Anggoro
IPTEK Journal of Proceedings Series, 69-71, 2018
52018
CORO: GRAPH-BASED AUTOMATIC INTRUSION DETECTION SYSTEM SIGNATURE GENERATOR FOR E-VOTING PROTECTION.
S Djanali, ADIP BASKORO, H Studiawan, R Anggoro, TC Henning
Journal of Theoretical & Applied Information Technology 81 (3), 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20