Search Results - "Basuki, Akbari Indra"
-
1
DDoS Protection System for SDN Network Based on Multi Controller and Load Balancer
Published in Sistemasi : jurnal sistem informasi (Online) (10-03-2024)“…DDoS attacks on SDN networks can create a single point of failure that has the potential to disrupt the overall network performance. In a single controller…”
Get full text
Journal Article -
2
Optimized Hybrid DCT-SVD Computation over Extremely Large Images
Published in Jurnal teknik elektro (20-12-2021)“…High performance computing (HPC) is required for image processing especially for picture element (pixel) with huge size. To avoid dependence to HPC equipment…”
Get full text
Journal Article -
3
Trade-off between Image Quality and Computational Complexity: Image Resizing Perspective
Published in Jurnal teknik elektro (10-10-2022)“…This study proposed a new approach for resizing image deal with quality and computational complexity. Here, previous methods in image resizing do analytical…”
Get full text
Journal Article -
4
Secure protection for covid-19 infographic using blockchain and discrete cosine transform-singular value decomposition (DCT-SVD) watermarking
Published in Jurnal infotel (Online) (31-05-2022)“…Covid-19 infographics have a crucial role in mitigating the covid-19 pandemic by conveying the complex Covid19 information in a form of a simple yet…”
Get full text
Journal Article -
5
Improving Efficiency on BFV-based Encrypted Watermarking using Hadamard Product Decomposition
Published in 2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS) (30-03-2022)“…Fully homomorphic encryption (FHE) enables arithmetic computation over encrypted data to preserve data privacy in the untrusted computing domain. Nevertheless,…”
Get full text
Conference Proceeding -
6
Sentralisasi Pengawasan Informasi Jaringan Menggunakan Blockchain Ethereum
Published in Jurnal teknologi informasi dan ilmu komputer (Online) (02-12-2020)“…Pengawasan jaringan pada beberapa kantor yang berlokasi berjauhan sangat sulit dilakukan kerana keterbatasan tenaga ahli, biaya, dan teknologi pendukung…”
Get full text
Journal Article -
7
CFPChain: An Optimization of Research Funding Selection System Employing A Consortium Blockchain Based Approach
Published in 2023 International Conference on Computer, Control, Informatics and its Applications (IC3INA) (04-10-2023)“…This paper addresses the challenges in the current centralized research funding selection system and proposes a solution using permissioned blockchain…”
Get full text
Conference Proceeding -
8
Network Flow-Based Dataset Generator Based on OpenFlow SDN
Published in 2023 International Conference on Information Technology and Computing (ICITCOM) (01-12-2023)“…Machine learning methods have solid accuracy in detecting cyber attacks at the network layer. Nevertheless, the per-packet detection model is not scalable for…”
Get full text
Conference Proceeding -
9
BC-MTD: Blockchain-driven Moving Target Defense for Secure Vehicle Access
Published in 2023 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET) (15-11-2023)“…Network-based vehicle access has become the norm for next-generation mobility. It enables remote monitoring and control over the vehicles, which eases user…”
Get full text
Conference Proceeding -
10
Joint Transaction-Image Steganography for High Capacity Covert Communication
Published in 2019 International Conference on Computer, Control, Informatics and its Applications (IC3INA) (01-10-2019)“…Conventional secret communications suffer from communication channel insecurity and lack of secrecy. Blockchain-based steganography comes up by proposing…”
Get full text
Conference Proceeding -
11
Preserving Network Privacy on Fine-grain Path-tracking Using P4-based SDN
Published in 2020 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET) (18-11-2020)“…Path-tracking is essential to provide complete information regarding network breach incidents. It records the direction of the attack and its source of origin…”
Get full text
Conference Proceeding -
12
Localizing link failures in legacy and SDN networks
Published in 2018 10th International Workshop on Resilient Networks Design and Modeling (RNDM) (01-08-2018)“…Localizing network link failures is crucial to guarantee sufficient network capacity and to efficiently manage network resources. However, since most of…”
Get full text
Conference Proceeding -
13
Visual Editor for Streamlining P4-based Programmable Parser Development
Published in 2021 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) (17-07-2021)“…P4 language enables new protocol development for advanced networking tasks such as dynamic monitoring, custom tunneling & routing, in-switch attack detection,…”
Get full text
Conference Proceeding -
14
Feasibility Evaluation of Compact Flow Features for Real-time DDoS Attacks Classifications
Published in 2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) (03-11-2022)“…According to the research trend, training the distributed denial of services (DDoS) attacks classifier using network flow features will yield higher…”
Get full text
Conference Proceeding -
15
Security Attack on Secret Sharing Based Watermarking Using Fractional Fourier Transform and Singular Value Decomposition
Published in 2020 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET) (18-11-2020)“…The secret sharing based watermarking scheme using the Fractional Fourier Transform (FrFT) and Singular Value Decomposition (SVD) has been proven to yield the…”
Get full text
Conference Proceeding -
16
Sub-Second Path Restoration for Stateful-based Segment Routing
Published in 2018 International Conference on Computer, Control, Informatics and its Applications (IC3INA) (01-11-2018)“…Stateful-based segment routing enables a controller-independent and a distributed segment routing on SDN networks by exploiting the state keeping mechanism of…”
Get full text
Conference Proceeding -
17
Collaborative Whitelist Packet Filtering Driven by Smart Contract Forum
Published in 2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) (01-12-2019)“…The massive spread of harmful content on the internet is hard to filter. Meanwhile, blacklist content filtering cannot keep up with the rapid growth of content…”
Get full text
Conference Proceeding -
18
Assuring Segment Routing Distributive-ness on OpenFlow Network with Stateful Data Plane
Published in 2018 International Conference on Information Technology Systems and Innovation (ICITSI) (01-10-2018)“…OpenFlow-based segment routing offers a programmable segment routing to support better network management such as a fine-grain traffic steering, nonECMP load…”
Get full text
Conference Proceeding -
19
Delay-tolerant-networks design and prospect on fishery communication networks
Published in 2014 IEEE 4th International Conference on System Engineering and Technology (ICSET) (01-11-2014)“…In archipelagic countries, vast maritime monitoring is a though problem. Non proportional comparison of sea patrols number to vast area of the sea is the main…”
Get full text
Conference Proceeding -
20
Secret and Trustable Communication Channel over Blockchain Public Ledger
Published in 2021 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT) (17-07-2021)“…Blockchain public ledger is a trusted medium that provides incorruptible data storage and traceable transactions. However, due to its public verifiability, it…”
Get full text
Conference Proceeding