Search Results - "Basuki, Akbari Indra"

Refine Results
  1. 1

    DDoS Protection System for SDN Network Based on Multi Controller and Load Balancer by Ulfa, Husnul, Basuki, Akbari Indra, Suranegara, Galura Muhammad, Fauzi, Ahmad

    “…DDoS attacks on SDN networks can create a single point of failure that has the potential to disrupt the overall network performance. In a single controller…”
    Get full text
    Journal Article
  2. 2

    Optimized Hybrid DCT-SVD Computation over Extremely Large Images by Setiawan, Iwan, Basuki, Akbari Indra, Rosiyadi, Didi

    Published in Jurnal teknik elektro (20-12-2021)
    “…High performance computing (HPC) is required for image processing especially for picture element (pixel) with huge size. To avoid dependence to HPC equipment…”
    Get full text
    Journal Article
  3. 3

    Trade-off between Image Quality and Computational Complexity: Image Resizing Perspective by Setiawan, Iwan, Dahlan, Rico, Basuki, Akbari Indra, Susanto, Heru, Rosiyadi, Didi

    Published in Jurnal teknik elektro (10-10-2022)
    “…This study proposed a new approach for resizing image deal with quality and computational complexity. Here, previous methods in image resizing do analytical…”
    Get full text
    Journal Article
  4. 4

    Secure protection for covid-19 infographic using blockchain and discrete cosine transform-singular value decomposition (DCT-SVD) watermarking by Sidiq, Muhammad Fajar, Basuki, Akbari Indra, Rosiyadi, Didi, Setiawan, Iwan, Siregar, Yusnan Hasani, Sriyadi, Sriyadi

    Published in Jurnal infotel (Online) (31-05-2022)
    “…Covid-19 infographics have a crucial role in mitigating the covid-19 pandemic by conveying the complex Covid19 information in a form of a simple yet…”
    Get full text
    Journal Article
  5. 5

    Improving Efficiency on BFV-based Encrypted Watermarking using Hadamard Product Decomposition by Basuki, Akbari Indra, Setiawan, Iwan, Rosiyadi, Didi

    “…Fully homomorphic encryption (FHE) enables arithmetic computation over encrypted data to preserve data privacy in the untrusted computing domain. Nevertheless,…”
    Get full text
    Conference Proceeding
  6. 6

    Sentralisasi Pengawasan Informasi Jaringan Menggunakan Blockchain Ethereum by Sidiq, Muhammad Fajar, Basuki, Akbari Indra, Firdaus, Halim, Baihaqi, Muhammad Aldi

    “…Pengawasan jaringan pada beberapa kantor yang berlokasi berjauhan sangat sulit dilakukan kerana keterbatasan tenaga ahli, biaya, dan teknologi pendukung…”
    Get full text
    Journal Article
  7. 7

    CFPChain: An Optimization of Research Funding Selection System Employing A Consortium Blockchain Based Approach by Ramdhani, Taufik Iqbal, Basuki, Akbari Indra, Susanto, Heru, Umbara, Raditya Panji, Arifin, Samsul, Faiza, Ninon Nurul

    “…This paper addresses the challenges in the current centralized research funding selection system and proposes a solution using permissioned blockchain…”
    Get full text
    Conference Proceeding
  8. 8

    Network Flow-Based Dataset Generator Based on OpenFlow SDN by Sidiq, Muhammad Fajar, Basuki, Akbari Indra, Haris, Arief Indriarto, Ferianda, Rd Angga, Surya Dilaga Yasin, Muhammad Hilva, Ulfa, Husnul, Salim, Taufik Ibnu, Taufik Yuniantoro, Raden Muhammad, Rosiyadi, Didi

    “…Machine learning methods have solid accuracy in detecting cyber attacks at the network layer. Nevertheless, the per-packet detection model is not scalable for…”
    Get full text
    Conference Proceeding
  9. 9

    BC-MTD: Blockchain-driven Moving Target Defense for Secure Vehicle Access by Sidiq, Muhammad Fajar, Basuki, Akbari Indra, Ramdhani, Taufik Iqbal, Setiawan, Iwan, Haris, Arief Indriarto, Rosiyadi, Didi, Susanto, Heru, Salim, Taufik Ibnu

    “…Network-based vehicle access has become the norm for next-generation mobility. It enables remote monitoring and control over the vehicles, which eases user…”
    Get full text
    Conference Proceeding
  10. 10

    Joint Transaction-Image Steganography for High Capacity Covert Communication by Basuki, Akbari Indra, Rosiyadi, Didi

    “…Conventional secret communications suffer from communication channel insecurity and lack of secrecy. Blockchain-based steganography comes up by proposing…”
    Get full text
    Conference Proceeding
  11. 11

    Preserving Network Privacy on Fine-grain Path-tracking Using P4-based SDN by Indra Basuki, Akbari, Rosiyadi, Didi, Setiawan, Iwan

    “…Path-tracking is essential to provide complete information regarding network breach incidents. It records the direction of the attack and its source of origin…”
    Get full text
    Conference Proceeding
  12. 12

    Localizing link failures in legacy and SDN networks by Basuki, Akbari Indra, Kuipers, Fernando

    “…Localizing network link failures is crucial to guarantee sufficient network capacity and to efficiently manage network resources. However, since most of…”
    Get full text
    Conference Proceeding
  13. 13

    Visual Editor for Streamlining P4-based Programmable Parser Development by Sidiq, Muhammad Fajar, Pranata, Mega, Basuki, Akbari Indra

    “…P4 language enables new protocol development for advanced networking tasks such as dynamic monitoring, custom tunneling & routing, in-switch attack detection,…”
    Get full text
    Conference Proceeding
  14. 14

    Feasibility Evaluation of Compact Flow Features for Real-time DDoS Attacks Classifications by Sidiq, Muhammad Fajar, Iryani, Nanda, Basuki, Akbari Indra, Haris, Arief Indriarto, Ferianda, Rd Angga

    “…According to the research trend, training the distributed denial of services (DDoS) attacks classifier using network flow features will yield higher…”
    Get full text
    Conference Proceeding
  15. 15

    Security Attack on Secret Sharing Based Watermarking Using Fractional Fourier Transform and Singular Value Decomposition by Rosiyadi, Didi, Prasetyo, Heri, Horng, Shi Jinn, Indra Basuki, Akbari

    “…The secret sharing based watermarking scheme using the Fractional Fourier Transform (FrFT) and Singular Value Decomposition (SVD) has been proven to yield the…”
    Get full text
    Conference Proceeding
  16. 16

    Sub-Second Path Restoration for Stateful-based Segment Routing by Basuki, Akbari Indra, Krisnandi, Dikdik, Wardoyo, Riyo, Syamsi, Djohar

    “…Stateful-based segment routing enables a controller-independent and a distributed segment routing on SDN networks by exploiting the state keeping mechanism of…”
    Get full text
    Conference Proceeding
  17. 17

    Collaborative Whitelist Packet Filtering Driven by Smart Contract Forum by Wibowo, Fahrudin Mukti, Sidiq, Muhammad Fajar, Akbar, Imadudin Alif, Basuki, Akbari Indra, Rosiyadi, Didi

    “…The massive spread of harmful content on the internet is hard to filter. Meanwhile, blacklist content filtering cannot keep up with the rapid growth of content…”
    Get full text
    Conference Proceeding
  18. 18

    Assuring Segment Routing Distributive-ness on OpenFlow Network with Stateful Data Plane by Basuki, Akbari Indra, Sidiq, Muhammad Fajar, Syamsi, Djohar

    “…OpenFlow-based segment routing offers a programmable segment routing to support better network management such as a fine-grain traffic steering, nonECMP load…”
    Get full text
    Conference Proceeding
  19. 19

    Delay-tolerant-networks design and prospect on fishery communication networks by Basuki, Akbari Indra, Wuryandari, Aciek Ida

    “…In archipelagic countries, vast maritime monitoring is a though problem. Non proportional comparison of sea patrols number to vast area of the sea is the main…”
    Get full text
    Conference Proceeding
  20. 20

    Secret and Trustable Communication Channel over Blockchain Public Ledger by Sidiq, Muhammad Fajar, Wibowo, Fahrudin Mukti, Wibowo, Merlinda, Basuki, Akbari Indra, Setiawan, Iwan, Rosiyadi, Didi

    “…Blockchain public ledger is a trusted medium that provides incorruptible data storage and traceable transactions. However, due to its public verifiability, it…”
    Get full text
    Conference Proceeding