Pages Menu
TwitterRssFacebook
Categories Menu

Research & Publications

International Journal Publications (Selected)

2015

  1. Stiawan, D., Idris, M.Y., and Abdullah, A.H. (2015). Penetration Testing and Network Auditing: Linux. Journal of Information Processing Systems. Accepted on press (Scopus Indexed)

2014

  1. Stiawan, D., Idris, M.Y., and Abdullah, A.H. (2014). Threat and Vulnerability Penetration Testing: Linux. Journal of Internet Technology , Vol 15(3) (WOS and Scopus Indexed, Impact Factor: 0.5)
  2. Siti Nurmaini, Low-cost robotic sensor networks platform for air quality monitoring. WIT Transactions on Engineering Sciences.
  3. Siti Nurmaini, Bambang Tutuko. A New Navigation of Behavior-Based Olfactory Mobile Robot. Applied Mechanics and Materials

2013

  1. Stiawan, D., Idris, M.Y., and Abdullah, A.H. (2013). Attack and Vulnerability Penetration Testing: FreeBSD. TELKOMNIKA, 11(2), 399-408 (Scopus Indexed)
  2. Siti Nurmaini. Robotics Current Issues and Trends. Computer Engineering and Applications Journal
  3. Siti Nurmaini, Bambang Tutuko. Intelligent Mobile Olfaction of Swarm Robots. IAES International Journal of Robotics and Automation (IJRA)
  4. Reza Firsandaya Malik. An Analysis of Adaptive Approach for Document Binarization. Computer Engineering and Applications Journal
  5. Rossi Pasarella. Design Concept of Convexity Defect Method on Hand Gestures as Password Door Lock. Computer Engineering and Applications Journal

2012

  1. Stiawan, D., Shakhatreh, A.I., Idris, M.Y., Bakar, K.A and Abdullah, A.H. (2012). Intrusion Prevention System: A Survey. Journal of Theoretical and Applied Information Technology, 40(1), 44-54 (Scopus Indexed)

2011

  1. Stiawan, D., Idris, M.Y., Hussain, K., Ihsan, Z., Abdullah, A.H. (2011). Heterogeneous Parameters for Accuracy Threat. Journal of Theoretical and Applied Information Technology. 33(2), 142 – 154. (Scopus Indexed)
  2. Stiawan, D., Idris, M.Y., and Abdullah, A.H., (2011). Survey on Heterogeneous Data for Recognizing Threat. Journal of Computational Information Systems, 7(12), 4212-4224. (Scopus Indexed)
  3. Stiawan, D., Abdullah, A.H. and Idris, M.Y.(2011). Characterising Network Intrusion Prevention System. International Journal of Computer Applications, 14(1), pp.11-18.
  4. Siti Nurmaini. Intelligent Low Cost Mobile Robot and Environmental Classification. International Journal of Computer Applications, Vol 35, No.12. pp.1-7
  5. Reza Firsandaya Malik. The Multipoint Relays Selection using Particle Swarm Optimization in OLSR for File Transfer Protocol Application. 7th Jordanian International Electrical and Electronics Engineering Conference (IEEE and IET Jordan Section)
  6. Rossi Passarella. Design Concept Of Train Obstacle Detection System In Indonesia. International Journal of Research and Reviews in Applied Sciences

2010

  1. Stiawan, D., Abdullah, A.H. and Idris, M.Y. (2010). Classification of Habitual Activities in Behavior-based Network Detection. Journal of Computing, 2(8), 1-7
  2. Stiawan, D., Abdullah, A.H. and Idris, M.Y., (2010). The Prevention Threat of Behavior-based Signature using Pitcher Flow Architecture. International Journal of Computer Science and Network Security, 10(4), 289-294.
  3. Siti Nurmaini. A New Classification Technique in Mobile Robot Navigation based on Random Access Memory. TELKOMNIKA, Vol 9. No.3. pp.453-464

 

Book Chapter Publications 

ISBN

  1. Ihsan, Z., Idris, M.Y., Hussain, K., Stiawan, D. (2011). Protocol Share Based Traffic Rate Analysis (PSBTRA) for UDP Bandwidth Attack. Communications in Computer and Information Science (CCIS) Series of Springer. Vol 251. (Scopus Indexed)
  2. Siti Nurmaini. Intelligent Navigation for Embedded Mobile Robot: The Application of Embedded Controller. InTech Pub
  3. Reza Firsandaya Malik . Routing Optimization Scheme in Wireless Mesh Network: The Implementation of New Particle Swarm Optimization in OLSR. InTech Pub

 

International Conference Publications (Selected)

2015

2014

2013

  1. Siti Nurmaini. New Challenges in Air Quality Sensing using Robotic Sensor Network. IEE International Conference on Innovatioans in engineering and Technology (ICIET 2013)
  2. Rossi Passarella. Design Concept of State-Chart Method Application through Robot Motion Equipped With Webcam Features as E-Learning Media for Children. IEE International Conference on Innovatioans in engineering and Technology (ICIET 2013)

2012

2011

  1. Stiawan, D., Abdullah, A.H. and Idris, M.Y. (2011). Research on Heteregeneous Data for Recognizing Threat. International Conference on Software and Data Technologies (ICSOFT), Spain (Scopus Indexed)
  2. Stiawan, D., Abdullah, A.H. and Idris, M.Y. (2011). Pitcher Flow: Unified Integration for Intrusion Prevention System. International Conference on Computer Communication and Management (ICCCM). Sydney. 368-373
  3. Stiawan, D., Abdullah, A.H. and Idris, M.Y. (2010). The Trends of Intrusion Prevention System Network. International Conference on Education Technology and Computer (ICETC). Shanghai. 4(C), 217-22 (Scopus Indexed)
  4. Siti Nurmaini, Bambang TutukoA New Control Architecture in Mobile Robot Navigation based on IT2 Neuro-Fuzzy Controller. IEEE International Conference on Electrical Engineering and Informatics/ITB
  5. Huda Ubaya. Efficient TagtoTag Near Field Communication (NFC) Protocol for Secure Mobile Payment. Proceeding of International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME)
  6. Huda Ubaya. Multiple Handicapped System (EMHAS) Modelling. International Conference on Electrical Engineering and Informatics (ICEEI)

2010

  1. Stiawan, D., Abdullah, A.H. and Idris, M.Y. Reliability Measurement of Internet Services. International Conference on Green Computer
  2. Siti Nurmaini, Bambang Tutuko. Development weightless neural network on programmable chips to intelligent mobile robot. International Conference on Computer Science and Information  Technology Universitas Kristen Petra, Bali
  3. Siti Nurmaini, Bambang Tutuko, Zarkasih. Development Weightless Neural Network on Programmable Chips to Intelligent Mobile Robot. International Conference on Soft Computing, Intelligent System and Information Technology
  4. Erwin. Development of Steganography Software with Least Significant Bit and Substitution Monoalphabetic Cipher Methods for Security of Message Through Image. Proceeding of 2nd ICSIIT 2010 International Conference on Soft Computing, Intelligent system and Information Technology
  5. Rossi Passarella. Development of a Solar Car. Asia Pacific Industrial Engineering and Management Society

 

National Conference Publications (Selected)

 

Research

2015

2014

2013

2012

2011

2010

 

Share this page ...Share on Facebook0Tweet about this on TwitterShare on Google+0Email this to someonePrint this page