Laboratorium Komputasi Berbasis Jaringan

Service Desk

Silahkan menghubungi ServiceDesk ITS, apabila ada permasalahan mengenai email, hosting, domain, maupun permasalahan yang terkait kepegawaian / sdmo.

Laboratorium Komputasi Berbasis Jaringan

Tohari Ahmad, S.Kom,MIT, Ph.D

Kepala Laboratorium
Email: tohari@if.its.ac.id
initial, TA

Selamat Datang di halaman Laboratorium Komputasi Berbasis Jaringan.

Di Laboratorium ini ditawarkan bidang keahlian yang ditekankan pada Kemampuan lulusan dalam membangun infrastruktur jaringan yang aman, kemampuan membangun sistem grid, Kemampuan membangun aplikasi jaringan sesuai Standard dan Kemampuan membangun aplikasi multimedia berbasis jaringan.

Mata kuliah bidang keahlian KBJ, antara lain:

  • Komputasi Bergerak,
  • Sistem Terdistribusi,
  • Jaringan Multimedia,
  • Komputasi Grid dan Paralel,
  • Kompresi Data,
  • Topik Khusus Komputasi berbasis Jaringan,
  • Komputasi Awan,
  • Forensik Digital,
  • Komputasi Pervasif dan Jaringan Sensor

Fasilitas

Penelitian

  1. Pengembangan Metode Proteksi untuk Menjaga Keamanan Data dan privasi Pengguna: (Tohari Ahmad, Ph.D dan team)
  2. Pengembangan Protokol Pengiriman dan Agregasi Data Untuk Penghematan Energi dan Penjaminan Reliabilitas Pengiriman Data Pada Lingkungan Wireless Sensor Network: (Waskitho Wibisono, Ph.D dan team)
  1. Rancang bangun mekanisme transformasi untuk pengamanan data: (Tohari Ahmad, Ph.D dan team)
  2. Immunity-based System for Wireless Sensor Network: (Waskitho Wibisono, Ph.D dan team)
  3. Pengembangan Mekanisme Clustering Sensor Node Secara Adaptif pada Lingkungan jaringan Sensor Nirkabel untuk Pengaturan Distribusi Beban dan Penghematan Energi: (Waskitho Wibisono, Ph.D dan team)
  1. Electronic Voting: Sarana Untuk Pengamanan dan Validitas Pemilihan Umum di Indonesia: (Prof. Supeno Djanali dan team)
  2. Rancang bangun mekanisme transformasi untuk pengamanan data: (Tohari Ahmad, Ph.D dan team)
  3. Protecting Fingerprint Data for Securing User Polic: (Tohari Ahmad, Ph.D dan team)
  4. Rancang Bangun Sistem Tracking Posisi Multi User Pada Lingkungan Bergerak dengan Model Interaksi  Publish-Subscribe: tahun ke-2 (Waskitho Wibisono, Ph.D dan team)
  5. Pemanfaatan Kepadatan Lalu Lintas Kendaraan Roda Empat Untuk Mendukung Realibilitas Komunikasi pada Jaringan Ad-Hoc Dalam Kota: (Dr.Eng Radityo Anggoro dan team)
  1. Klaster Server Honeypot dengan Raspberry Pi untuk Aplikasi Pelaporan Perilaku Peretas, Hibah Penelitian Laboratorium: tahun ke-2 (Prof. Supeno Djanali dan team)
  2. Pengembangan Teknik Steganography Pada Citra Medis Untuk Menjaga Privasi Pasien, Hibah Penelitian Lab-based Education: tahun ke-2 (Tohari Ahmad, Ph.D dan team)
  3. Pengembangan Perangkat Lunak Modul Plug-In Simulasi Sebagai Alat Bantu Ajar Untuk Konten E-Learning Pada Moodle Learning Management Systems Berbasis Teknologi HTML5, Hibah Penelitian Lab-based Education: tahun ke-2 (Royyana Muslim Ijtihadie, Ph.D dan team)
  4. Rancang Bangun Sistem Tracking Posisi Multi User Pada Lingkungan Bergerak dengan Model Interaksi Publish-Subscribe, Hibah Penelitian Lab-based Education (Waskitho Wibisono, Ph.D dan team)
  1. Klaster Server Honeypot dengan Raspberry Pi untuk Aplikasi Pelaporan Perilaku Peretas, Hibah Penelitian Laboratorium (Prof. Supeno Djanali dan team)
  2.  Pengembangan Sistem TIK untuk Mendukung Keselamatan Transportasi Kereta Api, Penelitian Strategis Nasional (Prof. Supeno Djanali dan team)
  3. Sistem Realtime Untuk Monitoring Aktivitas Fisik User Bergerak Dengan Penghematan Energi, Hibah Penelitian Laboratorium (Waskitho Wibisono, Ph.D dan team)
  4. Pengembangan Teknik Steganography Pada Citra Medis Untuk Menjaga Privasi Pasien, Hibah Penelitian Lab-based Education (Tohari Ahmad, Ph.D dan team)
  5. Pengembangan Perangkat Lunak Modul Plug-In Simulasi Sebagai Alat Bantu Ajar Untuk Konten E-Learning Pada Moodle Learning Management Systems Berbasis Teknologi HTML5, Hibah Penelitian Lab-based Education (Royyana Muslim Ijtihadie, Ph.D dan team)
  6. Overlay network infrastructure for supporting content synchronization over multiple Learning Management Systems, Batch 3 PREDICT2 JICA Joint Research, (Royyana Muslim Ijtihadie, Ph.D dan team)

Publikasi

Journal

  1. Hudan Studiawan, Supeno Djanali, Baskoro Adi Pratomo, Graph-based forensic analysis of web honeypot, Journal of Telecommunications and Information Technology (JTIT), Vol. 2016 No. 2, pp. 60-65
  2. Mohammed Hatem Ali Al-Hooti, Supeno Djanali, and Tohari Ahmad, Audio Data Hiding Based on Sample Value Modification Using Modulus Function, Journal of Information Processing Systems, 12, 3, (2016), 525~537. DOI: 10.3745/JIPS.03.0054.
  3. Solichul Huda, Riyanarto Sarno, Tohari Ahmad, Increasing accuracy of process-based fraud detection using a behavior model, International Journal of Software Engineering and its Applications, Vol. 10, No. 5 (2016), pp. 175-188
  4. Tohari Ahmad, Kharisma Muchammad, L-SCANN: Logarithmic Subcentroid and Nearest Neighbor, Journal of Telecommunications and Information Technology (JTIT), Vol. 2016 No. 4, pp. 71-80

Conference

  1. Diksy M. Firmansyah, Tohari Ahmad, An Improved Neighbouring Similarity Method for Video Steganography, The 4th International Conference on Information Technology for Cyber and IT Service Management (CITSM 2016), 26-27 April 2016, Bandung, Indonesia
  2. Dwi S. Angreni, Tohari Ahmad, Enhancing DE-based Data Hiding Method by Controlling the Expansion, The 4th International Conference on Information Technology for Cyber and IT Service Management (CITSM 2016), 26-27 April 2016, Bandung, Indonesia
  3. Tohari Ahmad, Diksy M. Firmansyah, Dwi S. Angreni, Difference Expansion-based Data Hiding Method by Changing Expansion Media, Recent Advances on Soft Computing and Data Mining. SCDM 2016. Advances in Intelligent Systems and Computing, vol 549. Springer
  4. Yogi Kurniawan, Lidya Amalia Rahmania, Tohari Ahmad, Waskitho Wibisono, Royyana M. Ijtihadie, Hiding Secret Data by using Modulo Function in Quad Difference Expansion, International Conference on Advanced Computer Science and Information Systems (ICACSIS), October 15-16, 2016, Malang, Indonesia.
  5. Djuned Fernando Dusdek, Hudan Studiawan, Tohari Ahmad, Adaptive Image Compression Using Adaptive Huffman and LZW, International Conference on Information Communication Technology and System (ICTS), 12 Oktober 2016, Surabaya, Indonesia
  6. Diksy M. Firmansyah, Tohari Ahmad, Overlapped scheme for neighboring similarity method in video-based data hiding, IEEE TENCON, 22-25 November 2016, Singapore
  7. Indera Zainul Muttaqien, Tohari Ahmad, Increasing Performance of IDS by Selecting and Transforming Features, IEEE Comnetsat, Desember 2016, Surabaya, Indonesia
  8. Hatungimana Gervais, Abdul Munif, Tohari Ahmad, Using Quality Threshold Distance to Detect Intrusion in TCP/IP Network, IEEE Comnetsat, Desember 2016, Surabaya, Indonesia

Journal

  1. Riyanarto Sarno, Rahadian Dustrial Dewandono, Tohari Ahmad, Mohammad Farid Naufal, and Fernandes Sinaga, Hybrid Association Rule Learning and Process Mining for Fraud Detection, IAENG International Journal of Computer Science, vol. 42, no.2, pp59-72, 2015
  2. Solichul Huda, Riyanarto Sarno, Tohari Ahmad, Fuzzy MADM Approach for Rating of Process-Based Fraud,  Journal of ICT Research and Applications, vol. 9, No. 2, 2015, hal 111-128, ISSN: 2337-5787
  3. Muhammad Holil, Tohari Ahmad, Secret Data Hiding by Optimizing General Smoothness Difference Expansion-based Method, Journal of Theoretical and Applied Information Technology, Vol.72 No.2, 2015
  4. Septian Geges, Waskitho Wibisono, Pengembangan Pencegahan Serangan Distributed Denial Of Service (DDOS) Pada Sumber Daya Jaringan Dengan Integrasi Network Behavior Analysis Dan Client Puzzle, Jurnal Ilmiah Teknologi Informasi (JUTI), Vol. 13 No 1, 2015
  5. Parma Hadi Rantelinggi, Supeno DjanaliKinerja Protokol Routing Pada Lingkungan Wireless Mesh Network Dengan Combined Scalable Video Coding, Jurnal Ilmiah Teknologi Informasi (JUTI), Vol. 13 No 1, 2015
  6. Yohanes I. Riskajaya, Tohari Ahmad, Pengembangan Metode Seleksi Titik Minutiae pada Sidik Jari dengan Radius Ketetanggaan, Jurnal Ilmiah Teknologi Informasi (JUTI), Vol. 13 No 1, 2015

Conference

  1. Tohari Ahmad, Herleeyandi Markoni, Waskitho Wibisono, Royyana Ijtihadie, Transforming Minutiae for Protecting Fingerprint Data, 2015 2nd International Symposium on Technology Management and Emerging Technologies (IEEE), 25-27 August 2015, Langkawi, Malaysia
  2. Mohammed Hatem Ali AL_Huti, Tohari Ahmad, Supeno Djanali, Increasing the capacity of the secret data using  DE pixels blocks and adjusted RDE-based on Grayscale Images, The 9th International Conference on Information & Communication Technology and Systems (ICTS 2015), September 2015, Surabaya, Indonesia
  3. Waskitho Wibisono, Annisaa Sri Indrawanti, Tohari Ahmad, A context-awareness approach for improving reporting protocol for activity and position tracking for social networking services, 
    2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE), 29-30 Oct. 2015, Chiang Mai, Thailand
  4. Kharisma Muchammad, Tohari Ahmad, Detecting Intrusion Using Recursive Clustering and Sum of Log Distance to Sub-centroid, The Third Information Systems International Conference, November 2015, Surabaya, Indonesia
  5. Tohari Ahmad, Doni S. Pambudi, Tsuyoshi Usagawa, Improving the Performance of Projection-based Cancelable Fingerprint Template Method, the 7th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2015), November 2015, Fukuoka, Japan

Journal

  1. Tohari Ahmad, Muhammad Holil, Increasing the Performance of Difference Expansion-based Steganography when Securing Medical Data, The Smart Computing Review volume 4 issue 4, 2014
  2. Muhammad Holil, Tohari Ahmad, Peningkatan Performa Metode Steganografi Berbasis Difference Expansion Menggunakan Reduksi Selisih, Jurnal Ilmiah Teknologi Informasi (JUTI), Vol. 12 No 2, 2014
  3. Tohari Ahmad, Melvin S. Z. Marbun, Hudan Studiawan, Waskitho Wibisono, and Royyana M. Ijtihadi, A Novel Random Email-Based Steganography, International Journal of e-Education, e-Business, e-Management and e-Learning, Vol. 4, No. 2, 2014
  4. Rakhmadhany Primananda, Supeno Djanali, Ary Mazharuddin S, Analisa Kualitas Layanan Sistem Komunikasi Tetra Pada Kereta Api Indonesia, Jurnal Ilmiah Teknologi Informasi (JUTI), Vol. 12 No 2, 2014
  5. Noven Indra Prasetya, Supeno Djanali, Muchammad Husni, Verifikasi Signature Pada Kolaborasi Sistem Deteksi Intrusi Jaringan Tersebar Dengan Honeypot, Jurnal Ilmiah Teknologi Informasi (JUTI), Vol. 12 No 2, 2014
  6. Henning Titi Ciptaningtyas, Royyana Muslim Ijtihadie, Panji Arya Lumayung, Rancang Bangun Aplikasi Sinkronisasi Bidireksional Antar Learning Management System Berbasis Moodle, Jurnal Ilmiah Teknologi Informasi (JUTI), Vol. 12 No 1, 2014

Conference

  1. Waskitho Wibisono, Tohari Ahmad, Royyana M. Ijtihadie, Aldila Hilman, Towards An Event-Based Tracking System for Mobile Users, World Congress on Information and Communication Technologies (WICT 2014),  8-10 Desember 2014, Malacca, Malaysia
  2. Tohari Ahmad, Hudan Studiawan, Hafidh Sholihuddin Ahmad, Royyana M. Ijtihadie, Waskitho Wibisono, Shared Secret-based Steganography for Protecting Medical Data, The 2014 International Conference on Computer, Control, Informatics and its Applications (IC3INA 2014), 21-23 Oktober  2014, Bandung, Indonesia
  3. Royyana M. Ijtihadie, Waskitho Wibisono, Tohari Ahmad, Diana Purwitasari, Achmad Affandi, Herbert Innah, Yoshifumi Chisaki, Tsuyoshi Usagawa, Collaborative Content Authoring Framework in Moodle Learning Management Systems, The 4th Asian Conference on Engineering Education (ACEE) 2014, 10-12 Oktober 2014, Kumamoto, Japan
  4. Tohari Ahmad, Gregory Sukanto, Hudan Studiawan, Waskitho Wibisono, Royyana M. Ijtihadie, Emoticon-based Steganography for Securing Sensitive Data, The 6th International Conference on Information Technology and Electrical Engineering (ICITEE 2014), 7-8 Oktober 2014, Yogyakarta, Indonesia
  5. Tohari Ahmad, Royyana Muslim Ijtihadie, Waskitho Wibisono, Diana Purwitasari, Achmad Affandi, Herbert Innah, Yoshifumi Chisaki, Tsuyoshi Usagawa, Mailing-List Based Overlay Network for e-Learning Content Sharing Infrastructure among Moodle Learning Management Systems, The Institute of Electronics, Information and Communication Engineers – Educational Technology (IEICE-ET) Technical Reports, 24 Mei 2014, Hyogo, Japan
  6. Solichul Huda, Riyanarto Sarno, Tohari Ahmad, Heru Agus Santoso, Identification of Process-based Fraud Patterns in Credit Application, The 2nd International Conference of Information and Communication Technology (ICoICT), 28-30 Mei 2014, Bandung, Indonesia
  7. Supeno Djanali, F.X. Arunanto, Baskoro Adi Pratomo, Hudan Studiawan, S.G. Nugraha, SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker, ISTMET 2014 – 1st International Symposium on Technology Management and Emerging Technologies,
  8. Supeno Djanali, F.X. Arunanto, Baskoro Adi Pratomo, Hudan Studiawan, Ary M. Shiddiqi, Aggressive web application honeypot for exposing attacker’s identity,  2014 1st International Conference on Information Technology, Computer, and Electrical Engineering: Green Technology and Its Applications for a Better Future, ICITACEE 2014
  9. Tohari Ahmad, Hudan Studiawan, Tirta Taruna Ramadhan, Developing a Raspberry Pi-based Monitoring System for Detecting and Securing an Object, International Electronics Symposium (IES) 2014, 3 Desember 2014, Surabaya, Indonesia

Journal

  1. Waskitho Wibisono, Arkady Zaslavsky and Sea Ling, Situation-Awareness and Reasoning Using Uncertain Context in Mobile Peer-To-Peer Environments, International Journal of Pervasive Computing and Communications,  Vol 9, Issue 1, 2013.
  2.  I Nyoman Buda Hartawan, Waskitho Wibisono, Mekanisme Pemilihan MPR Dengan Congestion Detection Dalam Olsr Pada Manet, Jurnal Ilmu Komputer Volume 6 No 2, Hal 11-17, September 2013, ISSN 1979-5661
  3. I Nyoman Rudy Hendrawan, Waskitho Wibisono, Penjadwalan Alokasi Job Berbasis Metoda Heuristik pada Lingkungan Grid Indonesian Education Grid, Jurnal Ilmu Komputer Volume 6 No 2, Hal 25-30, September 2013, ISSN 1979-5661
  4. Ida Bagus Ary Indra Iswara, Waskitho Wibisono, Pemilihan Node Tetangga Yang Handal dengan Memperhitungkan Signal Strength dan Link Quality Pada Zone Routing Protocol di Lingkungan Manet, Jurnal Ilmu Komputer Volume 6 No 2, Hal 35-48, September 2013, ISSN 1979-5661
  5. Ach Khozaimi, Supeno Djanali, Meningkatkan Kinerja Protocol Routing Aodv-Rd Dengan Penentuan Jalur Yang Bebas Kongesti, Simantec Vol 3 No 2, 2013
  6. Tohari Ahmad, Anik Hanifatul Azizah, Hudan Studiawan, Fingerprint-based Authentication and Cryptography in an E-Voting System, Jurnal Manajemen Informatika, Volume 2, No 2,  2013
  7. Muhammad Alkaff, Supeno Djanali, Dan Henning Titi Ciptaningtyas, Analisa Pengaruh Mobilitas Node Terhadap Kualitas Layanan Voice Call Pada Jaringan UMTS, Jurnal GRID PTIIK Ub Vol 1, No. 2 April 2013
  8. Henning T Ciptaningtyas, Bilqis Amaliah, Waskitho Wibisono, Nanik Suciati, Perancangan Dan Pembuatan Perangkat Lunak Akuntansi Dasar Untuk Unit Pengelola Keuangan Badan Keswadayaan Masyarakat (BKM) Ngagel Rejo Mulyo, Jurnal Scan, UPN Veteran Jatim Vol 8, No. 1, 2013
  9. Tohari Ahmad, Shared Secret-based Key and Fingerprint Binding Scheme, Jurnal Kursor, Volume 7 No. 1, Januari 2013

Conference

  1. Tohari Ahmad, Muhammad Holil, Waskitho Wibisono, Royyana Muslim I, An Improved Quad and RDE-based Medical Data Hiding Method, The  IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM 2013), 3-4 Desember 2013
  2. Waskitho Wibisono, Dedy Nur Arifin, Baskoro Adi Pratomo, Tohari Ahmad and Royyana Ijtihadie, Falls  Detection  and Notification System Using Tri-Axial Accelerometer and Gyroscope Sensors of A Smartphone, HCC-The 2013 IEEE Conference on Technologies and Applications of Artificial Intelligence (TAAI 2013), 6-8 Desember 2013
  3. Tsuyoshi Usagawa, Masahiro Yamaguchi, Yoshifumi Chisaki, Royyana Muslim Ijtihadie, Achmad Affandi, Dynamic synchronization of learning contents of distributed learning management systems over band limited network — Contents sharing between distributed Moodle 2.0 series, 2013 International Conference on Information Technology Based Higher Education and Training (ITHET), 10-12 Oct. 2013
  4. Supeno Djanali,Ary M. Shiddiqi , Hudan Studiawan, Henning T. Ciptaningtyas, Real Time Train Monitoring Using Google Maps, International Seminar on Applied Technology, Science, and Art (4th APTECS 2013), Surabaya 10 Desember 2013
  5. Supeno Djanali, FX Arunanto, Baskoro Adi Pratomo, Hudan Studiawan, Honeypot in Raspberry Pi Cluster for Analyzing Attacker Behaviour,  2nd Engineering International Conference. Semarang 21 November 2013
  6. Supeno Djanali, Hudan Studiawan, Power Optimization in High Availability Server Cluster, The 7th International Conference on Information & Communication Technology and Systems (ICTS) 2013, 15 Mei 2013
  7. Tohari Ahmad, Elliptic Curve Cryptography for Securing Payment System, The 7th International Conference on Information & Communication Technology and Systems (ICTS) 2013, 15 Mei 2013
  8. Royyana Ijtihadie, Diana Purwitasari, Achmad Affandi, Yoshifumi Chisaki, Tsuyoshi Usagawa, Versioning System as a Framework for Bidirectional Content Synchronization among Learning Management Systems, The 7th International Conference on Information & Communication Technology and Systems (ICTS) 2013, 15 Mei 2013
  9. I Komang Ari Mogi,Waskitho Wibisono, Vanet Untuk Solusi Komunikasi Data Di Kawasan Pariwisata Bali, SNATIA, 2013
  10. Akmad Alimudin, Waskitho Wibisono, Diana P, Sistem Deteksi Intrusi pada Jaringan dengan Menggunakan Metode K-Nearest Neighbor dan Teori Dempster Shafer, Seminar Nasional Teknologi Informasi dan Multimedia 2013 – STMIK AMIKOM Yogyakarta, 19 Januari 2013

Journal

  1. Royyana M Ijtihadie, Bekti C Hidayanto, Achmad Affandi, Yoshifumi Chisaki and Tsuyoshi Usagawa, Dynamic content synchronization between learning management systems over limited bandwidth network, Human-centric Computing and Information Sciences 2012, 2:17
  2. Nuniek Fahriani, Supeno Djanali, Ary Mazharuddin Shiddiqi, Efisiensi Route Pada Protokol DSR Dengan Menggunakan Short, Eksplora Vol II, No. 1 Tahun 2012
  3. Irawan Dwi Wahyono, Waskitho Wibisono, Optimasi Service Discovery Berbasis Breadth Bloom Filter di Mobile Ad Hoc Network (MANET), Jurnal Simantec    2(3) -2012

Conference

  1. Achmad Affandi, Diana Purwitasari, Bekti Cahyo Hidayanto, Djoko Suprajitno, Royanna M Ijtihadie, Yoshifumi Chisaki, Tsuyoshi Usagawa, Green Infrastructure Architecture for an Integrated e-learning, Edutainment and Communications Services in Rural Area, Asian Conference on Education in Osaka, Japan, on 28 October 2012
  2. Eko Sakti Pramukantoro, Supeno Djanali, Handayani Tjandrasa, Deteksi Serangan Pada Jaringan Komputer Dengan Neat, SNMT XV 2012, 4 Februari 2012
  3. Tsepo Motlasi Nkalai, Supeno Djanali, Muchammad Husni, Energy Efficient Integration Of RFID Tagging And Wireless Sensors-Prolonging The Lifetime Of A Wireless Sensor, SNMT XV 2012, 4 Februari 2012
  4. Nurfiana, Supeno Djanali, Perbaikan Protokol Routing Ad Hoc On-Demand Multipath Distance Vector (AOMDV) Untuk Mendapatkan Rute yang Stabil Menggunakan Link Expiration Time (LET), KNSI 2012, 23 Februari 2012
  5. Irwan Alnarus Kautsar, Supeno Djanali, Analisa Kualitas Layanan (QOS) Aplikasi VOIP Pada Jaringan MPLS-VPN dan Diffserv, SNMT XV 2012, 4 Februari 2012
  6. Elly Antika, Supeno Djanali, Pengembangan Penemuan Gateway Adaptif Pada MANET Hybrid Berdasarkan Nilai Throughput, SNMT XV 2012, 4 Februari 2012
  7. Tohari Ahmad, Review: Keamanan Kata Sandi, Senastik 2012
  8. Waskitho Wibisono, Pengembangan Prototipe Pengenalan Aktifitas Fisik dengan Sensor Accelerometer Berbasis Integrasi Dempster-Shafer dan K-Nearest Neighbours, Senastik 2012

Book

  1. Supeno Djanali, Organisasi Komputer, ITS Press, 2012

Journal

Conference

  1. Tohari Ahmad, Nunut Priyo Jatmiko, Raditia Wahyuwidayat, Aplikasi Panduan Pembelian Spesifikasi Komputer Rakitan Online Menggunakan Algoritma Greedy, Seminar Sistem Informasi Indonesia (SESINDO 2008), hal 12-17, Surabaya, Indonesia
  2. Tohari Ahmad, Royyana Muslim I, Achmad Khalif Hakim, Rancang Bangun Intrusion Prevention System pada Jaringan Berbasis Snort dan IPTables Firewall, Seminar Sistem Informasi Indonesia (SESINDO 2008), hal 18-23, Surabaya, Indonesia

Pengabdian Masyarakat

  1. Pelatihan Aplikasi Multimedia (kerja sama antara Lab KBJ dan PIKTI-ITS)
  2. Peningkatan Percepatan Pembelajaran Menggunakan E-Learning (kerja sama antara Lab KBJ dan PIKTI-ITS)

Dosen Anggota Laboratorium Komputasi Berbasis Jaringan