Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–10 dari 22 artikel
Assessing Software Architecture Resilience Using Quantitative Metrics in Cloud Native Application Development Environments
Eko Siswanto
; Danang Danang
; Ismi Kusumaningroem
; Ilham Akhsani
Indonesian Journal of Infomatics
Vol 1
, No 1
(2026)
Cloud native architectures are essential for modern software systems due to their ability to handle dynamic environments, scalability, and high availability. However, ensuring resilience in these systems remains a significant challenge, particularly under varying operational conditions such as high-load periods and failure scenarios. This study aims to assess the resilience of cloud native architectures using quantitative metrics that objectively evaluate key attributes such as availability, fau...
Sumber Asli
Google Scholar
Digital Forensics and Automated Incident Response Framework Leveraging Big Data Analytics and Real Time Network Traffic Profiling in Heterogeneous Cyber Environments
Danang Danang
; Zaenal Mustofa
; Irlon Irlon
Cyber Security and Network Management
Vol 1
, No 1
(2026)
The increasing complexity and scale of modern cybersecurity threats necessitate the development of advanced systems capable of efficiently detecting, analyzing, and mitigating incidents in real time. This paper proposes an automated framework for digital forensics and incident response that leverages big data analytics and real time network traffic profiling. The framework integrates cutting-edge technologies, including Apache Spark for real time data processing and Hadoop for scalable data stor...
Sumber Asli
Google Scholar
Digital Twin-Based Cyber-Physical Security Framework Incorporating AI-Driven Predictive Maintenance and Zero-Trust Architecture in Smart Grid Systems
Danang Danang
; Febri Adi Prasetya
; Rashad Huseynaga Asgarov
Journal of Information Technology and Computer Science
Vol 1
, No 3
(2025)
The increasing integration and digitization of smart grid systems have exposed them to a variety of security threats, necessitating robust security measures to ensure their reliability and efficiency. This paper proposes a novel Digital Twin-Based Cyber-Physical Security Framework, incorporating AI-driven predictive maintenance and zero-trust architecture to address the evolving challenges of securing smart grids. By leveraging digital twin technology, this framework creates a real-time virtual...
Sumber Asli
Google Scholar
DOI
Hybrid Zero Trust Container Based Model for Proactive Service Continuity under Intelligent DDoS Attacks in Cloud Environment
Danang Danang
; Eko Siswanto
; Nuris Dwi Setiawan
; Priyo Wibowo
International Journal of Computer Technology and Science
Vol 2
, No 3
(2025)
Growth rapid computing cloud, especially on academic, government, and service platforms. public, has trigger improvement frequency and complexity Distributed Denial of Service (DDoS) attacks. Intelligent DDoS attacks AI based capable copy pattern Then cross user valid, so that difficult detected and mitigated. The majority approach mitigation moment This nature reactive, no scalable, and tends to sacrifice availability service for authorized users. Research This aiming develop architecture proa...
Sumber Asli
Google Scholar
DOI
Optimizing Blockchain-Based Cybersecurity Systems to Strengthen Resilience Against Ransomware Attacks : A Systematic Literature Review
Tanveer Shah
; Danang Danang
Systematic Literature Review Journal
Vol 1
, No 1
(2025)
This study aims to address the challenges and propose solutions for the Optimization of Blockchain-Based Cybersecurity Systems to Enhance Resilience Against Ransomware Attacks using a Systematic Literature Review (SLR) approach. Blockchain is increasingly recognized as a transformative technology in cybersecurity due to its decentralized structure, transparency, and robustness in securing data. Despite these advantages, its widespread adoption is hindered by several challenges, including scalabi...
Sumber Asli
Google Scholar
DOI
6G Networks and AI-Orchestrated Resource Allocation
Danang Danang
; Tameem Raif
; Zubair Hadi Faisal
; Munir Fadlan Karim
Proceeding of the International Conference on Electrical Engineering and Informatics
Vol 1
, No 2
(2025)
As 6G networks promise unprecedented speeds and ultra-low latency, AI-based resource allocation plays a crucial role in optimizing network performance. This study explores AI-driven techniques for spectrum management, energy efficiency, and real-time data processing. By leveraging machine learning and deep learning models, AI enhances network adaptability, reduces congestion, and improves overall efficiency. The proposed approaches enable intelligent decision-making, dynamic resource allocation,...
Sumber Asli
Google Scholar
DOI
AI-Powered Cybersecurity for Industrial Control Systems
Danang Danang
; Idris Maazin
; Khalaf Tariq Zubayr
Proceeding of the International Conferences on Engineering Sciences
Vol 1
, No 2
(2024)
Natural disasters such as earthquakes, hurricanes, and floods pose significant risks to critical infrastructure. AI-driven disaster response systems provide real-time analytics, predictive modeling, and automated response strategies to mitigate damage and improve recovery efforts. This paper explores how AI-powered drones, satellite imagery, and sensor networks enhance disaster monitoring and decision-making. Additionally, the study discusses the role of AI in optimizing emergency resource alloc...
Sumber Asli
Google Scholar
DOI
Systematic Literature Review on the Application of Blockchain in Enhancing Server Security: Research Methods for Mitigating Ransomware and Malware Attacks
Danang Danang
; Maya Utami Dewi
; Widya Aryani
International Journal of Computer Technology and Science
Vol 1
, No 4
(2024)
This study aims to explore the application of blockchain in enhancing server security to mitigate ransomware and malware attacks in critical infrastructures such as healthcare, finance, and government sectors. Using a systematic literature review (SLR) approach, the research collects articles from four major databases (IEEE Xplore, Scopus, ScienceDirect, and SpringerLink) published between 2020 and 2024. The search focuses on keywords related to blockchain, server security, ransomware, malware,...
Sumber Asli
Google Scholar
DOI
Rancangan Bangun Otomasi Air Suling Daun Cengkeh Berbasis Arduino
Muhamad Khoirul Umam
; Danang Danang
; Eko Siswanto
; Nuris Dwi Setiawan
Repeater : Publikasi Teknik Informatika dan Jaringan
Vol 2
, No 2
(2024)
The MSME group "Manuggal Karya" located in Ngambarsari Village, Karang Tengah District, Wonogiri, Central Java is a business group that operates in the field of refining clove leaf essential oil. can be monitored properly so that overflowing essential oils often spill from the reservoir and improper handling can actually cause the essential oils to become dirty. The use of an automation system that can keep essential oils sterile and can stop the flow of oil to the reservoir if the reservoir is...
Sumber Asli
Google Scholar
DOI
Rancang Bangun Sistem Keamanan Ruang Persandian Menggunakan RFID dan Sensor PIR Berbasis IOT
Eni Muhadi
; Sulartopo Sulartopo
; Danang Danang
; Dani Sasmoko
; Nuris Dwi Setiawan
Router : Jurnal Teknik Informatika dan Terapan
Vol 2
, No 1
(2024)
This Space Security System is a system that utilizes the existing Internet Network to monitor a room remotely or from a different location. With the aim of making it easier to limit employee access rights and monitor the presence of people in the room.So the author made a room security system tool using the Internet of Things (IOT) which was implemented at the Demak Regency Communication and Information Service. The way this system works is only employees who have access rights who can enter the...
Sumber Asli
Google Scholar
DOI