Kalamullah Ramli
YOU?
Author Swipe
View article: A Novel Hybrid Model for High-Accuracy Malware Detection in The Internet of Medical Things (IoMT) Environment.
A Novel Hybrid Model for High-Accuracy Malware Detection in The Internet of Medical Things (IoMT) Environment. Open
The Internet of Medical Things (IoMT) has revolutionized modern healthcare by enabling the collection and analysis of real-time data. However, this interconnected ecosystem also introduces significant security risks, particularly malware a…
View article: Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks
Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks Open
Malware evolution presents growing security threats for resource-constrained Internet of Medical Things (IoMT) devices. Conventional federated learning (FL) often suffers from slow convergence, high communication overhead, and fairness iss…
View article: Strategy for Precopy Live Migration and VM Placement in Data Centers Based on Hybrid Machine Learning
Strategy for Precopy Live Migration and VM Placement in Data Centers Based on Hybrid Machine Learning Open
Data center virtualization has grown rapidly alongside the expansion of application-based services but continues to face significant challenges, such as downtime caused by suboptimal hardware selection, load balancing, power management, in…
View article: Illicit Cryotocurrency Investigation Digital Forensic Framework: Integrating Off-chain and On-Chain Analysis for Two Types of Crime
Illicit Cryotocurrency Investigation Digital Forensic Framework: Integrating Off-chain and On-Chain Analysis for Two Types of Crime Open
Cryptocurrencies have emerged as integral components of modern financial ecosystems, yet their pseudonymous nature poses significant challenges for digital crime investigations. This study proposes the Illicit Cryptocurrency Investigation …
View article: Transforming Humanitarian Response with IoT in Conflict Zones: Field Insights, Ethical Frameworks, and Deployment Challenges
Transforming Humanitarian Response with IoT in Conflict Zones: Field Insights, Ethical Frameworks, and Deployment Challenges Open
The integration of Internet of Things (IoT) solutions into the delivery of humanitarian aid can be potentially transformative in improving the effectiveness of operations, time management, and the coordination of logistics in conflict-affi…
View article: Social Learning Analysis in the Tahfiz Class at SMAN 1 Sidrap
Social Learning Analysis in the Tahfiz Class at SMAN 1 Sidrap Open
This study aims to analyze the social learning that occurs in the Tahfiz class program at SMAN 1 Sidrap, which integrates religious education of the Quran with the formal curriculum. This program was initiated by the school principal, Syam…
View article: Improving Model Performance for Predicting Exfiltration Attacks Through Resampling Strategies
Improving Model Performance for Predicting Exfiltration Attacks Through Resampling Strategies Open
Addressing class imbalance is critical in cybersecurity applications, particularly in scenarios like exfiltration detection, where skewed datasets lead to biased predictions and poor generalization for minority classes. This study investig…
View article: Optimizing N-1 Contingency Rankings Using a Nature-Inspired Modified Sine Cosine Algorithm
Optimizing N-1 Contingency Rankings Using a Nature-Inspired Modified Sine Cosine Algorithm Open
Ensuring the reliability and sustainability of power systems is essential for maintaining efficient and uninterrupted operations, especially under varying load conditions and potential faults. This study tackles the critical task of contin…
View article: A Systematic Literature Review on Privacy Preservation in VANETs: Trends, Challenges, and Future Directions
A Systematic Literature Review on Privacy Preservation in VANETs: Trends, Challenges, and Future Directions Open
Privacy preservation is a fundamental requirement in vehicular ad hoc networks (VANETs) because it addresses sensitive vehicle and driver data. The use of pseudonyms instead of actual vehicle identities is one way to protect vehicle owners…
View article: Reinforcement Learning-Driven Hybrid Precopy/Postcopy VM Migration for Energy-Efficient Data Centers
Reinforcement Learning-Driven Hybrid Precopy/Postcopy VM Migration for Energy-Efficient Data Centers Open
This study proposes the use of a hybrid precopy/postcopy virtual machine (VM) migration framework to aid an autonomous agent when making migration decisions to continuously optimize the balance among migration time, downtime, and energy co…
View article: ARKAIV: Predicting Data Exfiltration Using Supervised Machine Learning Based on Tactics Mapping From Threat Reports and Event Logs
ARKAIV: Predicting Data Exfiltration Using Supervised Machine Learning Based on Tactics Mapping From Threat Reports and Event Logs Open
Data breach attacks are unique, particularly when attackers exfiltrate data from their target’s systems. As data breaches continue to increase in both frequency and severity, they pose escalating risks to organizations and society. Despite…
View article: A Review of Cybersecurity Framework Implementation for Retail Industry-Challenges and Recommendation
A Review of Cybersecurity Framework Implementation for Retail Industry-Challenges and Recommendation Open
Efforts to improve services by opening online data access to customers have become straightforward targets for cybercrime. Unfortunately, the researchers' findings reveal that there is presently no cybersecurity framework that completely a…
View article: Deep autoencoder with gated convolutional neural networks for improving speech quality in secured communications
Deep autoencoder with gated convolutional neural networks for improving speech quality in secured communications Open
In this study, we introduce a speech enhancement method to improve the quality of decrypted speech signals from hand-talk devices, which are highly susceptible to security attacks. Ensuring high-quality decrypted speech is essential becaus…
View article: Design and Analysis of Cybersecurity Information Sharing Mechanism Between Computer Security Incident Response Teams (CSIRT) in Indonesia on Blockchain Technology Through Hyperledger Composer and Interplanetary File System (IPFS)
Design and Analysis of Cybersecurity Information Sharing Mechanism Between Computer Security Incident Response Teams (CSIRT) in Indonesia on Blockchain Technology Through Hyperledger Composer and Interplanetary File System (IPFS) Open
Sharing cybersecurity information among the Computer Security Incident Response Team (CSIRT) is a crucial step in enhancing organizational cybersecurity. However, a primary challenge faced is the lack of trust among users regarding the con…
View article: Analysis of Measuring Information Security Awareness for Employees at Institution XYZ
Analysis of Measuring Information Security Awareness for Employees at Institution XYZ Open
As a government institution in the field of civil servant management, XYZ Institution has data on 4.4 million Employees spread throughout Indonesia which needs to be maintained. Based on the BSSN report, there has been a significant increa…
View article: Machine Learning to Estimate Workload and Balance Resources with Live Migration and VM Placement
Machine Learning to Estimate Workload and Balance Resources with Live Migration and VM Placement Open
Currently, utilizing virtualization technology in data centers often imposes an increasing burden on the host machine (HM), leading to a decline in VM performance. To address this issue, live virtual migration (LVM) is employed to alleviat…
View article: The Impact of Real Traffic from Twitter for 5g Network Deployment
The Impact of Real Traffic from Twitter for 5g Network Deployment Open
The utilization of technology, particularly cellular networks, is continuously expanding. This is evident through the increasing number of mobile network operators (MNOs) users, especially in the current era where most things are accomplis…
View article: EFFECTIVENESS OF SECURITY THROUGH OBSCURITY METHODS TO AVOID WEB APPLICATION VULNERABILITY SCANNERS
EFFECTIVENESS OF SECURITY THROUGH OBSCURITY METHODS TO AVOID WEB APPLICATION VULNERABILITY SCANNERS Open
The concept of security through obscurity is not recommended by the National Institute of Standards and Technology (NIST) as a form of system security. Basically this concept hides assets as difficult as possible so that it is not easy for…
View article: ECG-Based Driving Fatigue Detection Using Heart Rate Variability Analysis with Mutual Information
ECG-Based Driving Fatigue Detection Using Heart Rate Variability Analysis with Mutual Information Open
One of the WHO’s strategies to reduce road traffic injuries and fatalities is to enhance vehicle safety. Driving fatigue detection can be used to increase vehicle safety. Our previous study developed an ECG-based driving fatigue detection …
View article: IT Maturity Level Analysis Using Framework COBIT 5 Work for Management Cyber Incident: Case Study of Company Z in ICT Field
IT Maturity Level Analysis Using Framework COBIT 5 Work for Management Cyber Incident: Case Study of Company Z in ICT Field Open
Based on the report security year 2022 from company Z in the ICT sector, it was found that on the report firewall security, 96% of level threat is level critical, and 4% is level high. Report email security is session domain 27.3%; Session…
View article: Review of Orthogonal Frequency Division Multiplexing-Based Modulation Techniques for Light Fidelity
Review of Orthogonal Frequency Division Multiplexing-Based Modulation Techniques for Light Fidelity Open
Light Fidelity (LiFi) technology has gained attention and is growing rapidly today. Utilizing light as a propagation medium allows LiFi to promise a wider bandwidth than existing Wireless Fidelity (WiFi) technology and enables the implemen…
View article: Designing An Information Security Framework For The Indonesia Water Industry Sector
Designing An Information Security Framework For The Indonesia Water Industry Sector Open
The majority of Indonesia's water industry sectors have implemented smart water management systems as part of their business development, which has an indirect impact on enterprise information security. However, in general, water sector en…
View article: DATA AVAILABILITY IN DECENTRALIZED DATA STORAGE USING FOUR-NODE INTERPLANETARY FILE SYSTEM
DATA AVAILABILITY IN DECENTRALIZED DATA STORAGE USING FOUR-NODE INTERPLANETARY FILE SYSTEM Open
Centralized storage is a data storage model in which data is stored and managed in a single physical location or centralized system. In this model, all data and information are stored on servers or data centers managed by one entity or org…
View article: INFORMATION SECURITY RISK MANAGEMENT DESIGN OF SUPERVISION MANAGEMENT INFORMATION SYSTEM AT XYZ MINISTRY USING NIST SP 800-30
INFORMATION SECURITY RISK MANAGEMENT DESIGN OF SUPERVISION MANAGEMENT INFORMATION SYSTEM AT XYZ MINISTRY USING NIST SP 800-30 Open
SIMWAS is an information system at the XYZ Ministry that is used to manage supervisory activities and follow up on supervisory results. SIMWAS is an important asset that contains all internal control business processes, but in practice, SI…
View article: Towards Improving 5G Quality of Experience: Fuzzy as a Mathematical Model to Migrate Virtual Machine Server in The Defined Time Frame
Towards Improving 5G Quality of Experience: Fuzzy as a Mathematical Model to Migrate Virtual Machine Server in The Defined Time Frame Open
The industry and government have recently acknowledged and used virtual machines (VM) to promote their businesses. During the process of VM, some problems might occur. The issues, such as a heavy load of memory, a large load of CPU, a mass…
View article: Secure Cybersecurity Information Sharing for Sectoral Organizations Using Ethereum Blockchain and IPFS
Secure Cybersecurity Information Sharing for Sectoral Organizations Using Ethereum Blockchain and IPFS Open
The COVID-19 pandemic has resulted in increased cross-sector cyber-attacks. Passive and reactive cybersecurity techniques relying solely on technology are insufficient to combat sophisticated attacks, necessitating proactive and collaborat…
View article: Desain dan Analisis Sistem CyberShare Menggunakan Four Node Interplanetary File System (IPFS)
Desain dan Analisis Sistem CyberShare Menggunakan Four Node Interplanetary File System (IPFS) Open
Cybersecurity information sharing is a proactive and collaborative measure in enhancing organizational security by exchanging cybersecurity information using a centralized repository service. However, in practice, the use of centralized se…
View article: The Impact of Real Traffic from Twitter for 5G Network Deployment
The Impact of Real Traffic from Twitter for 5G Network Deployment Open
The utilization of technology, particularly cellular networks, is continuously expanding. This is evident through the increasing number of mobile network operators (MNOs) users, especially in the current era where most things are accomplis…
View article: A New ECG Data Processing Approach to Developing an Accurate Driving Fatigue Detection Framework with Heart Rate Variability Analysis and Ensemble Learning
A New ECG Data Processing Approach to Developing an Accurate Driving Fatigue Detection Framework with Heart Rate Variability Analysis and Ensemble Learning Open
More than 1.3 million people are killed in traffic accidents annually. Road traffic accidents are mostly caused by human error. Therefore, an accurate driving fatigue detection system is required for drivers. Most driving fatigue detection…
View article: Non-Invasive Classification of Blood Glucose Level Based on Photoplethysmography Using Time–Frequency Analysis
Non-Invasive Classification of Blood Glucose Level Based on Photoplethysmography Using Time–Frequency Analysis Open
Diabetes monitoring systems are crucial for avoiding potentially significant medical expenses. At this time, the only commercially viable monitoring methods that exist are invasive ones. Since patients are uncomfortable while blood samples…