Staff

Budi Rahardjo


Lektor

Nama : Ir. Budi Rahardjo M.Sc.,Ph.D.
Kelompok Keahlian : Teknik Komputer
Sekolah / Fakultas : Sekolah Teknik Elektro dan Informatika
Jabatan Fungsional : Lektor
S1 ITB Bandung Indonesia
S2 University of Manitoba Manitoba Kanada
S3 University of Manitoba Manitoba Kanada
  • Pengembangan Signature Algorithm Untuk Cryptocurrency Bitcoin dan Analisa Investasi Bitcoin (2018)
  • Pengembangan Algoritma Efisien Kriptografi Kurva Eliptik untuk Keamanan Pesan Instan (2017)
  • Perangkat Base Station dan Smartphone 4G (2016)
  • Pengembangan Metoda Anonymity pada e-Volting (2015)
  • Manajemen Keamanan Big Data (2014)
  • Pengembangan Model dan Simulasi Penguatan Keamanan Jaringan Secara Optimal (2014)
  • Management Proyek (2013)
  • Pengembangan Multiple Attack Graph-Based Security Metrics untuk Mengevaluasi dan Meningkatkan Security Jaringan (2013)
  • Stego-ECC berbasis Noise (2013)
  • Bantuan Penginternasional Terbitan Berkala Ilmiah (ITB Journal of Information and Communication Technologi) ISSN 1978-3086 (2012)
  • BlackBerry Academic Program License Agreement - BBIC ITB (2012)
  • Pengembangan Algoritma Efisien untuk Kriptografi Eliptik Berbasis Composite Fields (2012)
  • Pengembangan Multiple Attack GraphBased Security Metrics untuk Mengevaluasi Security Jaringan (2012)
  • Pengembangan Algoritma Efisien untuk Kriptografi Eliptik Berbasis Composite Fields (2011)
  • Pengembangan Algoritma Efisien untuk Kriptografi Kurva Eliptik Berbasis Composite Field (2010)
  • Pengembangan Teknologi Informasi dan Mikroelektronika (2009)
  • Purwanto, Y., Kuspriyanto, Hendrawan, Rahardjo, B. (2016) Statistical analysis on aggregate and flow based traffic features distribution, Proceeding of 2015 1st International Conference on Wireless and Telematics, ICWT 2015, Art. No. 7449255. DOI: 10.1109/ICWT.2015.7449255(Internasional)
  • Purwanto, Y., Kuspriyanto, Hendrawan, Rahardjo, B. (2016) Time based anomaly detection using residual polynomial fitting on aggregate traffic statistic, Proceeding of 2015 1st International Conference on Wireless and Telematics, ICWT 2015, Art. No. 7449256. DOI: 10.1109/ICWT.2015.7449256(Internasional)
  • Yuliana, R., Rahardjo, B. (2016) Designing an agile enterprise architecture for mining company by using TOGAF framework, Proceedings of 2016 4th International Conference on Cyber and IT Service Management, CITSM 2016, Art. No. 7577466. DOI: 10.1109/CITSM.2016.7577466(Internasional)
  • Abdurrazaq, M.N., Trilaksono, B.R., Rahardjo, B. (2015) DIDS using cooperative agents based on ant colony clustering, Journal of ICT Research and Applications, Vol. 8, Issue 3, pp. 213-233. DOI: 10.5614/itbj.ict.res.appl.2015.8.3.3(Internasional)
  • Pratiwi, O.N., Rahardjo, B., Supangkat, S.H. (2015) Attribute selection based on information gain for automatic grouping student system, Communications in Computer and Information Science, Vol. 516, pp. 205-211. DOI: 10.1007/978-3-662-46742-8_19(Internasional)
  • Purwanto, Y., Kuspriyanto, Hendrawan, Rahardjo, B. (2015) Traffic anomaly detection in DDos flooding attack, Proceedings of 2014 8th International Conference on Telecommunication Systems Services and Applications, TSSA 2014, Art. No. 7065953. DOI: 10.1109/TSSA.2014.7065953(Internasional)
  • Rahardjo, B., Kuspriyanto, Muchtadi-Alamsyah, I., Paryasto, M.W. (2015) Information Concealment Through Noise Addition, Procedia Computer Science, Vol. 74, pp. 178-180. DOI: 10.1016/j.procs.2015.12.096(Internasional)
  • Wienardo, Yuliawan, F., Muchtadi-Alamsyah, I., Rahardjo, B. (2015) Implementation of Pollard Rho attack on elliptic curve cryptography over binary fields, AIP Conference Proceedings, Vol. 1677, Art. No. 30019. DOI: 10.1063/1.4930641(Internasional)
  • Abdurrazaq, M.N., Bambang, R.T., Rahardjo, B. (2014) Distributed intrusion detection system using cooperative agent based on ant colony clustering, Proceedings of 2014 International Conference on Electrical Engineering and Computer Science, ICEECS 2014, Art. No. 7045229, pp. 109-114. DOI: 10.1109/ICEECS.2014.7045229(Internasional)
  • Abdurrazaq, M.N., Rahardjo, B., Bambang, R.T. (2014) Improving performance of network scanning detection through PCA-based feature selection, 2014 International Conference on Information Technology Systems and Innovation, ICITSI 2014-Proceedings, Art. No. 7048286, pp. 323-328. DOI: 10.1109/ICITSI.2014.7048286(Internasional)
  • Alamsyah, A., Rahardjo, B., Kuspriyanto (2014) Community detection methods in social network analysis, Advanced Science Letters, Vol. 20, Issue 1, pp. 250-253. DOI: 10.1166/asl.2014.5301(Internasional)
  • Paryasto, M., Alamsyah, A., Rahardjo, B., Kuspriyanto (2014) Big-data security management issues, 2014 2nd International Conference on Information and Communication Technology, ICoICT 2014, Art. No. 6914040, pp. 59-63. DOI: 10.1109/ICoICT.2014.6914040(Internasional)
  • Rahardjo, B., Muchtadi-Alamsyah, I., Paryasto, M. (2014) Noise-based stego-ECC, EPJ Web of Conferences, Vol. 68, Art. No. 13. DOI: 10.1051/epjconf/20146800013(Internasional)
  • Pratiwi, O.N., Nugraha, I.G.B.B., Supangkat, S.H., Rahardjo, B. (2013) Web application for Jigsaw-based cooperative learning, Proceedings-International Conference on ICT for Smart Society 2013: Think Ecosystem Act Convergence, ICISS 2013, Art. No. 6588115, pp. 354-357. DOI: 10.1109/ICTSS.2013.6588115(Internasional)
  • Paryasto, M.W., Rahardjo, B., Yuliawan, F., Muchtadi-Alamsyah, I., Kuspriyanto (2012) Composite field multiplier based on look-up table for elliptic curve cryptography implementation, ITB Journal of Information and Communication Technology, Vol. 6 C, Issue 1, pp. 63-81. DOI: 10.5614/itbj.ict.2012.6.1.4(Internasional)
  • Purboyo, T.W., Rahardjo, B., Kuspriyanto (2012) Some framework, architecture and approach for analysis a network vulnerability, Proceedings of the 2012 International Conference on System Engineering and Technology, ICSET 2012, Art. No. 6339320. DOI: 10.1109/ICSEngT.2012.6339320(Internasional)
  • Paryasto, M.W., Rahardjo, B., Yuliawan, F., Muchtadi-Alamsyah, I., Kuspriyanto (2011) Composite field multiplier based on look-up table for elliptic curve cryptography implementation, Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011, Art. No. 6021612. DOI: 10.1109/ICEEI.2011.6021612(Internasional)
  • Purboyo, T.W., Rahardjo, B., Kuspriyanto (2011) Security metrics: A brief survey, Proceedings-International Conference on Instrumentation, Communication, Information Technology and Biomedical Engineering 2011, ICICI-BME 2011, Art. No. 6108598, pp. 79-82. DOI: 10.1109/ICICI-BME.2011.6108598(Internasional)
  • Sulistyo, B., Rahardjo, B., Mahayana, D., Machbub, C. (2011) New methodology of block cipher analysis using chaos game, ITB Journal of Information and Communication Technology, Vol. 5, Issue 2, pp. 105-124. DOI: 10.5614/itbj.ict.2011.5.2.3(Internasional)
  • Sulistyo, B., Rahardjo, B., Mahayana, D. (2009) On applicability of chaos game method for block cipher randomness analysis, Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009, Vol. 1, Art. No. 5254777, pp. 258-262. DOI: 10.1109/ICEEI.2009.5254777(Internasional)