p-Index From 2021 - 2026
18.036
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar INFORMAL: Informatics Journal Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT Insect (Informatics and Security) : Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI Abdimas Dewantara PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Compiler Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika Building of Informatics, Technology and Science Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Indonesian Journal of Business Intelligence (IJUBI) Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Pengabdian Masyarakat Bumi Raflesia Cyber Security dan Forensik Digital (CSFD) Jurnal Abdi Insani JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Journal of Computer System and Informatics (JoSYC) International Journal of Advances in Data and Information Systems Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Infotech: Journal of Technology Information Jurnal Teknologi Informatika dan Komputer SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Pengabdian kepada Masyarakat Nusantara Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur Jurnal Pengabdian Masyarakat Indonesia EDUTECH : Jurnal Inovasi Pendidikan Berbantuan Teknologi J-SAKTI (Jurnal Sains Komputer dan Informatika) Decode: Jurnal Pendidikan Teknologi Informasi Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Jurnal Informatika Teknologi dan Sains (Jinteks) Techno Lambda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT Jurnal Software Engineering and Computational Intelligence Mohuyula : Jurnal Pengabdian Kepada Masyarakat Scientific Journal of Informatics Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika JOCHAC
Claim Missing Document
Check
Articles

Komparatif Analisis Keamanan Aplikasi Instant Messaging Berbasis Web Imam Riadi; Rusydi Umar; Muhammad Abdul Aziz
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 5 (2020): Oktober 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.857 KB) | DOI: 10.29207/resti.v4i5.2213

Abstract

Web-based instant messaging applications vulnerability has become one of the main concerns for its users in line with the increasing number of cybercrimes that occur on social media. This research was conducted to determine the comparability of the vulnerability value of the web-based WhatsApp, Telegram, and Skype applications using the Association of Chief Police Officers (ACPO) method. Digital artifacts in the form of text messages, picture messages, video messages, telephone numbers, and user IDs have been acquired in this research process using FTK imager and OSForensic tools. The results of the study using the FTK imager and OSForensic tools show that the web-based Skype application has a vulnerability value of 92%, while WhatsApp and Web-based Telegram have the same vulnerability value with 67% each based on all digital artifacts that successfully acquired.
Investigasi Bukti Digital Optical Drive Menggunakan Metode National Institute of Standard and Technology (NIST) Imam Riadi; Abdul Fadlil; Muhammad Immawan Aulia
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 5 (2020): Oktober 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (628.662 KB) | DOI: 10.29207/resti.v4i5.2224

Abstract

DVD-R is a type of optical drive that can store data in one burning process. However, there is a feature that allows erasing data in a read-only type, namely multisession. The research was conducted to implement the data acquisition process which was deleted from a DVD-R using Autopsy forensic tools and FTK Imager. The National Institute of Standards and Technology (NIST) is a method commonly used in digital forensics in scope storage with stages, namely collection, examination, analysis, and reporting. The acquisition results from Autopsy and FTK-Imager show the same results as the original file before being deleted, validated by matching the hash value. Based on the results obtained from the analysis and presentation stages, it can be concluded from the ten files resulting from data acquisition using the FTK Imager and Autopsy tools on DVD-R. FTK Imager detects two file systems, namely ISO9660 and Joliet, while the Autopsy tool only has one file system, namely UDF. The findings on the FTK Imager tool successfully acquired ten files with matching hash values and Autopsy Tools detected seven files with did not find three files with extensions, *.MOV, *.exe, *.rar. Based on the results of the comparative analysis of the performance test carried out on the FTK Imager, it got a value of 100% because it managed to find all deleted files and Autopsy got a value of 70% because 3 files were not detected because 3 files were not detected and the hash values ​​were empty with the extensions * .exe, * .rar and *.MOV. This is because the Autopsy tool cannot detect the three file extensions.
Acquisition of Digital evidence Android-Based Viber Messenger App Imam Riadi; Rusydi Umar; Muhammad Irwan Syahib
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1032.475 KB) | DOI: 10.29207/resti.v5i1.2626

Abstract

Viber is one of the most popular social media in the Instant Messenger application category that can be used to send text messages, make voice calls, send picture messages and video messages to other users. As many as 260 million people around the world have used this application. Increasing the number of viber users certainly brings positive and negative impacts, one of the negative impacts of this application is the use of digital forensic crime. This research simulates and removes digital crime evidence from the viber application on Android smartphones using the National Institute of Standards Technology (NIST) method, which is a method that has work guidelines on forensic policy and process standards to ensure each investigator follows the workflow the same so that their work is documented and the results can be accounted for. This study uses three forensic tools, MOBILedit Forensic Express, Belkasoft and Autopsy. The results in this study show that MOBILedit Forensic Express gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. Belkasoft gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. For Autopsy does not give the expected results in the extraction process, in other words the Autopsy application gives zero results. It can be concluded that MOBILedit Forensic Express and Belkasoft have a good performance compared to Autopsy and thus this research has been completed and succeeded in accordance with the expected goals.
Implementation of the Jaccard Method in the WhatsApp Messenger Cyberbullying Investigation Analysis Using a Framework National Institute of Standards and Technology Panggah Widiandana; Imam Riadi; Sunardi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 6 (2020): Desember 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (712.01 KB) | DOI: 10.29207/resti.v4i6.2635

Abstract

The development of information technology is increasingly showing a great influence on human life. Based on the survey, it was stated that every year the users of the WhatsApp application grew very rapidly in 2015, 900 million users and in March 2020, it increased to 2000 million users. The data is straight-line with the increasing crime rate, one of which is cyberbullying which always increases every year. The purpose of research that has been carried out is to add references for investigators in conducting, including cases of cyberbullying. The National Institute of Standards and Technology (NIST) method is used to make it easier for researchers to conduct digital forensics on the evidence that has been obtained. The Jaccard method is used to identify evidence that has been obtained to obtain digital evidence to prove that cyberbullying has occurred. The results of research that have been done prove that the NIST method can simplify the process, in cyberbullying identity starting from the lifting of evidence to the reporting stage of evidence. The similarity jaccard method is able to identify cyberbullying with different levels, with the highest value of jaccard which is 0.21 (21%), and the lowest value obtained from a value of 0 (0%). The NIST method and the cyberbullying method can make it easier for investigators in cyberbullying cases.
Validasi Policy Statement pada Lemari Penyimpanan Bukti Digital (LPBD) Achmad Syauqi; Imam Riadi; Yudi Prayudi
Jurnal Pendidikan Teknologi Informatika dan Sains Vol 1 No 2 (2019): Journal of Education Informatic Technology and Science (JeITS)
Publisher : Faculty of Teacher Training and Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (249.064 KB)

Abstract

Bukti digital sangat rentan terhadap kerusakan. Oleh sebab itu dalam membuat lemari penyimpanan bukti digital (LPBD) diperlukan adanya access control. Access control sendiri memiliki beberapa model, salah satunya yaitu ABAC. ABAC merupakan salah satu model dari access control yang baru. Karena model ABAC ini mempunyai fungsi yang fleksibel, memungkinkan bersinggungan dengan banyak sekali atribut, hal ini akan menjadi sangat kompleks dan dapat menimbulkan munculnya incosistency dan incompleteness. Maka dari itu implementasi dari ABAC ini harus didukung oleh kebijakan policy yang tepat dan tervalidasi dengan baik agar keamanan dalam LPBD lebih terjamin. Salah satu model pengujian access control yaitu model checking. Model checking ini bersifat memeriksa elemen-elemen di dalam sistem sehingga jika terdapat error maka akan diketahui. Sedangkan tools untuk validasi policy statement terdapat beraneka ragam salah satunya ACPT (Acess Control Policy Testing). Di dalam ACPT terdapat berbagai metode untuk membuat dan menguji policy statement. Pengujian ini dilakukan menggunakan kombinasi algoritma permit overrides dan dilakukan sebanyak 30 kali pengujian. Penelitian ini telah berhasil menguji dan membuktikan bahwa policy statement tersebut tidak menemukan incosistency dan incompleteness. Dalam 30 kali pengujian, policy statement tersebut berjalan sesuai dengan rule yang ada.
RING UNTUK PROSES CYBER PROFILING : STUDI KASUS PADA DUNIA PENDIDIKAN TINGGI DI INDONESIA Muhammad Zulfadhillah; Yudi Prayudi; Imam Riadi
Phasti: Jurnal Teknik Informatika Politeknik Hasnur Vol 2 No 02 (2016): PHASTI: Oktober 2016
Publisher : Program Studi Teknik Informatika, Politeknik Hasnur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46365/pha.v2i02.185

Abstract

Aktifitas pengguna internet semakin meningkat dari tahun ke tahun.Hal ini telah berdampak pada perilaku pengguna itu sendiri.Penilaian terhadap perilaku pengguna seringkali hanya didasarkan pada interaksi di internet tanpa mengetahui apa saja aktifitas lainnnya. Penggunaan log aktifitas dapat dijadikan sebagai cara lain untuk mengetahui perilaku pengguna. Log aktifitas internet adalah salah satu tipe big data sehingga penggunaan data mining dengan teknik K-Means dapat dijadikan sebagai solusi untuk melakukan analisis terhadap perilaku pengguna. Pada penelitian ini telah dilakukan proses klasterisasi menggunakan algoritma K-Means yang terbagi menjadi tiga klaster yaitu tinggi, sedang, dan rendah. Hasil yang didapat dari institusi pendidikan menunjukkan bahwa setiap klaster menghasilkan website yang sering dikunjungi dengan urutan : wesite pencarian, social media, berita, dan informasi. Penelitian ini juga menunjukkan bahwa Cyber profiling yang telah dilakukan sangat dipengaruhi oleh faktor lingkungan dan aktifitas sehari-hari. Kata Kunci : Clustering, K-Means, Log, Network, Profiling
Header investigation for spam email forensics using framework of national institute of standards and technology Mustafa Mustafa; Imam Riadi; Rusydi Umar
ILKOM Jurnal Ilmiah Vol 13, No 2 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v13i2.849.163-167

Abstract

Today's technology makes communication very easy and can be used anywhere, even a distance of hundreds to thousands of kilometres is not a barrier in communicating. One of the tools or media that is widely used is via email. However, there are many disadvantages that may be obtained from the email, one of which is spamming or mail. The purpose of this research is to know the stages of spamming email analysis through header analysis. The method used in this study is the National Institute of Standards and Technology (NIST) and this method uses 4 stages, namely collection, examination, analysis, and reporting. The results of this study are expected to be able to find out the spam sender's email address, the spam email sender's IP address, and other information needed.
ANALISIS PERBANDINGAN DETECTION TRAFFIC ANOMALY DENGAN METODE NAIVE BAYES DAN SUPPORT VECTOR MACHINE (SVM) Imam Riadi; Rusydi Umar; Fadhilah Dhinur Aini
ILKOM Jurnal Ilmiah Vol 11, No 1 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v11i1.361.17-24

Abstract

Intrusion Detection System (IDS) is a software or hardware that can be used to detect any abnormal activity in the network. Situations often arise from various network access in the form of information or data that can cause problems. Detection is a system for detecting activities that are disturbing data access in information. IDS has two methods of doing detection, namely Rule Based (Signature Based) and Behavior-Based. Anomaly traffic can detect an increase in the number of user access and at any time there will be an attack from another party on the network. This study uses 2 algorithm methods are Naïve Bayes and Support Vector Machine (SVM). Naïve Bayes results through the Distributions and Radviz graph data samples have a probability value of 0.1 and the highest probability value is 0.8. Support Vector Machine (SVM) produces a graph that has greater accuracy.
Pengaruh Nilai Hidden layer dan Learning rate Terhadap Kecepatan Pelatihan Jaringan Saraf Tiruan Backpropagation supriyanto supriyanto; Sunardi Sunardi; imam riadi
JURNAL INFORMATIKA DAN KOMPUTER Vol 6, No 1 (2022): ReBorn - February 2022
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat - Universitas Teknologi Digital Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (272.333 KB) | DOI: 10.26798/jiko.v6i1.508

Abstract

Jaringan Saraf Tiruan (JST) merupakan salah satu metode yang dapat digunakan untuk memecahkan masalah proses prediksi.  JST berfungsi sebagai pengganti saraf dan otak manusia dengan kemampuan belajar dan generalisasi dengan cepat dalam pengenalan pola. JST backpropagation dalam proses pelatihan membutuhkan kombinasi parameter yang tepat seperti hidden layer, learning rate, dan jumlah iterasi karena terkait dengan waktu proses pelatihan dan galat yang akan dihasilkan. Pada penelitian ini dilakukan pengujian terhadap parameter masukan dari kombinasi nilai hidden layer, learning rate dan jumlah iterasi untuk mengetahui sejauh mana waktu yang dibutuhkan oleh JST backpropagation dalam melakukan pelatihan terhadap data masukan. Hasil dari pelatihan jaringan, Parameter jumlah nilai hidden layer sebesar 12 neuron untuk mendapatkan waktu pelatihan yang cepat sebanyak 3 menit 44 detik dengan galat MSE 1,654151. Pada Jumlah iterasi yang dibutuhkan dengan arsitektur hidden layer 12 neuron, dibutuhkan sebanyak 100000 iterasi dengan waktu pelatihan 21 menit 52 detik. Sedangkan pada parameter learning rate menggunakan 12  neuron dan iterasi sebesar 100000, nilai leraning rate rate yang tepat untuk pelatihan sebesar 0,5 dengan waktu yang dibutuhkan untuk pelatihan 18 menit 35 detik dengan galat MSE 0,302868.
Optimasi Keamanan Autentikasi dari Man in the Middle Attack (MiTM) Menggunakan Teknologi Blockchain Imam Riadi; Rusydi Umar; Iqbal Busthomi
JIEET (Journal of Information Engineering and Educational Technology) Vol. 4 No. 1 (2020)
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jieet.v4n1.p15-19

Abstract

Teknologi informasi memberikan dampak yang besar dalam aspek bisnis. Sistem informasi merupakan salah satu dampak dari kemajuan teknologi yang menjadi salah satu sarana untuk memudahkan pengelolaan informasi dan pelaporan pada sebuah perusahaan. Sistem informasi menggunakan proses autentikasi sebagai gerbang depan untuk melakukan validasi user sebelum mendapatkan layanan. Proses autentikasi memiliki kerentanan dari serangan siber, diantaranya adalah Man-in-the-middle attack. Payload autentikasi yang dikirim dan diterima pada sebuah sistem informasi perlu diamankan dengan baik. Pengiriman payload autentikasi dalam bentuk plaintext rentan akan serangan Man-in-the-middle. Teknologi Blockchain memberikan solusi keamanan berupa mekanisme blok hash untuk mengamankan data payload. Payload autentikasi sebelum dikirmkan diubah menjadi blok hash, sehingga keamanan dan kerahasiaan data payload lebih terjamin.
Co-Authors ., Andi Zulherry Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Nugrahantoro Achmad Syauqi Ade Davy Wiranata Ade Elvina Adhi Prabowo, Basit Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Ahmad Azhar Kadim Ahmad Azhari Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Akrom, Akrom Al Amany, Sarah Ulfah Alawi, Hanna Syahida Andrianto, Fiki Anggara, Rio Annisa, Putri Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Apriliani, Evinda Aprilliansyah, Deco Ardi Pujiyanta Arif Rahman Arif Rahman Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad Arini, Merita Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Asruddin, Asruddin Astika AyuningTyas, Astika Aulia, Aulia Aulyah Zakilah Ifani Bahagiya, Multika Untung Bashor Fauzan Muthohirin Basir, Azhar Bernadisman, Dora Budi Barata Kusuma Utami Budin, Shiha Busthomi, Iqbal Chandra Kurniawan, Gusti D.E Purwadi Putra, Izzan Julda Davito Rasendriya Rizqullah Putra Davito Rasendriya Rizqullah Putra Deco Aprilliansyah Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Ediansa, Oka Eko Brillianto Eko Handoyo Eko Handoyo Elfatiha, Muhammad Ihya Aulia Elvina, Ade Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fadlil , Abdul Fahmi Anwar Fahmi Auliya Tsani Faiz , Muhammad Nur Faiz Isnan Abdurrachman Fakhri, La Jupriadi Fanani, Galih Fatmawaty, Virdiana Sriviana Faulinda Ely Nastiti Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fithriatus Shalihah Fitri, Fitriyani Tella Fitriyani Tella Furizal Furizal, Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Habie, Khairul Fathan Hafizh, Muhammad Nasir Hanif, Abdullah Harman, Rika Haryanto, Eri Helmiyah, Siti Herman Herman Herman Herman Herman Yuliansyah Herman Yuliansyah, Herman Hidayati, Anisa Nur Himawan I Azmi Iis Wahyuningsih Ikhram, Ridho Ikhsan Zuhriyanto Ikhwan Anshori Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Jamalludin Jamalludin Jamalludin, Jamalludin Jayawarsa, A.A. Ketut Joko Handoyo Joko Triyanto Kariyamin, Kariyamin Kartoirono, Suprihatin Kurniawan, Endang Kurniawan, Gusti Chandra Kusuma, Ridho Surya Laura Sari Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Mahsun Mahsun Maulana, Irvan Miladiah Miladiah Miladiah, Miladiah Muammar Muammar, Muammar Muchlas Muchlas Muflih, Ghufron Zaida Muh. Hajar Akbar Muhajir Yunus Muhamad Abduh, Muhamad Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Fahmi Mubarok Nahdli Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Kunta Biddinika Muhammad Muhammad Muhammad Nur Faiz Muhammad Syukri Muhammad Yanuar Efendi Muhammad Zulfadhilah Muis, Alwas Murinto Murinto Murinto Murni Murni Murti, Raden Hario Wahyu Musa, Shahrulniza Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY, NANNY Nasrulloh, Imam Mahfudl Nasution, Dewi Sahara Nia Ekawati, Nia Nur Faiz, Muhammad Nur Hamida Siregar Nur Miswar Nur Widiyasono, Nur Nuril Anwar Nuril Anwar, Nuril Nurmi Hidayasari Panggah Widiandana Prabowo, Basit Adhi Pradana Ananda Raharja Prakoso, Danar Cahyo Prambudi, Rizal Prambudi, Rizal Prambudi Prasetyaningrum, Putri Taqwa Prasongko, Riski Yudhi Purwaningrum, Santi Purwanto Purwanto Purwono Purwono, Purwono Putra, Marta Dwi Darma Putri Annisa Putro, Aldibangun Pidekso Raden Hario Wahyu Murti Raden Mohamad Herdian Bhakti Rafiq, Irhash Ainur Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Anggara Rio Widodo Robiin, Bambang Rochmadi, Tri Roni Anggara Putra Rudy Ansari, Rudy Ruslan, Takdir Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Safiq Rosad Sahiruddin Sahiruddin Salim, Mansyur Santi Purwaningrum Sari, Laura Shiha Budin Sismadi, Wawan Sri Mulyaningsih Sri Winiarti Sri Winiati St Rahmatullah Sudinugraha, Tri Sugandi, Andi Suhartono, Bambang Sukma Aji Sunardi Sunardi - Sunardi Sunardi sunardi sunardi Sunardi, Sunardi Suprihatin Suprihatin Suprihatin Suprihatin Suprihatin Supriyanto Suryanto, Farid Syaefudin, Rizal Syahib, Muhammad Irwan Syahida Alawi, Hanna Syahrani Lonang Syarifudin, Arma Taufiq Ismail Taufiq Ismail Tawar Tawar Tole Sutikno Tri Lestari Tri Lestari Triyanto, Joko Umar, Rusdy Veithzal Rivai Zainal Verry Noval Kristanto W, Yunanri Wahyusari, Retno Wardiwiyono, Sartini Wasito Sukarno Weni Hawariyuni, Weni Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wicaksono, Sonny Abriantoro Widiandana, Panggah WIDODO, RIO Winiati, Sri Wintolo, Hero Wisnu Pranoto Yana Mulyana Yana Mulyana Yana Safitri, Yana Yudi Kurniawan Yudi Kurniawan Yudi prayudi Yulian Wahyu Permadi Yuliansyah, Herman Yuliansyah, Herman Zein, Wahid Alfaridsi Achmad