p-Index From 2020 - 2025
18.568
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering ComEngApp : Computer Engineering and Applications Journal Lontar Komputer: Jurnal Ilmiah Teknologi Informasi JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Techno.Com: Jurnal Teknologi Informasi Jurnal Buana Informatika TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Jurnal Teknik Elektro PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Ilmiah Kursor Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar INFORMAL: Informatics Journal Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi Proceeding of the Electrical Engineering Computer Science and Informatics Edu Komputika Journal Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) RABIT: Jurnal Teknologi dan Sistem Informasi Univrab SISFOTENIKA Journal of Information Technology and Computer Science (JOINTECS) INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) AKSIOLOGIYA : Jurnal Pengabdian Kepada Masyarakat JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI Abdimas Dewantara PROCESSOR Jurnal Ilmiah Sistem Informasi, Teknologi Informasi dan Sistem Komputer JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Compiler Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Digital Zone: Jurnal Teknologi Informasi dan Komunikasi IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat EDUMATIC: Jurnal Pendidikan Informatika Jurnal Mantik NUKHBATUL 'ULUM : Jurnal Bidang Kajian Islam Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Mobile and Forensics Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Jurnal Pengabdian Masyarakat Bumi Raflesia Cyber Security dan Forensik Digital (CSFD) Journal of Computer System and Informatics (JoSYC) International Journal of Advances in Data and Information Systems Journal of Innovation Information Technology and Application (JINITA) Journal of Education Informatic Technology and Science Jurnal Bumigora Information Technology (BITe) Jurnal Teknologi Informatika dan Komputer SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit Jurnal Teknik Informatika (JUTIF) Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Phasti: Jurnal Teknik Informatika Politeknik Hasnur Jurnal Pengabdian Masyarakat Indonesia J-SAKTI (Jurnal Sains Komputer dan Informatika) DECODE: Jurnal Pendidikan Teknologi Informasi Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Techno Lambda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya Engineering Science Letter Journal of Novel Engineering Science and Technology Jurnal Informatika: Jurnal Pengembangan IT Jurnal Software Engineering and Computational Intelligence Mohuyula : Jurnal Pengabdian Kepada Masyarakat Khazanah Informatika : Jurnal Ilmu Komputer dan Informatika
Claim Missing Document
Check
Articles

Detection of Metasploit Attacks Using RAM Forensic on Proprietary Operating Systems Prakoso, Danar Cahyo; Riadi, Imam; Prayudi, Yudi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 2, May 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (288.564 KB) | DOI: 10.22219/kinetik.v5i2.1037

Abstract

Information technology has become an essential thing in the digital era as it is today. With the support of computer networks, information technology is used as a medium for exchanging data and information. Much information is confidential. Therefore, security is also essential. Metasploit is one of the frameworks commonly used by penetration testers to audit or test the security of a computer system legally, but it does not rule out the possibility that Metasploit can also be used for crime. For this reason, it is necessary to carry out a digital forensic process to uncover these crimes. In this study, a simulation of attacks on Windows 10 will be carried out with Metasploit. Then the digital forensics process uses live forensics techniques on computer RAM, where the computer RAM contains information about the processes running on the computer. The live forensic technique is important because information on RAM will be lost if the computer is off. This research will use FTK Imager, Dumpit, and Magnet RAM Capture as the RAM acquisition tool and Volatility as the analysis tool. The results of the research have successfully shown that the live forensics technique in RAM is able to obtain digital evidence in the form of an attacker's IP, evidence of exploits/Trojans, processes running on RAM, operating system profiles used and the location of the exploits/Trojan when executed by the victim.
Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based Fanani, Galih; Riadi, Imam
Buletin Ilmiah Sarjana Teknik Elektro Vol 2, No 2 (2020): Agustus
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v2i2.1065

Abstract

This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.
Traffic Shaping Menggunakan Metode HTB (Hierarchical Token Bucket) pada Jaringan Nirkabel Budin, Shiha; Riadi, Imam
Buletin Ilmiah Sarjana Teknik Elektro Vol 1, No 3 (2019): Desember
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/biste.v1i3.1100

Abstract

Perkembangan zaman yang semakin pesat menuntut adanya layanan informasi yang lebih cepat, tepat, dan akurat menjadikan jaringan komputer sebagai kebutuhan utama. Traffic Shaping dengan Quality of Service (QoS) dapat digunakan dalam mengoptimalkan bandwidth suatu jaringan untuk menentukan jenis-jenis lalu lintas jaringan. Metode Hierarchical Token Bucket (HTB) dapat mengimplementasi pembagian trafik yang lebih akurat, dengan bandwidth yang tidak digunakan dapat dioptimalkan oleh pengguna lain. Hasil traffic shaping menggunakan metode HTB menghasilkan rata-rata indeks QoS yaitu 3,75 dan dapat dikategorikan Baik, dibandingkan sebelum menerapkan traffic shaping yaitu rata-rata 2,25 yang dikategorikan Kurang Baik. Berdasarkan hasil pengujian dapat disimpulkan bahwa kinerja jaringan hotspot dengan Traffic Shaping dan Quality of Service (QoS)  dapat meningkatkan kualitas jaringan daripada sebelumnya.The development of an increasingly rapid era requires the existence of information services that are faster, more precise, and accurate, making computer networks a primary need. Traffic Shaping with Quality of Service (QoS) can be used in optimizing the bandwidth of a network to determine the types of network traffic. The Hierarchical Token Bucket (HTB) method can implement more accurate traffic sharing, with unused bandwidth being optimized by other users. The results of traffic shaping using the HTB method produces an average QoS index of 3.75 and can be categorized Good, compared to before applying traffic shaping which is an average of 2.25 which is categorized as Poor. Based on the test results it can be concluded that the performance of hotspot networks with Traffic Shaping and Quality of Service (QoS) can improve network quality than before.
Analisis Bukti Serangan Address Resolution Protocol Spoofing menggunakan Metode National Institute of Standard Technology Riadi, Imam; Fadlil, Abdul; Hafizh, Muhammad Nasir
Jurnal Pendidikan Informatika (EDUMATIC) Vol 4, No 1 (2020): Edumatic : Jurnal Pendidikan Informatika
Publisher : Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research intends to find information about evidence of Address Resolution Protocol (ARP) Spoofing attacks that is the MAC address of the attacker and victim also the time of the attack. This research uses Wireshark tools to inspect network traffic, especially on the ARP protocol. It uses the National Institute of Technology Technology (NIST) method as a framework in the simulation process to produce evidence reports. ARP Spoofing attacks can lead to other attacks, such as Denial of Service and Man in the Middle Attack, this attack allows users not to be able to access the network and data theft. During the simulation stage, 2 ARP Spoofing attacks are carried out on 1 laptop and 1 router connected to the network. The results of the attack simulation found 2 attacks and obtained information about the MAC address of the attacker and victim and also the time of the attack. Based on the results of tests carried, successfully found all ARP Spoofing attacks that occur on the network with a success rate of 100%
Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi pada Bukti Digital Menggunakan Framework DFRWS Sunardi; Imam Riadi; Muh. Hajar Akbar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 3 (2020): Juni 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (685.291 KB) | DOI: 10.29207/resti.v4i3.1906

Abstract

Steganography is one of the anti-forensic techniques that allow criminals to hide information in other messages so that during the investigation, the investigator will experience problems and difficulty in getting evidence of original information on the crime. Therefore an investigator is required to have the ability to be able to find and extract (decoding) using the right tools when opening messages that have been inserted by steganography techniques. The purpose of this study is to analyze digital evidence using the static forensics method by applying the six stages to the Digital Forensics Research Workshop (DFRWS) framework and extracting steganography on files that have been compromised based on case scenarios involving digital crime. The tools used are FTK Imager, Autopsy, WinHex, Hiderman, and StegSpy. The results of extraction of 9 out of 10 files that were scanned by steganography files had 90% success and 10% of steganography files were not found, so it can be concluded that the extraction files in steganographic messages can be used as legal digital proofs according to law.
Analisis Validasi Image PNG File Upload menggunakan Metadata pada Aplikasi Berbasis Web Anwar, Fahmi; Fadlil, Abdul; Riadi, Imam
Edu Komputika Journal Vol 7 No 1 (2020): Edu Komputika Journal
Publisher : Jurusan Teknik Elektro Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/edukomputika.v7i1.38722

Abstract

Penggunaan Website pada zaman sekarang sedang berkembang pesat, berbagai jenis aplikasi, layanan dari swasta sampai pemerintah banyak menggunakan website sebagai media interaksi antar berbagai platform. Biasanya saat mengunggah berkas pada website, sistem melakukan validasi dengan menyaring jenis berkas objek digital di server side (backend) atau dalam halaman website pada web browser dalam bentuk HTML atau Javascript (frontend) dengan memanfaatkan penyaringan File Signature atau Multipurpose Internet Mail Extensions (MIME), File Extention dan File Size pada setiap berkas yang diunggah tanpa mengecek isi kontennya sehingga berkas digital object yang corrupt atau yang disisipi selain gambar dapat diproses dalam fitur unggahan. Faktor keamanan sangatlah penting dikarenakan pada zaman yang semakin berkembang banyak sistem yang berupa digital. Ancaman serangan terhadap berbagai jenis sistem yang berbentuk digital atau server juga ikut berkembang, maka diperlukan sebuah penanganan terhadap ancaman atau serangan pada server dengan celah fitur unggahan. Penelitian ini bertujuan untuk meneliti teknik validasi PNG yang tidak hanya mengecek MIME, File Extention dan File Size tetapi memanfaatkan juga Metadata PNG dan nilai warna RGBA (Red, Green, Blue, Alpha) pada setiap pixel dengan Metode Pengembangan menggunakan Extreme Programming (XP). Hasil penelitian dengan sampel 10 gambar berisi metadata dan 10 gambar yang tidak berisi metadata dapat mengecek validasi secara khusus unggahan gambar pada PNG File dengan menyaring secara khusus sesuai keunikan dari file gambar yaitu mempunyai panjang dan lebar pada metadatanya yang harus tersedia (Width, Height, Bits, Mime) serta RGBA (Red, Green, Blue, Alpha) pada setiap piksel sesuai dengan panjang dan lebar sebuah gambar PNG.
Speech Classification to Recognize Emotion Using Artificial Neural Network Helmiyah, Siti; Riadi, Imam; Umar, Rusydi; Hanif, Abdullah
Khazanah Informatika Vol. 7 No. 1 April 2021
Publisher : Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v7i1.11913

Abstract

This study seeks to identify human emotions using artificial neural networks. Emotions are difficult to understand and hard to measure quantitatively. Emotions may be reflected in facial expressions and voice tone. Voice contains unique physical properties for every speaker. Everyone has different timbres, pitch, tempo, and rhythm. The geographical living area may affect how someone pronounces words and reveals certain emotions. The identification of human emotions is useful in the field of human-computer interaction. It helps develop the interface of software that is applicable in community service centers, banks, education, and others. This research proceeds in three stages, namely data collection, feature extraction, and classification. We obtain data in the form of audio files from the Berlin Emo-DB database. The files contain human voices that express five sets of emotions: angry, bored, happy, neutral, and sad. Feature extraction applies to all audio files using the method of Mel Frequency Cepstrum Coefficient (MFCC). The classification uses Multi-Layer Perceptron (MLP), which is one of the artificial neural network methods. The MLP classification proceeds in two stages, namely the training and the testing phase. MLP classification results in good emotion recognition. Classification using 100 hidden layer nodes gives an average accuracy of 72.80%, an average precision of 68.64%, an average recall of 69.40%, and an average F1-score of 67.44%.This study seeks to identify human emotions using artificial neural networks. Emotions are difficult to understand and hard to measure quantitatively. Emotions may be reflected in facial expressions and voice tone. Voice contains unique physical properties for every speaker. Everyone has different timbres, pitch, tempo, and rhythm. The geographical living area may affect how someone pronounces words and reveals certain emotions. The identification of human emotions is useful in the field of human-computer interaction. It helps develop the interface of software that is applicable in community service centres, banks, and education and others. This research proceeds in three stages, namely data collection, feature extraction, and classification. We obtain data in the form of audio files from the Berlin Emo-DB database. The files contain human voices that express five sets of emotions: angry, bored, happy, neutral and sad. Feature extraction applies to all audio files using the method of Mel Frequency Cepstrum Coefficient (MFCC). The classification uses Multi-Layer Perceptron (MLP), which is one of the artificial neural network methods. The MLP classification proceeds in two stages, namely the training and the testing phase. MLP classification results in good emotion recognition. Classification using 100 hidden layer nodes gives an average accuracy of 72.80%, an average precision of 68.64%, an average recall of 69.40%, and an average F1-score of 67.44%.
Cyber Security Analysis of Academic Services based on Domain Delivery Services and Support using Indonesian E-Government Ratings (PEGI) Riadi, Imam; Riyadi Yanto, Iwan Tti; Handoyo, Eko
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 4, November 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v5i4.1083

Abstract

Safe academic services are the most important part of universities. The security of academic services is very important to maintain information optimally and safely. Along with the development of technology, academic information services are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent of governance of higher education academic information system security by evaluating. So the research was conducted to determine the maturity of the security of Higher Education academic information service security by using the COBIT 5 framework in the DSS05 domain. The DSS05 domain in COBIT 5 is a good framework for use in implementing and evaluating the security of academic information services. Meanwhile, to determine the achievement of the evaluation of the security level of academic information systems, the Indonesian e-government ranking (PEGI) method is required. The combination of the COBIT 5 framework in the DSS05 domain using the PEGI method in academic information security service is able to provide a level of achievement in the form of Customer Value. The results of the COBIT 5 framework analysis of the DSS05 domain using the PEGI method get a score of 3.50 so that the quality of academic information service security evaluation achievement is at a very good level. At this level, universities are increasingly open to technological development. Higher education has applied the concept of quantification in every process, and has always been monitored and controlled for its performance in the security of academic information systems.
ANALISIS STATISTIK LOG JARINGAN UNTUK DETEKSI SERANGAN DDOS BERBASIS NEURAL NETWORK Muhammad, Arif Wirawan; Riadi, Imam; Sunardi, Sunardi
ILKOM Jurnal Ilmiah Vol 8, No 3 (2016)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1103.013 KB) | DOI: 10.33096/ilkom.v8i3.76.220-225

Abstract

Distributed denial-of-service (DDoS) merupakan jenis serangan dengan volume, intensitas, dan biaya mitigasi yang terus meningkat seiring berkembangnya skala organisasi. Penelitian ini memiliki tujuan untuk mengembangkan sebuah pendekatan baru untuk mendeteksi serangan DDoS, berdasarkan log jaringan yang dianalisis secara statistik dengan fungsi neural network sebagai metode deteksi. Data pelatihan dan pengujian diambil dari CAIDA DDoS Attack 2007 dan simulasi mandiri. Pengujian terhadap metode analisis statistik terhadap log jaringan dengan fungsi neural network sebagai metode deteksi menghasilkan prosentase rata-rata pengenalan terhadap tiga kondisi jaringan (normal, slow DDoS, dan DDoS) sebesar 90,52%. Adanya pendekatan baru dalam mendeteksi serangan DDoS, diharapkan bisa menjadi sebuah komplemen terhadap sistem Intrusion Detection System (IDS) dalam meramalkan terjadinya serangan DDoS.
Optimasi Keamanan Autentikasi dari Man in the Middle Attack (MiTM) Menggunakan Teknologi Blockchain Riadi, Imam; Umar, Rusydi; Busthomi, Iqbal
JIEET (Journal of Information Engineering and Educational Technology) Vol 4, No 1 (2020)
Publisher : Universitas Negeri Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/jieet.v4n1.p15-19

Abstract

Teknologi informasi memberikan dampak yang besar dalam aspek bisnis. Sistem informasi merupakan salah satu dampak dari kemajuan teknologi yang menjadi salah satu sarana untuk memudahkan pengelolaan informasi dan pelaporan pada sebuah perusahaan. Sistem informasi menggunakan proses autentikasi sebagai gerbang depan untuk melakukan validasi user sebelum mendapatkan layanan. Proses autentikasi memiliki kerentanan dari serangan siber, diantaranya adalah Man-in-the-middle attack. Payload autentikasi yang dikirim dan diterima pada sebuah sistem informasi perlu diamankan dengan baik. Pengiriman payload autentikasi dalam bentuk plaintext rentan akan serangan Man-in-the-middle. Teknologi Blockchain memberikan solusi keamanan berupa mekanisme blok hash untuk mengamankan data payload. Payload autentikasi sebelum dikirmkan diubah menjadi blok hash, sehingga keamanan dan kerahasiaan data payload lebih terjamin.
Co-Authors Abdul Fadlil Abdul Fadlil Abdullah Hanif Abdullah Hanif Achmad Nugrahantoro Achmad Syauqi Ade Elvina Adhi Prabowo, Basit Adiniah Gustika Pratiwi Agung Wahyudi Agus Wijayanto Ahmad Azhar Kadim Ahmad Azhari Ahmad Luthfi Ahmad, Muhammad Sabri Aini, Fadhilah Dhinur Akrom, Akrom Al Amany, Sarah Ulfah Alawi, Hanna Syahida Aminuyati Andrianto, Fiki Anggara, Rio Annisa, Putri Anshori, Ikhwan Anton Yudahana Anton Yudhana Anton Yudhana ANWAR, FAHMI anwar, nuril Aprilliansyah, Deco Ardi Pujiyanta Arif Rahman Arif Rahman Arif Wirawan Muhammad Arif Wirawan Muhammad Arif Wirawan Muhammad Arini, Merita Ariqah Adliana Siregar Arizona Firdonsyah Asno Azzawagama Firdaus Astika AyuningTyas, Astika Aulia, Aulia Aulyah Zakilah Ifani Bashor Fauzan Muthohirin Basir, Azhar Basir, Azhar Bernadisman, Dora Budi Barata Kusuma Utami Budin, Shiha Busthomi, Iqbal Chandra Kurniawan, Gusti D.E Purwadi Putra, Izzan Julda Davito Rasendriya Rizqullah Putra Dewi Astria Faroek Dewi Estri Jayanti Dikky Praseptian M Dwi Aryanto Eddy Irawan Aristianto Eko Brillianto Eko Handoyo Eko Handoyo Elfatiha, Muhammad Ihya Aulia Elvina, Ade Ervin Setyobudi Fadhilah Dhinur Aini Fadhilah Dhinur Aini Fahmi Anwar Fahmi Auliya Tsani Faiz Isnan Abdurrachman Fakhri, La Jupriadi Fanani, Galih Fatmawaty, Virdiana Sriviana Fauzan Natsir Fauzan, Fauzan Firdonsyah, Arizona Fitriyani Tella Furizal Furizal, Furizal Galih Fanani Galih Pramuja Inngam Fanani Guntur Maulana Zamroni Guntur Maulana Zamroni, Guntur Maulana Habie, Khairul Fathan Hafizh, Muhammad Nasir Hanif, Abdullah Helmiyah, Siti Herman Herman Herman Herman Herman Herman Yuliansyah Herman Yuliansyah, Herman Hidayati, Anisa Nur Himawan I Azmi Iis Wahyuningsih Ikhsan Zuhriyanto Ikhwan Anshori Imam Mahfudl Nasrulloh Iqbal Busthomi Irhas Ainur Rafiq Irhash Ainur Rafiq Iwan Tri Riyadi Yanto, Iwan Tri Riyadi Jamalludin Jamalludin Jamalludin, Jamalludin Jayawarsa, A.A. Ketut Joko Triyanto Kartoirono, Suprihatin Kusuma, Ridho Surya Laura Sari Luh Putu Ratna Sundari M Rosyidi Djou M. Rosyidi Djou M.A. Khairul Qalbi Mahsun Mahsun Maulana, Irvan Miladiah Miladiah Miladiah, Miladiah Muammar Muammar, Muammar Mubarok Nahdli, Muhammad Fahmi Muflih, Ghufron Zaida Muh. Hajar Akbar Muhajir Yunus Muhamad Abduh, Muhamad Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Faqih Dzulqarnain, Muhammad Faqih Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Kunta Biddinika Muhammad Muhammad Muhammad Nur Faiz Muhammad Syukri Muhammad Yanuar Efendi Muhammad Zulfadhilah Muis, Alwas Murinto Murni Murni Murti, Raden Hario Wahyu Mushab Al Barra Mustafa Mustafa Mustafa Mustafa NANNY, NANNY Nasrulloh, Imam Mahfudl Nasution, Dewi Sahara Nia Ekawati, Nia Nur Hamida Siregar Nur Miswar Nur Widiyasono, Nur Nuril Anwar Nuril Anwar, Nuril Panggah Widiandana Prabowo, Basit Adhi Pradana Ananda Raharja Prakoso, Danar Cahyo Prambudi, Rizal Prambudi Prasongko, Riski Yudhi Purwanto Purwanto Purwono Purwono, Purwono Putra, Marta Dwi Darma Putri Annisa Putro, Aldibangun Pidekso Raden Hario Wahyu Murti Rahmat Ardila Dwi Yulianto Ramadhani, Erika Ramansyah Ramansyah Rauli, Muhamad Ermansyah Rauli, Muhamad Ermansyah Ridho Surya Kusuma Rio Anggara Rio Widodo Rochmadi, Tri Roni Anggara Putra Ruslan, Takdir Rusydi Umar Rusydi Umar Rusydi Umar Ruuhwan Ruuhwan Sahiruddin Sahiruddin Salim, Mansyur Santi Purwaningrum Shiha Budin Sri Mulyaningsih Sri Winiarti Sri Winiati St Rahmatullah Sugandi, Andi Suhartono, Bambang Sukma Aji Sunardi Sunardi - Sunardi Sunardi sunardi sunardi Sunardi, Sunardi Suprihatin Suprihatin Suprihatin Suprihatin Suprihatin Suryanto, Farid Syahib, Muhammad Irwan Syahida Alawi, Hanna Syahrani Lonang Syarifudin, Arma Takdir Ruslan Taufiq Ismail Taufiq Ismail Tawar Tawar Tole Sutikno Tri Lestari Tri Lestari Tri Sudinugraha Triyanto, Joko Tuska Abe Umar, Rusdy Veithzal Rivai Zainal Verry Noval Kristanto W, Yunanri Wardiwiyono, Sartini Wasito Sukarno Weni Hawariyuni, Weni Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wicaksono, Sonny Abriantoro WIDODO, RIO Winiati, Sri Wintolo, Hero Wisnu Pranoto Yana Mulyana Yana Mulyana Yana Safitri, Yana Yudi Kurniawan Yudi prayudi Yulian Wahyu Permadi Yuliansyah, Herman Yuliansyah, Herman Zein, Wahid Alfaridsi Achmad