p-Index From 2021 - 2026
6.684
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering TEKNIK INFORMATIKA Media Informatika Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Teknik Jurnal Teknologi dan Manajemen Informatika Jurnal Buana Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika AJIE (Asian Journal of Innovation and Entrepreneurship) Register: Jurnal Ilmiah Teknologi Sistem Informasi JOIN (Jurnal Online Informatika) Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SemanTIK : Teknik Informasi JURNAL MEDIA INFORMATIKA BUDIDARMA Network Engineering Research Operation [NERO] Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control IT JOURNAL RESEARCH AND DEVELOPMENT Seminar Nasional Teknologi Informasi Komunikasi dan Industri JRST (Jurnal Riset Sains dan Teknologi) JURNAL ILMIAH INFORMATIKA JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) Indonesian Journal of Applied Informatics Jurnal Ilmiah Sinus EDUMATIC: Jurnal Pendidikan Informatika JISKa (Jurnal Informatika Sunan Kalijaga) Technologia: Jurnal Ilmiah Infotekmesin Dinasti International Journal of Education Management and Social Science Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia) Cyber Security dan Forensik Digital (CSFD) JATI (Jurnal Mahasiswa Teknik Informatika) JIIP (Jurnal Ilmiah Ilmu Pendidikan) JITU : Journal Informatic Technology And Communication Automata Journal of Education Informatic Technology and Science Just TI (Jurnal Sains Terapan Teknologi Informasi) JURNAL PENDIDIKAN, SAINS DAN TEKNOLOGI Jurnal Teknik Informatika (JUTIF) Phasti: Jurnal Teknik Informatika Politeknik Hasnur J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Abdi Masyarakat Indonesia Indonesian Journal of Networking and Security - IJNS SPEED - Sentra Penelitian Engineering dan Edukasi Reformasi Hukum Jurnal Indonesia Sosial Teknologi Prosiding SEMNAS INOTEK (Seminar Nasional Inovasi Teknologi) Jurnal Sains, Nalar, dan Aplikasi Teknologi Informasi
Claim Missing Document
Check
Articles

Forensic Analysis of Web Scraping Documents on Carding Forums and Shops using Latent Dirichlet Allocation: Profiling Forensic and NLP Approaches for Cybercrime Investigation Adristi, Fikri Irfan; Prayudi, Yudi
JOIN (Jurnal Online Informatika) Vol 10 No 2 (2025)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v10i2.1603

Abstract

This research is based on the massive cybercrime activity in carding forums and carding shops. Based on the many victims and losses from these activities a cybercrime investigation action is needed by a digital forensic investigator. The purpose of this study is to develop a forensic carding investigation framework based on document analysis of web scraping results on carding forums and carding shops, which applies forensic profiling analysis methods and natural language processing based on the latent dirichlet allocation (LDA) algorithm. The tools used for web scraping in this study are WebHarvy Version 7.3.0.222. The tools used for data processing in this study are Microsoft Excel and Orange Data Mining. The conclusion of this study shows that the application of web scraping investigation techniques on carding forums and carding shops based on an carding investigation framework has been effective in collecting relevant data and analyzing the activities of cybercriminal appropriately. Overall, this study has succeeded in developing a more organized and data-driven approach to dealing with crimes in carding forums and carding shops, which can be a reference for further research and application in the field of digital forensic investigation.
The Use of Multiplayer Perceptron Method to Identify Sexual Harassment on Social Media X (Twitter) Giffary, Farhan Wildan; Prayudi, Yudi
Dinasti International Journal of Education Management And Social Science Vol. 6 No. 6 (2025): Dinasti International Journal of Education Management and Social Science (Augus
Publisher : Dinasti Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38035/dijemss.v6i6.4903

Abstract

The Multilayer Perceptron (MLP) method, as a type of artificial neural network, is used in this study to classify tweets containing sexual harassment elements. This research begins with data collection from social media platform X (Twitter), where tweets that are considered relevant to the topic of sexual harassment are collected for further analysis. This data collection process was carried out by observing the principles of research ethics and maintaining the confidentiality of user identity. Once the data was collected, a text pre-processing stage was performed to ensure that the data used was clean and ready to be processed by the model. This pre-processing includes several important steps such as cleansing, slangword, and stopword removal. The data that has gone through this stage is then weighted using the TF-IDF method, a technique that helps determine the importance of certain words in a set of tweets. The processed data is then analyzed using the MLP algorithm. MLP was chosen due to its superior ability to handle complex and non-linear data. This algorithm is able to detect patterns that indicate the presence of sexual harassment elements in tweets, by classifying based on certain patterns of words, phrases, or contexts that often appear in cases of sexual harassment on social media. This research also uses the NIST Framework to ensure that the entire process of collecting, processing, and analyzing data is carried out in accordance with applicable digital forensic standards. This is important to maintain the validity and legality of the research results, especially if these results are used to support official investigations by the authorities. With the implementation of the MLP method, it is hoped that social media platforms and authorities can be more effective in detecting, preventing, and overcoming cases of sexual harassment in cyberspace
Membandingkan Tingkat Kemiripan Rekaman Voice Changer Menggunakan Analisis Pitch, Formant Dan Spectogram Subki, Ahmad; Sugiantoro, Bambang; Prayudi, Yudi
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 5 No 1: Februari 2018
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (498.29 KB) | DOI: 10.25126/jtiik.201851500

Abstract

Audio forensik merupakan salah satu ilmu yang mnyandingkan antara ilmu pengetahuan dan metode ilmiah dalam proses analisis rekaman suara untuk membantu dan mendukung pengungkapan suatu tindak kejahatan yang diperlukan dalam proses persidangan. Undang-undang ITE No.19 Tahun 2016 menyebutkan bahwa rekaman suara merupakan salah satu alat bukti digital yang sah dan dapat digunakan sebagai penguat dakwaan. Rekaman suara yang merupakan barang bukti digital sangatlah mudah dan rentan dimanipulasi, baik secara sengaja maupun tidak disengaja. Pada penelitian ini dilakukan analisis terkait tingkat kemiripan antara rekaman suara voice changer dengan rekaman suara asli menggunakan analisis pitch, formant dan spectogram, rekaman suara yang dianalisis ada dua jenis rekaman suara yaitu suara laki-laki dan suara perempuan. Rekaman suara voice changer  dan rekaman suara asli, diekstrak menggunakan tools praat kemudian informasi yang diperoleh dianalisis dengan analisis statistik pitch, formant dan spectrogrammenggunakan tools gnumeric. Penelitian ini menghasilkan bahwa analisis rekaman suara voice changer dengan rekaman suara asli dapat menggunakan analisis statistik pitch, formant dan spectrogram, rekaman suara voice changer A memiliki tingkat kemiripan yang paling tinggi dengan rekaman suara asli pada posisi low pitch, sedangkan voice changer yang lain lebih sulit untuk diidentifikasi.
Eksplorasi ABAC dan XACML untuk Design Access Control pada Resource Digital Natsir, Fauzan; Riadi, Imam; Prayudi, Yudi
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 6 No 5: Oktober 2019
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3793.821 KB) | DOI: 10.25126/jtiik.2019651679

Abstract

Resource digital memerlukan sebuah mekanisme untuk mengatur policy terhadap kontrol untuk mendapatkan hak akes ke dalam suatu sistem. Akses kontrol lebih fleksibel dibanding dengan pendekatan otorisasi, autentikasi ataupun verifikasi yang sangat sederhana. Mekanisme access control policy dengan pendekatan atribut diyakini sebagai solusi adaptif yaitu ABAC (Attribute Based Access Control) dengan implementasi model XACML (Extensible Access Control Modelling Language). Desain policy ABAC ini disajikan dengan atribut-atribut dari salah satu studi kasus resource digital dengan sistem e-Library. e-Library merupakan salah satu resource digital dimana proses autentikasinya belum dimodelkan dengan atrubut subjek yang ada. Penelitian ini diawali dari identifikasi atribut dari rule, pemodelan ABAC resource digital, implementasi XACML, simulasi sistem dan analisis sistem. Hasil dari pengujian akses kontrol menggunakan ALFA (Axiomatics Language for Authorization) untuk pemberian kinerja akses kontrol terhadap resource digital. Hasil analisis dengan pendekatan ABAC dengan model XACML ini menyajikan suatu keamanan sistem dengan model akses kontrol berbasis atribut dari policy statement untuk menjadi solusi model akses kontrol yang dibuat sebelumnya dan mendukung model akses kontrol yang relevan untuk resource digitalAbstractDigital resources require a mechanism to regulate policy against controls to get access rights to a system. Access control is more flexible than the very simple approach of authorization, authentication or verification. The access control policy with the attribute approach is believed to be an adaptive solution, namely ABAC (Attribute Based Access Control) with the implementation of the XACML (Extensible Access Control Modeling Language) model. This ABAC policy design is presented with attributes from one of the digital resource case studies with the e-Library system. e-Library is one of the digital resources where the authentication process has not been modeled with the existing subject matter. This study begins with the identification of the attributes of the rule, digital ABAC resource modeling, XACML implementation, system simulation and system analysis. The results of testing access control using ALFA (Axiomatics Language for Authorization) to provide performance control access to digital resources. The results of the analysis using the ABAC approach with the XACML model present a system security with attribute-based access control models from policy statements to be a solution to the previously created access control model and support the access control model relevant for digital resources
Steganalisis Blind dengan Metode Convolutional Neural Network (CNN) Yedroudj- Net terhadap Tools Steganografi Hidayasari, Nurmi; Riadi, Imam; Prayudi, Yudi
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 7 No 4: Agustus 2020
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2020703326

Abstract

Steganalisis digunakan untuk mendeteksi ada atau tidaknya file steganografi. Salah satu kategori steganalisis adalah blind steganalisis, yaitu cara untuk mendeteksi file rahasia tanpa mengetahui metode steganografi apa yang digunakan. Sebuah penelitian mengusulkan bahwa metode Convolutional Neural Networks (CNN) dapat mendeteksi file steganografi menggunakan metode terbaru dengan nilai probabilitas kesalahan rendah dibandingkan metode lain, yaitu CNN Yedroudj-net. Sebagai metode steganalisis Machine Learning terbaru, diperlukan eksperimen untuk mengetahui apakah Yedroudj-net dapat menjadi steganalisis untuk keluaran dari tools steganografi yang biasa digunakan. Mengetahui kinerja CNN Yedroudj-net sangat penting, untuk mengukur tingkat kemampuannya dalam hal steganalisis dari beberapa tools. Apalagi sejauh ini, kinerja Machine Learning masih diragukan dalam blind steganalisis. Ditambah beberapa penelitian sebelumnya hanya berfokus pada metode tertentu untuk membuktikan kinerja teknik yang diusulkan, termasuk Yedroudj-net. Penelitian ini akan menggunakan lima alat yang cukup baik dalam hal steganografi, yaitu Hide In Picture (HIP), OpenStego, SilentEye, Steg dan S-Tools, yang tidak diketahui secara pasti metode steganografi apa yang digunakan pada alat tersebut. Metode Yedroudj-net akan diimplementasikan dalam file steganografi dari output lima alat. Kemudian perbandingan dengan tools steganalisis lain, yaitu StegSpy. Hasil penelitian menunjukkan bahwa Yedroudj-net bisa mendeteksi keberadaan file steganografi. Namun, jika dibandingkan dengan StegSpy hasil gambar yang tidak terdeteksi lebih tinggi.AbstractSteganalysis is used to detect the presence or absence of steganograpy files. One category of steganalysis is blind steganalysis, which is a way to detect secret files without knowing what steganography method is used. A study proposes that the Convolutional Neural Networks (CNN) method can detect steganographic files using the latest method with a low error probability value compared to other methods, namely CNN Yedroudj-net. As the latest Machine Learning steganalysis method, an experiment is needed to find out whether Yedroudj-net can be a steganalysis for the output of commonly used steganography tools. Knowing the performance of CNN Yedroudj-net is very important, to measure the level of ability in terms of steganalysis from several tools. Especially so far, Machine Learning performance is still doubtful in blind steganalysis. Plus some previous research only focused on certain methods to prove the performance of the proposed technique, including Yedroudj-net. This research will use five tools that are good enough in terms of steganography, namely Hide In Picture (HIP), OpenStego, SilentEye, Steg and S-Tools, which is not known exactly what steganography methods are used on the tool. The Yedroudj-net method will be implemented in a steganographic file from the output of five tools. Then compare with other steganalysis tools, namely StegSpy. The results showed that Yedroudj-net could detect the presence of steganographic files. However, when compared with StegSpy the results of undetected images are higher.
Network Forensics Against Address Resolution Protocol Spoofing Attacks Using Trigger, Acquire, Analysis, Report, Action Method Wijayanto, Agus; Riadi, Imam; Prayudi, Yudi; Sudinugraha, Tri
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 8 No 2 (2022): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v8i2.2953

Abstract

This study aims to obtain attack evidence and reconstruct commonly used address resolution protocol attacks as a first step to launch a moderately malicious attack. MiTM and DoS are the initiations of ARP spoofing attacks that are used as a follow-up attack from ARP spoofing. The impact is quite severe, ranging from data theft and denial of service to crippling network infrastructure systems. In this study, data collection was conducted by launching an test attack against a real network infrastructure involving 27 computers, one router, and four switches. This study uses a Mikrotik router by building a firewall to generate log files and uses the Tazmen Sniffer Protocol, which is sent to a syslog-ng computer in a different virtual domain in a local area network. The Trigger, Acquire, Analysis, Report, Action method is used in network forensic investigations by utilising Wireshark and network miners to analyze network traffic during attacks. The results of this network forensics obtain evidence that there have been eight attacks with detailed information on when there was an attack on the media access control address and internet protocol address, both from the attacker and the victim. However, attacks carried out with the KickThemOut tool can provide further information about the attacker’s details through a number of settings, in particular using the Gratuitous ARP and ICMP protocols.
Artificial Intelligence-Based Deepfake Crimes: A Conception of Culpability Principle as a Criminal Liability Reform Wafi, Muhammad Syafiq; Aloysius Wisnubroto; Prayudi, Yudi
Reformasi Hukum Vol 29 No 2 (2025): August Edition
Publisher : Fakultas Hukum Universitas Islam Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46257/jrh.v29i2.1304

Abstract

The phenomenon of deepfake crimes based on artificial intelligence (AI) demands a reform of criminal liability concepts through the expansion of the culpability principle, allowing the placement of AI as a subject of law. However, the idea of recognizing AI as an independent legal entity (electronic personhood) is considered irrelevant, since AI lacks human-like will and moral autonomy. Therefore, this study proposes a model of criminal liability that extends the culpability principle to providers and users of deepfake technology. Using a normative legal research method based on primary and secondary legal materials, this study comprehensively examines the application of the culpability principle through a comparative approach among various jurisdictions. The findings indicate that the most proportional form of liability is the vicarious liability model, which was initially applied to corporations but can be adapted to the AI context. In this model, software providers may be held liable for acts committed by AI in deepfake crimes, particularly as part of their responsibility toward technology governance regulations. The study recommends establishing national regulations emphasizing governance systems based on risk assessment, risk management, and impact assessment, as practiced in the European Union, Canada, and the United States. In conclusion, reforming criminal liability in the AI era is a strategic step to address the growing prevalence of deepfake crimes and to ensure that the legal system remains adaptive to technological developments.
Anti Forensik Voice Note Menggunakan Whatsapp Mod Mardlatillah, Hanifah; Prayudi, Yudi; Ramadhani, Erika
Jurnal Teknik Vol 21 No 2 (2023): Jurnal Teknik
Publisher : Universitas Negeri Gorontalo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37031/jt.v21i2.328

Abstract

Currently there is a social media application that provides additional features in the form of voice changers by utilizing the voice note feature of Whatsapp Mod which can blur the identity of the voice owner. In several articles, Whatsapp Mod claims that this application is an anti-banned application, so it is feared that Whatsapp Mod is an application that uses anti-forensic techniques in it. This study aims to prove whether voice modifiers using voice notes on Whatsapp Mod can be a form of anti-forensic activity which can later make it difficult for investigators to conduct investigations. This will be proven by the use of a special method in handling audio forensics in which there are four stages, namely Acquisition, Enhancement, Decoding, and Voice Recognition. Audio forensics analysis that was carried out between voice recordings modified using Whatsapp Mod voice notes and original voice recordings showed results that were not identical. This proves that the voice modifier using the Whatsapp Mod voice note is considered an effective anti-forensic tool.
Hyundai Ioniq Ev Car Acquisition Analysis to Support Vehicle Forensics Activities Jidan Dj. Tamu, Zulhair; Prayudi, Yudi
Jurnal Indonesia Sosial Teknologi Vol. 6 No. 1 (2025): Jurnal Indonesia Sosial Teknologi
Publisher : Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59141/jist.v6i1.1724

Abstract

Electric cars are motorized vehicles that use an electric motor as the main driver, which is run by a rechargeable battery. Electric cars have several advantages compared to conventional motorized vehicles that use internal combustion engines, such as lower emissions, cheaper operating costs and better performance. This research aims to identify vehicle forensics acquisition techniques in electric cars using the OBD port, by studying vehicle data usage activities. The acquisition focuses on the Hyundai Ioniq EV electric car, using the OBD port method in data retrieval_, and focusing on logical acquisition. This evidence may include location history, and connected devices, including sudden braking events, gear shifts, wheel speeds, and vehicle acceleration. The results of this research show that the OBD port can be a source of information in vehicle forensics, data collection. There were 20 digital pieces of evidence found, such as ECU data, telematics data, sudden braking system, wheel speed and vehicle acceleration
Metode Deteksi Tepi Block JPEG Terkompresi untuk Analisis Manipulasi Splicing pada Citra Digital Efendi, Muhamad Masjun; Sugiantoro, Bambang; Prayudi, Yudi
Prosiding SEMNAS INOTEK (Seminar Nasional Inovasi Teknologi) Vol. 2 No. 1 (2018): PROSIDING SEMNAS INOTEK Ke-II Tahun 2018
Publisher : Universitas Nusantara PGRI Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29407/inotek.v2i1.449

Abstract

Citra digital semakin mudah untuk dimanipulasi dan diedit. Sering kali sebelum citra tersebut dipublikasi dilakukan proses manipulasi. Salah satu bentuk manipulasi citra adalah splicing. Manipulasi ini dilakukan dengan menduplikasi bagian tertentu dari satu citra atau lebih dan meletakkannya pada bagian tertentu di citra target (copy-move pada citra yang berbeda). Tujuan dari manipulasi splicing ini adalah untuk menambah objek dalam citra, contohnya meletakkan suatu objek pada citra target yang seolah-olah objek tersebut berada disana. Pada penelitian ini manipulasi citra jenis ini dideteksi menggunakan metode deteksi tepi block JPEG terkompresi. Metode ini mampu mendeteksi objek citra yang dimanipulasi dengan baik dan akurat.
Co-Authors - Bambang Sugiantoro, Bambang Sugiantoro - MTI UII Yogyakarta, Zaenudin - UIN Sunan Kalijaga Yogyakarta, Bambang Sugiantoro Abdul Muis Abdul Rohman Supriyono Abdul Rohman Supriyono Achmad Syauqi Adhitya Wishnu Wardhana Adi Fajaryanto Adristi, Fikri Irfan Agung Firmansyah, Rico Agus Wijayanto Agus Wijayanto, Agus Ahmad Luthfi Ahmad Luthfi Ahmad Luthfi Ahmad Luthfie Ahmad Muhariya Ahmad Ridha Kelrey Ahmad Rois Syujak Ahmad Subki - STMIK Mataram Ahmad, Muhammad Sabri Akhmad Muzakka Al Jum'ah, Muhammad Na'im Aloysius Wisnubroto Andrian Sah Ardy Wicaksono Arif Surya Putra Arrochman, Ibnu Fajar Astria Adhi Wijaya azis catur laksono Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro - Bambang Sugiantoro CITRA ARFANUDIN Danar Cahyo Prakoso Dedy Frianto Dhomas Hatta Fudholi Dimas Pamilih Epin Andrian Dinda Shafira Gita Islami Dirgahayu, Raden Teduh Dirman Dirman Dita Rahayu Berliana Dodi Prakoso Wibowo Dwi Kurnia Wibowo Efendi, Muhamad Masjun Erika Ramadhani Erika Ramadhani Ermadi Satriya Wijaya Fajaryanto, Adi Fauzan Natsir Fetyata Yudha Fietyata Yudha Firdaus, Jasmine Erina Fitriyanti S Fudholi, Dhomas Hatta Giffary, Farhan Wildan Helmi Rachman Ibnu Fajar Arrochman Idham Halik Ilman Pradhana Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Isriade Putra Ivany Hikmatunnisa' Iwan Aprizal Jidan Dj. Tamu, Zulhair Kharisma Mahesa Koes Wiyatmoko Kun Saidi Kusuma, Permadi Lilik Widyawati Madi, Permadi Kusuma Mahmud, Rifqi Mardlatillah, Hanifah Merisa Kurniasari Fadilla Moch Bagoes Pakarti Moh Fadly Panende Muh. Ditra Pamungkas Muhamad Maulana Muhammad Khairul Faridi Muhammad Naufal Bahreisy Muhammad Nur Adhar Muhammad Zulfadhilah Muzammilatul Wachidah Nafila, Feryan Lutfie NANNY, NANNY Nora Lizarti Nukman Nukman Nurhayati Jiatmiko Nurmi Hidayasari Nuryasin, Ilyas Pahrul Irfan Pomalingo, Suwito Prakoso, Danar Cahyo Putry Wahyu Setyaningsih R, Zulihsan Rachman, Helmi Raharjo, Toto Rahmat Inggi Ramadhan, Arya Danuarta Ramadhani, Erika Ramansyah Ramansyah Ridho Rahmadi Rio Pradana Aji Ririn Anggraini Rosi Rahmadi Syahputra Rosidin Al Caruban Ruuhwan Ruuhwan Setiawan, Mukhammad Andri Sisdarmanto Adinandra, Sisdarmanto Siti Kartika Munawarah Subki, Ahmad Sudinugraha, Tri Supriyono, Abdul Rohman Syarif Hidayat Teduh Dirgahayu Tino Feri Efendi Triawan Adi Cahyanto Verry Noval Kristanto Virjayanti Lazinu Wachidah, Muzammilatul Wafi, Muhammad Syafiq Wisnu Pranoto Wisnu Pranoto Wisnu Sanjaya Yasir Muin