p-Index From 2021 - 2026
6.684
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering TEKNIK INFORMATIKA Media Informatika Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Teknik Jurnal Teknologi dan Manajemen Informatika Jurnal Buana Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika AJIE (Asian Journal of Innovation and Entrepreneurship) Register: Jurnal Ilmiah Teknologi Sistem Informasi JOIN (Jurnal Online Informatika) Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SemanTIK : Teknik Informasi JURNAL MEDIA INFORMATIKA BUDIDARMA Network Engineering Research Operation [NERO] Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control IT JOURNAL RESEARCH AND DEVELOPMENT Seminar Nasional Teknologi Informasi Komunikasi dan Industri JRST (Jurnal Riset Sains dan Teknologi) JURNAL ILMIAH INFORMATIKA JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) Indonesian Journal of Applied Informatics Jurnal Ilmiah Sinus EDUMATIC: Jurnal Pendidikan Informatika JISKa (Jurnal Informatika Sunan Kalijaga) Technologia: Jurnal Ilmiah Infotekmesin Dinasti International Journal of Education Management and Social Science Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia) Cyber Security dan Forensik Digital (CSFD) JATI (Jurnal Mahasiswa Teknik Informatika) JIIP (Jurnal Ilmiah Ilmu Pendidikan) JITU : Journal Informatic Technology And Communication Automata Journal of Education Informatic Technology and Science Just TI (Jurnal Sains Terapan Teknologi Informasi) JURNAL PENDIDIKAN, SAINS DAN TEKNOLOGI Jurnal Teknik Informatika (JUTIF) Phasti: Jurnal Teknik Informatika Politeknik Hasnur J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Abdi Masyarakat Indonesia Indonesian Journal of Networking and Security - IJNS SPEED - Sentra Penelitian Engineering dan Edukasi Reformasi Hukum Jurnal Indonesia Sosial Teknologi Prosiding SEMNAS INOTEK (Seminar Nasional Inovasi Teknologi) Jurnal Sains, Nalar, dan Aplikasi Teknologi Informasi
Claim Missing Document
Check
Articles

TAARA Method for Processing on the Network Forensics in the Event of an ARP Spoofing Attack Agus Wijayanto; Imam Riadi; Yudi Prayudi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 2 (2023): April 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i2.4589

Abstract

According to reports in 2021 by Kaspersky, requests for investigations into suspicious network activity, such as ARP Spoofing, which can result in sophisticated attacks, reached up to 22%. Several difficulties with examining network systems have been overcome thanks to network forensic investigations. This study aims to perform a network forensic analysis of ARP spoofing attacks using Wireshark forensic tools and Network Miner with a sniffer design process to capture traffic on the router side. In order to gather reliable evidence, this study employs the TAARA method as a network forensic investigation process. Based on the research conducted, it can be demonstrated that an attack took place from eight PCAP files. The information that was gathered, such as the IP address and MAC address of the attacker, the IP address and MAC address of the target, and the date and time of the attack are examples of evidence information that was gathered. This study also shows that network forensic operations can use the Wireshark forensic tool to obtain more detailed data.
Forensic Analysis of Faces on Low-Quality Images using Detection and Recognition Methods Verry Noval Kristanto; Imam Riadi; Yudi Prayudi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 2 (2023): April 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i2.4630

Abstract

Facial recognition is an essential aspect of conducting criminal action investigations. Captured images from the camera or the recording video can reveal the perpetrator's identity if their faces are deliberately or accidentally captured. However, many of these digital imagery results display the results of image quality that is not good when seen by the human eye. Hence, the facial recognition process becomes more complex and takes longer. This research aims to analyze face recognition on a low-quality image with noise, blur and brightness problem to help digital forensic investigator do an investigation in recognizing faces that the human eye can’t do. The Viola-Jones algorithm method has several processes such as the Haar feature, integral image, adaboost, and cascade classifier for detecting a face in an image. Detected face will be passed to the next process for recognition call Fisher’s Linear Discriminant (FLD), Local Binary Pattern’s (LBP) and Principal Component analysis (PCA). The software's facial recognition feature shows one of the images in the database that the program suspects has the same face as the analyzed face image. In conclusion, from the analysis we determined that LBP approach is the best among the other recognition methods for blur and brightness problem, bet found PCA method is the best for recognize face in noise problem. The software's facial recognition feature shows one of the images in the database that the program suspects has the same face as the analyzed face image. The position of the face object in the image, whether or not there is an additional object that was not previously included in the image in the dataset, as well as the brightness level of an image and the color of the face's skin, all affect the accuracy rates.
Analisis Artefak Digital Aplikasi Dompet Cryptocurrency Tokocrypto pada Android Muhammad Nur Adhar; Yudi Prayudi; Erika Ramadhani
JIIP - Jurnal Ilmiah Ilmu Pendidikan Vol. 6 No. 5 (2023): JIIP (Jurnal Ilmiah Ilmu Pendidikan)
Publisher : STKIP Yapis Dompu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54371/jiip.v6i5.2024

Abstract

Cryptocurrency adalah teknologi sistem kriptografi yang bertujuan untuk mengamankan dan mengatur otoritas dengan menggunakan sistem desentralisasi untuk mengelola pengeluaran unit baru, mencatat transaksi, dan memberikan jaminan keamanan yang tidak dapat diduplikasi atau ditiru. Oleh karena itu, tidak diragukan lagi bahwa penjahat juga telah menggunakan Bitcoin dalam aktivitas ilegal seperti menerima pembayaran dalam kasus pemerasan online, membayar obat-obatan terlarang, insiden ransomware, mendanai terorisme, transaksi di pasar darknet, dan pencucian uang. Kejahatan yang dilakukan dengan menggunakan dompet crypto sebagai wadah berperan dalam tantangan untuk membuktikan dan menganalisis objek digital yang tersimpan di smartphone. Penelitian ini berfokus pada penemuan artefak digital dari perangkat smartphone berdasarkan fakta atau informasi yang diperoleh dari instruksi smartphone. Untuk menemukan bukti digital dari aplikasi dompet cryptocurrency smartphone menggunakan metode DFRWS dan alat oksigen forensik. Berdasarkan hasil penelitian, diperoleh beberapa aktivitas transaksi dompet cryptocurrency tokocrypto. Informasi yang terdapat pada transaksi deposit fiat, penarikan fiat, penarikan crypto, dan penjualan crypto serta beberapa label tidak terdapat pada beberapa transaksi yaitu jenis transaksi, Order Id, Txid, dan alamat wallet.Cryptocurrency adalah teknologi sistem kriptografi yang bertujuan untuk mengamankan dan mengatur otoritas dengan menggunakan sistem desentralisasi untuk mengelola pengeluaran unit baru, mencatat transaksi, dan memberikan jaminan keamanan yang tidak dapat diduplikasi atau ditiru. Oleh karena itu, tidak diragukan lagi bahwa penjahat juga telah menggunakan Bitcoin dalam aktivitas ilegal seperti menerima pembayaran dalam kasus pemerasan online, membayar obat-obatan terlarang, insiden ransomware, mendanai terorisme, transaksi di pasar darknet, dan pencucian uang. Kejahatan yang dilakukan dengan menggunakan dompet crypto sebagai wadah berperan dalam tantangan untuk membuktikan dan menganalisis objek digital yang tersimpan di smartphone. Penelitian ini berfokus pada penemuan artefak digital dari perangkat smartphone berdasarkan fakta atau informasi yang diperoleh dari instruksi smartphone. Untuk menemukan bukti digital dari aplikasi dompet cryptocurrency smartphone menggunakan metode DFRWS dan alat oksigen forensik. Berdasarkan hasil penelitian, diperoleh beberapa aktivitas transaksi dompet cryptocurrency tokocrypto. Informasi yang terdapat pada transaksi deposit fiat, penarikan fiat, penarikan crypto, dan penjualan crypto serta beberapa label tidak terdapat pada beberapa transaksi yaitu jenis transaksi, Order Id, Txid, dan alamat wallet.
Live Forensics untuk mengenali Karakteristik Serangan File Upload Guna Meningkatkan Keamanan pada Web Server: Indonesia Isriade Putra; Yudi Prayudi; Ahmad Luthfi
JIIP - Jurnal Ilmiah Ilmu Pendidikan Vol. 6 No. 6 (2023): JIIP (Jurnal Ilmiah Ilmu Pendidikan)
Publisher : STKIP Yapis Dompu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54371/jiip.v6i6.2173

Abstract

Serangan file upload pada web server menyebabkan seseorang dapat melakukan Distributed denial-of-service yang bisa melumpuhkan web server dan web shell dapat membuat penyerang mengeksekusi perintah dari jarak jauh. Penelitian ini menggunakan metoide live forensics, dengan mengumpulkan artefak pada perangkat jaringan, yaitu router, menggunakan winbox karena router ialah perangkat jaringan yang terhubung langsung ke web server ketika terjadi serangan dan komputer server menggunakan wireshark secara visualisasi dan dynamic, sehingga data yang diperoleh dari router dan komputer server dapat menjadi perbandingan. Hasil dari analisis penelitian ini ialah mengetahui karakteristik artefak serangan distributed Denial-of-service yaitu banyaknya paket Synchronization-Acknowledgment yang dikirim ke web server dan web shell dengan ciri artefak unggahan script ekstensi .php. Selanjutnya artefak yang ditemukan pada serangan distributed denial-of-service pada router menggunakan aplikasi winbox kemudian memberikan rekomendasi perbaikan untuk meningkatkan keamanan pada web server.
Penerapan Composite Logic dalam Mengkolaborasikan Framework Terkait Multimedia Forensik Nora Lizarti; Bambang Sugiantoro; Yudi Prayudi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 2 No. 1 (2017): Mei 2017
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (308.175 KB) | DOI: 10.14421/jiska.2017.21-04

Abstract

Like the digital forensics in general, multimedia forensics requires an integrated and flexible framework that can guide the process of proof is procedurally in order to maintain the validity of a digital evidence so that it can be justified in court. But this time, the digital forensics investigation framework that develops more emphasis on computer forensic investigations in general and did not give a specific stage of multimedia forensics. Often in investigating multimedia forensics investigator uses a framework that vary depending on the type of multimedia content to be analyzed, of course it becomes inflexible and inefficient, whereas multimedia content share characteristics that allow it to be integrated into a single unit. This study develops a forensic multimedia framework by implementing the Composite Logic to collaborate on several multimedia framework and related documents. Logic Composite method is a method of modeling the distribution of structured logical modularization techniques with explicit interface in which a model consists of a set of components that are interconnected with the principle of decomposition. In other words, the application of this method will allow researchers to extract and merge several frameworks into a single unit does not eliminate the function and the basic structure of the frameworks.
PENGEMBANGAN BACKEND MEDIA SOSIAL DENGAN MENGGUNAKAN METODE SCRUM Firdaus, Jasmine Erina; Prayudi, Yudi
PENDIDIKAN SAINS DAN TEKNOLOGI Vol 11 No 2 (2024)
Publisher : STKIP PGRI Situbondo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47668/edusaintek.v11i2.1020

Abstract

Anak-anak mudah sekali untuk mengakses teknologi tersebut. Situs web menjadi salah satu teknologi yang sangat mudah untuk diakses oleh semua kalangan. Akan tetapi, kurangnya sebuah aplikasi yang ramah anak membuat para orang tua khawatir ketika anak-anak mengakses sebuah situs web. Oleh karena itu, diperlukannya sebuah aplikasi yang ramah anak. Sehingga terciptalah sebuah aplikasi media sosial yang ramah terhadap anak bernama Samakaki. Proyek ini bertujuan untuk mengembangkan sebuah sistem backend yang nanti akan berguna sebagai logika sistem dan basis data bagi aplikasi media sosial Samakaki. Backend yang dibangun menggunakan bahasa Ruby dan framework Ruby on Rails. Hal ini didasari oleh hal tersebut ramah untuk pemula karena kesederhanaannya pada syntax kode dan lebih aman karena menyediakan fitur keamanan dari sisi klien dan server. Selama pengerjaan proyek, metode yang digunakan adalah scrum. Dikarenakan scrum dinilai dapat menyelesaikan sebuah proyek lebih cepat dan mudah. Berdasarkan pemaparan di atas, pengembangan sistem backend dengan menggunakan metode scrum dipilih untuk pembuatan dan pengolahan basis data serta logika sistem untuk mendukung aplikasi Samakaki.
Osint Framework Untuk Verifikasi Pinjaman Online Pada Media Sosial R, Zulihsan; Prayudi, Yudi; Ramadhani, Erika
JATISI Vol 11 No 2 (2024): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Universitas Multi Data Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v11i2.7555

Abstract

Masyarakat modern saat ini dengan penggunaan media sosial yang begitu masif sebagai media komunikasi dan alat dalam transaksi online. Media Instagram adalah media sosial yang berfungsi sebagai tempat melakukan interaksi melalui media internet. Dengan melakukan transaksi pinjam-meminjam melalui media sosial Instragram biasanya terjadi tindak pidana penipuan (Scam), sehingga peniliti, dengan melihat topik permasalahan yang biasa terjadi dalam tindak pidana penipuan (Scam). Maka dari itu peneliti mengembangkan sebuah Framework investigasi untuk verifikasi akum pinjaman online pada media sosial Instagram menggunakan metode System Development Life Cycle (SDLC) sebagai metode pengumpulan data. Dalam pengembangan Framework verifikasi untuk pengambilan data ini peneliti menggunakan aplikasi GetContact dan Cekrekening.id sebagai alat verifikasi akun dalam pembuktian identitas pelaku serta pengamanan barang bukti menggunakan tools FTK Imager yang berfungsi untuk menjaga integritas keaslian barang bukti tersebut. Framework verifikasi yang dirancang menghasilkan lima tahapan yaitu perencanaan (planning), analisis (analysis), desain (design), implementasi (implementation) dan pemeliharaan (maintenance). Adapun bukti digital yang diperoleh dari proses verifikasi akun tersebut yaitu berupa akun instagram, nama, nomor telepon, nama rekening, nomor rekening dan bank pelaku.
Penggunaan Metode Reverse Engineering Untuk Analisis Aplikasi .apk Dalam Meningkatkan Keamanan Device Android Fitriyanti S; Prayudi, Yudi
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 9 No 1 (2025): JANUARI-MARET 2025
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v9i1.3209

Abstract

The digital world has simplified life through technology, particularly with the significant role of smartphones. Android has become the dominant operating system in Indonesia, but its widespread use also increases potential security vulnerabilities, especially since many users lack understanding of data security. During the period of 2018-2020, around 74.95% of smartphone users in Indonesia used Android, most of whom were regular users who may not be aware of data security issues. This research aims to analyze the vulnerabilities of Android devices and the characteristics of the wedding invitation.apk application using reverse engineering to identify malware. Reverse engineering was used to extract data from the wedding invitation.apk file. The research results showed the presence of Spyware malware in the application, which, after installation, could send sensitive data to an external server without adequate protection and access data through OTP SMS and a Telegram bot. This application has the potential to misuse permissions to access SMS, send sensitive data to external servers without permission, and automatically send SMS. To reduce risks, it is recommended to download applications only from trusted sources, check application permissions before installation, regularly update the operating system and applications, and use security applications. This research emphasizes the importance of better security practices in mobile application development to protect users' privacy and data integrity.
Techniques for Video Authenticity Analysis Using the Localization Tampering Method to Support Forensic CCTV Investigations Anggraini, Ririn; Prayudi, Yudi
ILKOM Jurnal Ilmiah Vol 16, No 3 (2024)
Publisher : Prodi Teknik Informatika FIK Universitas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v16i3.2378.318-329

Abstract

Closed Circuit Television (CCTV) is frequently utilized as legal evidence in judical proceedings. However, the authenticity of CCTV footage is often contested, requiring forensic analysis to verify its reliability as digital evidence. This study aimed to assess the authenticity of video footage using the Localization Tampering method. To simulate manipulation, various manipulation techniques, such as zooming, cropping, converting to grayscale, deleting frames, and rotating video sections, were applied. The Localization Tampering method was then used to detect manipulated areas by analyzing individual frames, calculating their histograms, and interpreting the histogram graph result. The findings demonstrated the method's ability to accurately identify the location and duration of manipulated frames. This offered a valuable tool to support forensic investigations of CCTV footage. Furthermore, this study highlights the challenges in detecting manipulation in low-quality videos, which required more sophisticated remediation techniques. Despite these challenges, the Localization Tampering method demonstrated consistent reliability in preserving the integrity of video footage, making it a practical solution for verifying digital evidence in a legal context. Overall, this study provides an effective approach to ensure that manipulated videos can be identified and corrected, contributing to a more robust CCTV forensics process and maintaining the credibility as evidence in a crime case.
Implementasi Steganografi Dengan Menggunakan Metode Masking And Filtering Untuk Menyisipkan Pesan Ke Dalam Spectrogram Audio: Indonesia Kusuma, Permadi; Prayudi, Yudi
Asian Journal of Innovation and Entrepreneurship Volume 09, Issue 01, January 2025
Publisher : UII

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20885/ajie.vol9.iss1.art1

Abstract

When sending a message to a specific party and do not want the message to be known by other parties, it is important to avoid information leakage. However, the problem identified is that there is a lack of knowledge to detect audio Ste-ganography which requires technical methods that can read and view secret messages. One method that can be used in steganography is Masking and Filtering. Masking as a media marker on audio that can insert messages. Filtering gives value to the parts that have been given a mark.  This method is one that is often used because it is simple, fast in the data insertion process, and has a large enough storage capacity. The Masking and Filtering method is able to hide messages by inserting them into the audio Spectrogram as a storage medium. The filter is used to ensure that the hidden message is within the previously analyzed frequency range, thus making humans unable to clearly hear the additional audio that has been inserted which is the hidden message.  After the insertion is complete, the audio file is saved, and tests are performed to ensure that the audio quality is not compromised, and the hidden message remains undetected such as making modifications to the stego file to test the robustness and security of the hidden message. Based on research, steganography is difficult to detect by the naked eye, to retrieve messages that have been hidden, it can be done by displaying an audio Spectrogram that contains a secret message. How to see the hidden message using the Audacity application that can see sound waves. The result is that the message embedded in the audio is not damaged even though compression, cutting, and some of the processes carried out in the audio have been carried out.
Co-Authors - Bambang Sugiantoro, Bambang Sugiantoro - MTI UII Yogyakarta, Zaenudin - UIN Sunan Kalijaga Yogyakarta, Bambang Sugiantoro Abdul Muis Abdul Rohman Supriyono Abdul Rohman Supriyono Achmad Syauqi Adhitya Wishnu Wardhana Adi Fajaryanto Adristi, Fikri Irfan Agung Firmansyah, Rico Agus Wijayanto Agus Wijayanto, Agus Ahmad Luthfi Ahmad Luthfi Ahmad Luthfi Ahmad Luthfie Ahmad Muhariya Ahmad Ridha Kelrey Ahmad Rois Syujak Ahmad Subki - STMIK Mataram Ahmad, Muhammad Sabri Akhmad Muzakka Al Jum'ah, Muhammad Na'im Aloysius Wisnubroto Andrian Sah Ardy Wicaksono Arif Surya Putra Arrochman, Ibnu Fajar Astria Adhi Wijaya azis catur laksono Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro - Bambang Sugiantoro CITRA ARFANUDIN Danar Cahyo Prakoso Dedy Frianto Dhomas Hatta Fudholi Dimas Pamilih Epin Andrian Dinda Shafira Gita Islami Dirgahayu, Raden Teduh Dirman Dirman Dita Rahayu Berliana Dodi Prakoso Wibowo Dwi Kurnia Wibowo Efendi, Muhamad Masjun Erika Ramadhani Erika Ramadhani Ermadi Satriya Wijaya Fajaryanto, Adi Fauzan Natsir Fetyata Yudha Fietyata Yudha Firdaus, Jasmine Erina Fitriyanti S Fudholi, Dhomas Hatta Giffary, Farhan Wildan Helmi Rachman Ibnu Fajar Arrochman Idham Halik Ilman Pradhana Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Isriade Putra Ivany Hikmatunnisa' Iwan Aprizal Jidan Dj. Tamu, Zulhair Kharisma Mahesa Koes Wiyatmoko Kun Saidi Kusuma, Permadi Lilik Widyawati Madi, Permadi Kusuma Mahmud, Rifqi Mardlatillah, Hanifah Merisa Kurniasari Fadilla Moch Bagoes Pakarti Moh Fadly Panende Muh. Ditra Pamungkas Muhamad Maulana Muhammad Khairul Faridi Muhammad Naufal Bahreisy Muhammad Nur Adhar Muhammad Zulfadhilah Muzammilatul Wachidah Nafila, Feryan Lutfie NANNY, NANNY Nora Lizarti Nukman Nukman Nurhayati Jiatmiko Nurmi Hidayasari Nuryasin, Ilyas Pahrul Irfan Pomalingo, Suwito Prakoso, Danar Cahyo Putry Wahyu Setyaningsih R, Zulihsan Rachman, Helmi Raharjo, Toto Rahmat Inggi Ramadhan, Arya Danuarta Ramadhani, Erika Ramansyah Ramansyah Ridho Rahmadi Rio Pradana Aji Ririn Anggraini Rosi Rahmadi Syahputra Rosidin Al Caruban Ruuhwan Ruuhwan Setiawan, Mukhammad Andri Sisdarmanto Adinandra, Sisdarmanto Siti Kartika Munawarah Subki, Ahmad Sudinugraha, Tri Supriyono, Abdul Rohman Syarif Hidayat Teduh Dirgahayu Tino Feri Efendi Triawan Adi Cahyanto Verry Noval Kristanto Virjayanti Lazinu Wachidah, Muzammilatul Wafi, Muhammad Syafiq Wisnu Pranoto Wisnu Pranoto Wisnu Sanjaya Yasir Muin