
Kalamullah RamliUniversity of Indonesia | UI · Faculty of Engineering
Kalamullah Ramli
Prof. Dr.-Ing.
About
188
Publications
51,726
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,047
Citations
Introduction
Kalamullah Ramli currently works at the Department of Computer and Electrical Engineering, Faculty of Engineering, University of Indonesia. Kalamullah does research in Computer and Telecommunications Engineering, Embedded System, Network and Data Security, Software Engineering and Human-computer Interaction., ICT Public Policy and Engineering Management
Additional affiliations
April 2019 - present
Indonesia Data Center Provider Association
Position
- Consultant
June 2016 - April 2019
Indonesia Data Center Provider Association (IDPRO)
Position
- CEO
Education
April 2000 - September 2003
April 1995 - September 1997
August 1987 - December 1992
Publications
Publications (188)
One of the WHO’s strategies to reduce road traffic injuries and fatalities is to enhance vehicle safety. Driving fatigue detection can be used to increase vehicle safety. Our previous study developed an ECG-based driving fatigue detection framework with AdaBoost, producing a high cross-validated accuracy of 98.82% and a testing accuracy of 81.82%;...
p>Aplikasi berbasis Android banyak dikembangkan dan tersedia secara bebas di berbagai sumber aplikasi karena sistem operasi Android yang bersifat open-source. Namun, tidak semua penyedia aplikasi memberikan informasi detail mengenai aspek keamanan aplikasi, sehingga pengguna mengalami kesulitan untuk menilai dan memahami risiko keamanan privasi yan...
Light Fidelity (LiFi) technology has gained attention and is growing rapidly today. Utilizing light as a propagation medium allows LiFi to promise a wider bandwidth than existing Wireless Fidelity (WiFi) technology and enables the implementation of cellular technology to improve bandwidth utilization. In addition, LiFi is very attractive because it...
Centralized storage is a data storage model in which data is stored and managed in a single physical location or centralized system. In this model, all data and information are stored on servers or data centers managed by one entity or organization. This model also has disadvantages such as risk of system failure against distributed denial of servi...
SIMWAS is an information system at the XYZ Ministry that is used to manage supervisory activities and follow up on supervisory results. SIMWAS is an important asset that contains all internal control business processes, but in practice, SIMWAS information security risks have not been managed properly. To overcome these problems, information securit...
The industry and government have recently acknowledged and used virtual machines (VM) to promote their businesses. During the process of VM, some problems might occur. The issues, such as a heavy load of memory, a large load of CPU, a massive load of a disk, a high load of network and time-defined migration, might interrupt the business processes....
The COVID-19 pandemic has resulted in increased cross-sector cyber-attacks. Passive and reactive cybersecurity techniques relying solely on technology are insufficient to combat sophisticated attacks, necessitating proactive and collaborative security measures to minimize attacks. Cybersecurity Information Sharing (CIS) enhances security via proact...
div>
Early risk prediction and appropriate treatment are believed to be able to delay the occurrence of hypertension and attendant conditions. Many hypertension prediction models have been developed across the world, but they cannot be generalized directly to all populations, including for Indonesian population. This study aimed to develop and val...
More than 1.3 million people are killed in traffic accidents annually. Road traffic accidents are mostly caused by human error. Therefore, an accurate driving fatigue detection system is required for drivers. Most driving fatigue detection studies concentrated on improving feature engineering and classification methods. We propose a novel driving f...
Diabetes monitoring systems are crucial for avoiding potentially significant medical expenses. At this time, the only commercially viable monitoring methods that exist are invasive ones. Since patients are uncomfortable while blood samples are being taken, these techniques have significant disadvantages. The drawbacks of invasive treatments might b...
Data breaches are becoming an increasingly prevalent and global concern due to their massive impact. One of the primary challenges in investigating data breach incidents is the unavailability of a specific framework that acknowledges the characteristics of a data breach incident and provides clear steps on how the investigative framework can compre...
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial data transmission have made information integrity susceptible to various assaults. Therefore, hash functions are required to ensure data integrity in IoT networks. IoT...
This paper presents a novel discrete-time (DT) chaotic map-based random-number gen-
erator (RNG), namely the Siponi map, which is a modification of the Logistic map. The Logistic map is usually applied to cryptosystems, mainly for the purposes of generating random numbers. In addition to being easy to implement, it has a better security level than...
Visible Light Communication (VLC) continues
to attract the attention of academia and industry due to its
potential as a complementary technology for wireless
communication. Appropriate modulation technique becomes
an important factor in supporting the realization of the VLC
system. By far the most potential is the orthogonal frequency
divisio...
Information security is an important concern for governments and industry due to the increase in cyber attacks during Covid-19. The government is obliged to maintain information security in implementing an Electronic-Based Government System following Presidential Regulation of the Republic of Indonesia Number 95 of 2018. To overcome this problem, t...
This paper describes the development of situational awareness models and applications to assess cybersecurity risks based on Annex ISO 27001:2013. The risk assessment method used is the direct testing method, namely audit, exercise and penetration testing. The risk assessment of this study is classified into three levels, namely high, medium and lo...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. Cryptographic hash functions are cryptographic primitives that provide data integrity services. However, due to...
The increase of cyber attacks in the Critical Information Infrastructure (CII) requires every organization to collaborate through Cybersecurity Information Sharing (CIS). To support the implementation of the CIS, governance support is needed in the form of a framework that can be used as a reference. This study focuses on developing a CIS framework...
The sturdy and reliable payment system is one of the most important systems in the digitalization era, especially in the pandemic COVID-19 period. As part of Critical Infrastructure Information (CII), a strategy to protect the payment system is needed to reduce risks that may arise. But the author's best knowledge, in Indonesia, no reference descri...
Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, such as website or system deface or phishing. Deep Learning could be able to predict various data well....
Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation, malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and verify data using different media particularly in host-to-host connections. This research focuses on data e...
The development of an information system used in a government institution becomes very important if the system is part of storing data that is a state asset. SIMS contains data on frequency spectrum users who already have permits and contribute to Non-Tax State Revenue (PNBP). SIMS consists of public service applications and non-public service appl...
The Indonesian spectrum usage fees—the so-called Biaya Hak Pengguna Frekuensi Izin Pita Frekuensi Radio (BHP IPFR)—are currently calculated using a formula determined by the three following main parameters: the frequency band, the country’s economic parameter, and the nationwide population. As spectrum usage fees are proportional to the width of th...
The use of the Intrusion Detection Systems (IDS) still has unresolved problems, namely the lack of accuracy in attack detection, resulting in false-positive problems and many false alarms. Machine learning is one way that is often utilized to overcome challenges that arise during the implementation of IDS.. We present a system that uses a machine l...
Presently, active queue management (AQM) is one of the important considerations in communication networks. The challenge is to make it simple and robust in bursty traffic and uncertain network conditions. This paper proposes a new AQM scheme, an adaptive ratio proportional integral (ARPI), for adaptively controlling network congestion in dynamic ne...
As a company that is operating in the telecommunication sector, XYZ must ensure that they have adequate capabilities to protect their company’s and customers’ sensitive data. Although various information security systems and processes are already in place, human resources still are the weakest link in cyber security. The new normal of Working From...
The advent of 5G has created an expectation for the provision of a much better user experience (UX) for utilising video streaming services. However, apart from quality, there are many other factors believed to influence users’ experiences of video streaming services in the era of 5G. The question then arises: what will determine the UX of streaming...
The National Archives Information System (SIKN) and the National Archives Information Network (JIKN) are the government national priority programs that aimed at providing web-based electronic archive treasury information facilities to the public. However, threat and disruption of critical information asset on electronic archives can cause interrupt...
The meat's expiration time has a vital role for the consumer. Usually, the consumer will process the meat before the expiration time passes. However, most of the sellers in the traditional market did not put the expiration time. Even if it exists like in the modern market, the expiration time is determined by the Standard Operational and Procedure...
Snort is a well-known, signature-based network intrusion detection system (NIDS). The Snort sensor must be placed within the same physical network, and the defense centers in the typical NIDS architecture offer limited network coverage, especially for remote networks with a restricted bandwidth and network policy. Additionally, the growing number o...
Monitoring systems for the early detection of diabetes are essential to avoid potential expensive medical costs. Currently, only invasive monitoring methods are commercially available. These methods have significant disadvantages as patients experience discomfort while obtaining blood samples. A non-invasive method of blood glucose level (BGL) moni...
Cyberdisasters require an organization’s disaster team to be prepared. Disaster events are difficult to predict, but the impact of this risk on an organization is large. However, organizations sometimes struggle in being prepared for disaster situations. Here, awareness of disaster situations when analysing priority disasters (e.g., earthquakes and...
In recent years, there is growing interest in automatic power quality disturbance (PQD) classification using deep learning algorithms. In this paper, the average of instantaneous frequency and the average of spectrum entropy were used as time-frequency based feature extraction due to its discriminatory nature. Bidirectional Long Short-Term Memory (...
A long-range wide area network (LoRaWAN) has a weakness in terms of key management: its root key is static, meaning that it never changes. Since all cryptographic keys are derived from the root key, such a weakness endangers LoRaWAN security. This paper proposes a novel secure root key updating scheme for LoRaWAN that involves periodically changing...
Spectrum valuation is necessary to help regulators set up new technology regulations to overcome specific conditions, such as area-particular treatment in industrial estates, to support vertical industries with wider spectrum bands and various frequencies. This paper delivers the results of a study on spectrum band valuation at various frequencies...
This paper proposes a novel Long-range Wide Area Network (LoRaWAN) session key updating scheme to enhance the security of LoRaWAN with cost-effective communication that provides a unique key for each communication session. The scheme consists of three sequential stages, initialization, keying material preparation, and key updating, on the basis of...
An intrusion detection system (IDS) is required to protect data from security threats that infiltrate unwanted information via a regular channel, both during storage and transmission. This detection system must differentiate between normal data and abnormal or hacker-generated data. Additionally, the intrusion detection system (IDS) must be precise...
Over recent years, the incidence of data breaches and cyberattacks has increased significantly. This has highlighted the need for sectoral organizations to share information about such events so that lessons can be learned to mitigate the prevalence and severity of cyber incidents against other organizations. Sectoral organizations embody a governa...
Snort is one of the well-known signature-based network intrusion detection systems (NIDS). The Snort sensor placement must be in the same physical network. The defense center in the typical NIDS architecture cause limited network coverage to be monitored, especially for remote networks with restricted bandwidth and network policy. Moreover, the inc...
The literature discussing the concepts, technologies, and ICT-based urban innovation approaches of smart cities has been growing, along with initiatives from cities all over the world that are competing to improve their services and become smart and sustainable. However, current studies that provide a comprehensive understanding and reveal smart an...
The growth of internet-enabled devices has increased interest in cybersecurity. In 2014, Project SHINE (SHodan INtelligence Extraction) published a report of large-scale security assessments for devices connected to the Internet. However, the number of IP addresses harvested from Indonesia in 2014 is very small. There were 7.182 IP address from Ind...
In the current era, the ownership of strategic information and the ability to effectively manage it has become a significant advantage. Reflecting on the experience of attacks on strategic communications in Indonesia, including the tapping of the former President Susilo Bambang Yudhoyono’s conversation through the cellular network and President Jok...
This research aims to test the ability to capture malicious e-mail objects, spam e-mails, phishing e-mails, or malware e-mails on Proofpoint Email Protection and Fortimail antispam devices to prevent security threats to PT. XYZ. Email service was one of the primary services for an agency or company in providing electronic mail that could be used to...
High-level security with a large keyspace and a short processing time is needed in digital image encryption. Generally, an encryption method that produces a large keyspace is characterized by a relatively slow encryption process. In this paper, we propose a new image encryption method that uses two chaotic pseudosets. A gradual deletion of the inpu...
The electrocardiogram (ECG) is relatively easy to acquire and has been used for reliable biometric authentication. Despite growing interest in ECG authentication, there are still two main problems that need to be tackled, i.e., the accuracy and processing speed. Therefore, this paper proposed a fast and accurate ECG authentication utilizing only tw...
Blood pressure (BP) is an important parameter for the early detection of heart disease because it is associated with symptoms of hypertension or hypotension. A single photoplethysmography (PPG) method for the classification of BP can automatically analyze BP symptoms. Users can immediately know the condition of their BP to ensure early detection. I...
The main purpose of information security is maintaining information assets that are owned by an organization, such as confidentiality, integrity, and availability (known as CIA). In maintaining information assets, a company usually manages information security by making and implementing an Information Security Management System (ISMS) policy. A wid...
Recently, the popularity of big data as a research field has shown continuous and wide-scale growth. This study aims to capture the scientific structure and topic evolution of big data research using bibliometrics and text mining-based analysis methods. Bibliographic data of journal articles regarding big data published between 2009 to 2018 were co...
The photoplethysmography (PPG) method for continuous noninvasive measurements of blood pressure (BP) offers a more comfortable solution than conventional methods. The main challenge in using the PPG method is that its accuracy is greatly influenced by motion artifacts. In addition, the characteristics of PPG vary depending on physiological conditio...
Many algorithms have been developed for automated electrocardiogram (ECG) classification. Due to the non-stationary nature of the ECG signal, it is rather challenging to use traditional handcraft methods, such as time-based analysis of feature extraction and classification, to pave the way for machine learning implementation. This paper proposed a...