Search Results
Implementation of Haar Cascade and K-Nearest Neighbors (KNN) Face Recognition for Optimizing Warehouse Access Control Security
Authors: Dadang Iskandar Mulyana, Muhammad Adri Ramadhan
View Affiliation Details
User Trust, Security, and Data Privacy Awareness in GoPay Usage Using Protection Motivation Theory (PMT)
Authors: Diva Ayu Gitareswara, Tri Suratno, Dewi Lestari
View Affiliation Details
Risk Management Evaluation Based on ISO/IEC 27005 Framework: A Case Study of ABC Company IT Workshop Room
Authors: Muhammad Ferdi Kurniawan, Triana Dewi Salma
View Affiliation Details
Optimization of Data Security Protection with Full SSL Inspection on AWS Using FortiGate Virtual Appliance
Authors: Yuma Akbar, Gipari Pradina Abdillah, Dadang Iskandar Mulyana, Sutisna Sutisna
View Affiliation Details
Comparative Study of Processing Student Learning Results Scores using Microsoft Excel with the RDM (Digital Madrasah Report Card) Website
Authors: Ahmad Musyadad Haury, Suprih Widodo, Rizki Hikmawan
View Affiliation Details
Optimization of Bandwidth Management and Network Security Using PPPoE Method and Intrusion Detection Prevention System
Authors: Muhammad Arham, Yuma Akbar
View Affiliation Details
Training Information System at PT. Teknik Media Utama Banda Aceh City
Authors: Chandra Bayu Aji
View Affiliation Details
Message Security in Classical Cryptography Using the Vigenere Cipher Method
Authors: Purwanti, Saputra Dwi Nurcahya , Dian Nazelliana
View Affiliation Details
Identifying and Mitigating Web Application Vulnerabilities: A Comparative Study of Countermeasures and Tools
Authors: Sayed Elham Sadat, Mohammed Fahim Naseri, Khosraw Salamzada
View Affiliation Details
Application of Machine Learning in Computer Networks: Techniques, Datasets, and Applications for Performance and Security Optimization
Authors: Memed Saputra, Fegie Yoanti Wattimena, Davy Jonathan
View Affiliation Details
Implementation of Zero-Knowledge Encryption in a Web-Based Password Manager
Authors: R. Krisviarno Darmawan, Ariya Dwika Cahyono
View Affiliation Details
Performance Analysis of the SiJaspro Application as a Tool for Physical Fitness Testing at Jasdam II Sriwijaya
Authors: Nurul Huda, R. M. Nasrul Halim, Devi Udariansyah, Tri Agung Dianto
View Affiliation Details
CloudPresence: An Innovative Mobile-Based Teacher Attendance Information System with Firebase Integration
Authors: David Maulana Putra Pradana, Afwan Anggara
View Affiliation Details
Implementation of Digital Signatures in the Integrated Patient Progress Notes System at XYZ Hospital Bandung
Authors: Tasya Saldira Putri Supriadi, Yuda Syahidin, Yuyun Yunengsih
View Affiliation Details
Development of a Web-Based E-Administration System for the Indralaya Ogan Ilir Police Department Utilizing the System Development Life Cycle (SDLC) Approach
Authors: Devi Udariansyah, Asta Sapriyogi
View Affiliation Details
Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks
Authors: Loso Judijanto, Djarot Hindarto, Sentot Imam Wahjono, Djunarto
View Affiliation Details
Online Digital Invitation (An Implementation with Go-Web)
Authors: Adi Ahmad, M. Arinal Ihsan, Hanis Novansyah, Muharratul Mina Rizky, Bakruddin