Search Results
Data Transfer Security in IoT Communication Based on Attribute-Based Cryptography
Authors: Adel Abidullah, Khoshal Rahman Rahmani, Wali Mohammad Wadeed, Musawer Hakimi
View Affiliation Details
Implementation of Haar Cascade and K-Nearest Neighbors (KNN) Face Recognition for Optimizing Warehouse Access Control Security
Authors: Dadang Iskandar Mulyana, Muhammad Adri Ramadhan
View Affiliation Details
User Trust, Security, and Data Privacy Awareness in GoPay Usage Using Protection Motivation Theory (PMT)
Authors: Diva Ayu Gitareswara, Tri Suratno, Dewi Lestari
View Affiliation Details
Optimization of Data Security Protection with Full SSL Inspection on AWS Using FortiGate Virtual Appliance
Authors: Yuma Akbar, Gipari Pradina Abdillah, Dadang Iskandar Mulyana, Sutisna Sutisna
View Affiliation Details
Implementation of IoT-Based Facial Recognition for Home Security System Using Raspberry Pi and Mobile Application
Authors: Frencis Matheos Sarimole, Ahas Eko Septianto
View Affiliation Details
Optimization of Bandwidth Management and Network Security Using PPPoE Method and Intrusion Detection Prevention System
Authors: Muhammad Arham, Yuma Akbar
View Affiliation Details
Risk Management Evaluation Based on ISO/IEC 27005 Framework: A Case Study of ABC Company IT Workshop Room
Authors: Muhammad Ferdi Kurniawan, Triana Dewi Salma
View Affiliation Details
Message Security in Classical Cryptography Using the Vigenere Cipher Method
Authors: Purwanti, Saputra Dwi Nurcahya , Dian Nazelliana
View Affiliation Details
Integrating Zero Trust Architecture with Blockchain Technology to Maintain Data Security in the Cloud
Authors: T. Irfan Fajri, Handry Eldo, Cut Susan Octiva, Dikky Suryadi, Muhammad Lukman Hakim
View Affiliation Details
Navigating the Integration of Blockchain Technology in Banking: Opportunities and Challenges
Authors: Irshad Ahmed Hashimzai, Mohammad Zameer Ahmadzai
View Affiliation Details
Comparative Study of Processing Student Learning Results Scores using Microsoft Excel with the RDM (Digital Madrasah Report Card) Website
Authors: Ahmad Musyadad Haury, Suprih Widodo, Rizki Hikmawan
View Affiliation Details
Development of a Prototype for a Product Recommendation System Using Blockchain Technology
Authors: Adrian Tri Setiawan, Djarot Hindarto
View Affiliation Details
Application of Machine Learning in Computer Networks: Techniques, Datasets, and Applications for Performance and Security Optimization
Authors: Memed Saputra, Fegie Yoanti Wattimena, Davy Jonathan
View Affiliation Details
Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks
Authors: Loso Judijanto, Djarot Hindarto, Sentot Imam Wahjono, Djunarto
View Affiliation Details
Identifying and Mitigating Web Application Vulnerabilities: A Comparative Study of Countermeasures and Tools
Authors: Sayed Elham Sadat, Mohammed Fahim Naseri, Khosraw Salamzada
View Affiliation Details
Development of a Web-Based E-Administration System for the Indralaya Ogan Ilir Police Department Utilizing the System Development Life Cycle (SDLC) Approach
Authors: Devi Udariansyah, Asta Sapriyogi
View Affiliation Details
Performance Analysis of the SiJaspro Application as a Tool for Physical Fitness Testing at Jasdam II Sriwijaya
Authors: Nurul Huda, R. M. Nasrul Halim, Devi Udariansyah, Tri Agung Dianto
View Affiliation Details
Super Encryption Cryptography for Land Certificate Data Security: A Case Study of the Jayapura City Land Agency
Authors: Ray Setiawan Panyuwa, Suharyadi
View Affiliation Details
Implementation of Zero-Knowledge Encryption in a Web-Based Password Manager
Authors: R. Krisviarno Darmawan, Ariya Dwika Cahyono
View Affiliation Details
Smart Door Lock System: A Mobile Application Development Based on IoT Technology
Authors: Muhammad A. Hanifullah, Kurniawan D. Irianto
View Affiliation Details
Online Digital Invitation (An Implementation with Go-Web)
Authors: Adi Ahmad, M. Arinal Ihsan, Hanis Novansyah, Muharratul Mina Rizky, Bakruddin
View Affiliation Details
Billing Barber Shop (An Implementation of GoodBarber App Builder)
Authors: Upik Sri Sulistyawati, Bahruni, Afrizal, Alfina
View Affiliation Details
Optimizing the 2024 Governor Election Quick Count with Extreme Gradient Boosting (XGBoost) to Increase Voting Prediction Accuracy
Authors: I Wayan Gede Suacana, Didik Suhariyanto, Ferdinant Nuru
View Affiliation Details
Analysis of the Effectiveness of IoT-Based Automatic Street Lighting Control Using Linear Regression Method
Authors: Tino Saputra, Untung Surapati
View Affiliation Details
Implementation of Digital Signatures in the Integrated Patient Progress Notes System at XYZ Hospital Bandung
Authors: Tasya Saldira Putri Supriadi, Yuda Syahidin, Yuyun Yunengsih