Search Results

Keywords: "Security"

Data Transfer Security in IoT Communication Based on Attribute-Based Cryptography

Authors: Adel Abidullah, Khoshal Rahman Rahmani, Wali Mohammad Wadeed, Musawer Hakimi

View Affiliation Details
Adel Abidullah: Kunduz University
Khoshal Rahman Rahmani: Kunduz University
Wali Mohammad Wadeed: Kunduz University
Musawer Hakimi: Samangan University
Pages: 553-565
Views: 0
Downloads: 0
Implementation of Haar Cascade and K-Nearest Neighbors (KNN) Face Recognition for Optimizing Warehouse Access Control Security

Authors: Dadang Iskandar Mulyana, Muhammad Adri Ramadhan

View Affiliation Details
Dadang Iskandar Mulyana: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Muhammad Adri Ramadhan: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Pages: 974-987
Views: 0
Downloads: 0
User Trust, Security, and Data Privacy Awareness in GoPay Usage Using Protection Motivation Theory (PMT)

Authors: Diva Ayu Gitareswara, Tri Suratno, Dewi Lestari

View Affiliation Details
Diva Ayu Gitareswara: Jambi University
Tri Suratno: Jambi University
Dewi Lestari: Jambi University
Pages: 781-791
Views: 0
Downloads: 0
Optimization of Data Security Protection with Full SSL Inspection on AWS Using FortiGate Virtual Appliance

Authors: Yuma Akbar, Gipari Pradina Abdillah, Dadang Iskandar Mulyana, Sutisna Sutisna

View Affiliation Details
Yuma Akbar: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Gipari Pradina Abdillah: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Dadang Iskandar Mulyana: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Sutisna Sutisna: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Pages: 887-896
Views: 0
Downloads: 0
Implementation of IoT-Based Facial Recognition for Home Security System Using Raspberry Pi and Mobile Application

Authors: Frencis Matheos Sarimole, Ahas Eko Septianto

View Affiliation Details
Frencis Matheos Sarimole: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Ahas Eko Septianto: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Pages: 453-462
Views: 0
Downloads: 0
Optimization of Bandwidth Management and Network Security Using PPPoE Method and Intrusion Detection Prevention System

Authors: Muhammad Arham, Yuma Akbar

View Affiliation Details
Muhammad Arham: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Yuma Akbar: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Pages: 804-810
Views: 0
Downloads: 0
Risk Management Evaluation Based on ISO/IEC 27005 Framework: A Case Study of ABC Company IT Workshop Room

Authors: Muhammad Ferdi Kurniawan, Triana Dewi Salma

View Affiliation Details
Muhammad Ferdi Kurniawan: Universitas LIA
Triana Dewi Salma: Universitas LIA
Views: 0
Downloads: 0
Message Security in Classical Cryptography Using the Vigenere Cipher Method

Authors: Purwanti, Saputra Dwi Nurcahya , Dian Nazelliana

View Affiliation Details
Purwanti: Indraprasta Pgri University
Saputra Dwi Nurcahya : Indraprasta Pgri University
Dian Nazelliana: Indraprasta Pgri University
Pages: 350-357
Views: 0
Downloads: 0
Integrating Zero Trust Architecture with Blockchain Technology to Maintain Data Security in the Cloud

Authors: T. Irfan Fajri, Handry Eldo, Cut Susan Octiva, Dikky Suryadi, Muhammad Lukman Hakim

View Affiliation Details
T. Irfan Fajri: Universitas Islam Kebangsaan Indonesia
Handry Eldo: Universitas Muhammadiyah Mahakarya Aceh
Cut Susan Octiva: Universitas Amir Hamzah
Dikky Suryadi: National Institute of Science and Technology
Muhammad Lukman Hakim: Universitas Muhammadiyah Asahan
Pages: 1126-1132
Views: 0
Downloads: 0
Navigating the Integration of Blockchain Technology in Banking: Opportunities and Challenges

Authors: Irshad Ahmed Hashimzai, Mohammad Zameer Ahmadzai

View Affiliation Details
Irshad Ahmed Hashimzai: Kabul Polytechnic University
Mohammad Zameer Ahmadzai: Kabul Polytechnic University
Pages: 665-679
Views: 0
Downloads: 0
Comparative Study of Processing Student Learning Results Scores using Microsoft Excel with the RDM (Digital Madrasah Report Card) Website

Authors: Ahmad Musyadad Haury, Suprih Widodo, Rizki Hikmawan

View Affiliation Details
Ahmad Musyadad Haury: Indonesia University of Education
Suprih Widodo: Indonesia University of Education
Rizki Hikmawan: Indonesia University of Education
Pages: 301-311
Views: 0
Downloads: 0
Development of a Prototype for a Product Recommendation System Using Blockchain Technology

Authors: Adrian Tri Setiawan, Djarot Hindarto

View Affiliation Details
Adrian Tri Setiawan: Nasional University
Djarot Hindarto: Nasional University
Pages: 484-497
Views: 0
Downloads: 0
Application of Machine Learning in Computer Networks: Techniques, Datasets, and Applications for Performance and Security Optimization

Authors: Memed Saputra, Fegie Yoanti Wattimena, Davy Jonathan

View Affiliation Details
Memed Saputra: Universitas Primagraha
Fegie Yoanti Wattimena: Universitas Ottow Geissler
Davy Jonathan: Raharja University
Pages: 259-270
Views: 0
Downloads: 0
Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks

Authors: Loso Judijanto, Djarot Hindarto, Sentot Imam Wahjono, Djunarto

View Affiliation Details
Loso Judijanto: IPOSS Jakarta
Djarot Hindarto: Nasional University
Sentot Imam Wahjono: Universitas Muhammadiyah Surabaya
Djunarto: Universitas Jayabaya
Pages: 386-396
Views: 0
Downloads: 0
Identifying and Mitigating Web Application Vulnerabilities: A Comparative Study of Countermeasures and Tools

Authors: Sayed Elham Sadat, Mohammed Fahim Naseri, Khosraw Salamzada

View Affiliation Details
Sayed Elham Sadat: Kabul Education University
Mohammed Fahim Naseri: Kabul Education University
Khosraw Salamzada: Kabul Education University
Pages: 1109-1127
Views: 0
Downloads: 0
Development of a Web-Based E-Administration System for the Indralaya Ogan Ilir Police Department Utilizing the System Development Life Cycle (SDLC) Approach

Authors: Devi Udariansyah, Asta Sapriyogi

View Affiliation Details
Devi Udariansyah: Universitas Bina Darma
Asta Sapriyogi: Universitas Bina Darma
Pages: 469-483
Views: 0
Downloads: 0
Performance Analysis of the SiJaspro Application as a Tool for Physical Fitness Testing at Jasdam II Sriwijaya

Authors: Nurul Huda, R. M. Nasrul Halim, Devi Udariansyah, Tri Agung Dianto

View Affiliation Details
Nurul Huda: Universitas Bina Darma
R. M. Nasrul Halim: Universitas Bina Darma
Devi Udariansyah: Universitas Bina Darma
Tri Agung Dianto: Universitas Bina Darma
Pages: 1150-1162
Views: 0
Downloads: 0
Super Encryption Cryptography for Land Certificate Data Security: A Case Study of the Jayapura City Land Agency

Authors: Ray Setiawan Panyuwa, Suharyadi

View Affiliation Details
Ray Setiawan Panyuwa: Satya Wacana Christian University
Suharyadi: Satya Wacana Christian University
Pages: 1211-1221
Views: 0
Downloads: 0
Implementation of Zero-Knowledge Encryption in a Web-Based Password Manager

Authors: R. Krisviarno Darmawan, Ariya Dwika Cahyono

View Affiliation Details
R. Krisviarno Darmawan: Satya Wacana Christian University
Ariya Dwika Cahyono: Satya Wacana Christian University
Pages: 633-644
Views: 0
Downloads: 0
Smart Door Lock System: A Mobile Application Development Based on IoT Technology

Authors: Muhammad A. Hanifullah, Kurniawan D. Irianto

View Affiliation Details
Muhammad A. Hanifullah: Islamic University of Indonesia
Kurniawan D. Irianto: Affiliation not provided
Pages: 842-852
Views: 0
Downloads: 0
Online Digital Invitation (An Implementation with Go-Web)

Authors: Adi Ahmad, M. Arinal Ihsan, Hanis Novansyah, Muharratul Mina Rizky, Bakruddin

View Affiliation Details
Adi Ahmad: STMIK Indonesia Banda Aceh
M. Arinal Ihsan: Politeknik Aceh Selatan
Hanis Novansyah: PT. Trans Dana Profitri
Muharratul Mina Rizky: Politeknik Aceh Selatan
Bakruddin: Sekolah Tinggi Ilmu Kehutanan Pante Kulu
Pages: 52-59
Views: 0
Downloads: 0
Billing Barber Shop (An Implementation of GoodBarber App Builder)

Authors: Upik Sri Sulistyawati, Bahruni, Afrizal, Alfina

View Affiliation Details
Upik Sri Sulistyawati: Institut Teknologi dan Bisnis Muhammadiyah Bali
Bahruni: STMIK Indonesia Banda Aceh
Afrizal: E-Padi Coorporation and Lembaga KITA ,
Alfina: STMIK Indonesia Banda Aceh
Pages: 46-51
Views: 0
Downloads: 0
Optimizing the 2024 Governor Election Quick Count with Extreme Gradient Boosting (XGBoost) to Increase Voting Prediction Accuracy

Authors: I Wayan Gede Suacana, Didik Suhariyanto, Ferdinant Nuru

View Affiliation Details
I Wayan Gede Suacana: Warmadewa University
Didik Suhariyanto: Universitas Bung Karno
Ferdinant Nuru: Sekolah Tinggi Ilmu Ekonomi Bukit Zaitun Sorong
Pages: 91-106
Views: 0
Downloads: 0
Analysis of the Effectiveness of IoT-Based Automatic Street Lighting Control Using Linear Regression Method

Authors: Tino Saputra, Untung Surapati

View Affiliation Details
Tino Saputra: STIKOM Cipta Karya Informatika
Untung Surapati: STIKOM Cipta Karya Informatika
Pages: 690-701
Views: 0
Downloads: 0
Implementation of Digital Signatures in the Integrated Patient Progress Notes System at XYZ Hospital Bandung

Authors: Tasya Saldira Putri Supriadi, Yuda Syahidin, Yuyun Yunengsih

View Affiliation Details
Tasya Saldira Putri Supriadi: Politeknik Piksi Ganesha
Yuda Syahidin: Politeknik Piksi Ganesha
Yuyun Yunengsih: Politeknik Piksi Ganesha
Pages: 836-849
Views: 0
Downloads: 0
1 - 25 of 28 items 1 2 > >>