Unemployment is one of the crucial problems faced by Indonesia. Moreover, unemployment for Bachelor and Diploma graduates, which has a large number every year. Based on official data published by t…
DDoS attacks are one of the main threats to security issues on the internet today which have quite a severe impact. As for knowing the best DDoS attack detection, this study applies several selecti…
This study focuses on visualize the UDP Flood Attack Pattern on Internet of Things Network Dataset ( doi.org/10.528 /zenodo.4436127). The purpose of this study is to obtain a visual form of the dat…
As one of the State-Owned Enterprises (BUMN), PT Bukit Asam Tbk (PTBA) has an obligation to implement good corporate governance (GCG) and good information technology governance (GIG). Based on inst…
The use of information technology in libraries is aimed at ensuring easy access, streamlining operations, improving the quality of service, and simplifying and speeding up information gathering. UP…
Support Vector Machine is a method in machine learning that can be used to analyze data and sort it into one of two categories. Support Vector Machine has disadvantages in determining the optimal p…
Stemming and POS-Tagging is part of the pre-processing of raw text data in the natural language processing field which aims to produce more structured data and as an initial step that greatly affec…
Brute force is one of many attacks that are often used by hackers in carrying out the cyber crimes. For recognizing the attack patterns visualization is carried out, so that in presenting this rese…
Dandy Abizar Pamungkas 09040581822028 Abstrak Fokus dari penelitian ini adalah router yang banyak digunakan untuk membuat koneksi jaringan wireless dan sudah ada protokol yang memiliki sifat khusus…
Knowledge is an organization's strategic asset so it requires knowledge management in managing it so that knowledge can be of value to the organization. However, the application of knowledge manage…
Congestion is a problem that often occurs in big cities caused by the increasing number of vehicles each year without being accompanied by the expansion of highways. There are 3 methods proposed, n…
DDoS is one of many attacks used by hackes in carrying out cyber crimes. As for knowing attacks detectors, in presenting this research looking for parameters that play a major role ini the DDoS dat…
As a metropolitan area, the city of Palembang has no escape from the phenomenon of urban poverty. Seberang Ulu 1 Sub-district is included as an area that have high poverty rate in Palembang. Theref…
Kemacetan lalu lintas masih menjadi permasalahan yang sering dihadapi masyarakat di kota Palembang hingga saat ini masih kesulitan dalam melakukan mobilitas untuk mendukung aktivitas sehari-hari. D…
Botnet is a group of programs that have been infected by malware and connected to the internet network that has been controlled by certain parties. Using Long Short-Term Memory (LSTM) can help dete…
Physical fitness is the body's ability to carry out physical activities without causing excessive fatigue, knowing a level of body fitness is useful for determining the right solution to overcome p…
The Internet of things (IoT) is a network that can connect any device to the internet. Denial of Service (DoS) attacks on IoT use reasonable service requests to gain excessive processing and networ…
Document retrieval merupakan sebuah sistem pencarian dokumen yang bertujuan untuk mengembalikan dokumen yang relevan dengan kueri pengguna. Komponen document retrieval memiliki fungsi yang sama den…
Bruteforce attack is a form of attack to be able to enter network services by making various pairs of usernames and passwords illegally. To avoid this attack you can use different character combina…
Bruteforce attack is an attack that uses the trial-error method to obtain user information, especially passwords. To overcome these problems, previous research has applied learning algorithms to cy…
Brute Force Attack is an attack that targets private information such as usernames, passwords, passphrases and other information. Brute force attack sends combinations continuously in the form of d…
Distributed Denial Of Service (DDoS) attacks are a type of cyber attack against websites. DDoS is marked by the amount of fake traffic that floods the server, system or internet network. As a resul…
Traffic congestion is currently a major problem in big cities in Indonesia. Therefore, a system for determining the best paths is needed to address traffic congestion issues. This system is part of…
The research objective is to analyze the effect of knowledge management and talent management on employee performance through employee development. The research sample is 150 employees who work at …
Propagation is the existence of a signal sharing area from one place to another and is one of the most important perspectives of cellular wireless network planning. Prediction of path loss or commo…
Universitas Sriwijaya merupakan salah satu perguruan tinggi yang menggunakan e-learning dalam proses pembelajaran selama pandemi. Fitur-fitur yang dimiliki dalam e-learning menerapkan praktik Knowl…
Advances in information technology make many human activities easier and faster. One form of information technology advancement that exists is the existence of a mobile application that can help us…
K-Means clustering is a method to grouping data based on the similarity of features and detect the hidden patterns in dataset. The dataset is from GARUDA Repository which contains raw data of PDF f…
Remote Access Trojan (RAT) is a special type of remote access software commonly used for malicious purposes, in which the installation is performed without the user's consent, the remote control th…
Computer networks have an important role in carrying out various kinds of work activities. VLANs can limit users who can access data, thereby reducing the possibility of abuse of access rights. Vir…