The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
First Page Previous 1 2 3 4 5 Next Last Page
cover
MULTIVARIATE TIME SERIES FORECASTING TANDA VITAL PASIEN UNIT PERAWATAN INTENS…
Julian, Fernando

Time series forecasting (TSF) is the task of predicting future values of a particular time sequence. It used in various fields including forecast vital signs data. Vital signs data that are include…

Edition
-
ISBN/ISSN
-
Collation
viii, 64 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T884582023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI SERANGAN MAN IN THE MIDDLE (MITM) PADA PROTOKOL JARINGAN SCADA(IE…
Prima, Ajie Salahudin

Cyber attacks on SCADA systems are becoming an increasingly worrying threat. Because they have security holes and attackers can weaken the Intrusion Detection System (IDS) security sensors, especia…

Edition
-
ISBN/ISSN
-
Collation
xvi, 48 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T753932022
Availability1
Add to basket
View DetailCite
cover
SELEKSI FITUR UNTUK MENEMUKAN POLA FITUR TERBAIK PADA SISTEM PENDETEKSI SERAN…
Pratama, Ricky Akbar

DDoS attacks are one of the main threats to security issues on the internet today which have quite a severe impact. As for knowing the best DDoS attack detection, this study applies several selecti…

Edition
-
ISBN/ISSN
-
Collation
xii, 108 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T909142023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI DATA SERANGAN UDP FLOOD PADA JARINGAN INTERNET OF THINGS (IOT) ME…
Marlo, Christoper

This study focuses on visualize the UDP Flood Attack Pattern on Internet of Things Network Dataset ( doi.org/10.528 /zenodo.4436127). The purpose of this study is to obtain a visual form of the dat…

Edition
-
ISBN/ISSN
-
Collation
xii, 48 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T862172023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI POLA SERANGAN BRUTE FORCE DENGAN ALGORITMA SUPPORT VECTOR MACHINE
Fathoni, Friliandi

Brute force is one of many attacks that are often used by hackers in carrying out the cyber crimes. For recognizing the attack patterns visualization is carried out, so that in presenting this rese…

Edition
-
ISBN/ISSN
-
Collation
xi, 78 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T898912023
Availability1
Add to basket
View DetailCite
cover
PENERAPAN METODE YOU ONLY LOOK ONCE (YOLOV3) UNTUK MENDETEKSI JUMLAH KENDARAA…
Anti, Anggita Putri

Congestion is a problem that often occurs in big cities caused by the increasing number of vehicles each year without being accompanied by the expansion of highways. There are 3 methods proposed, n…

Edition
-
ISBN/ISSN
-
Collation
xvi, 66 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T916382023
Availability1
Add to basket
View DetailCite
cover
SELEKSI FITUR UNTUK MENEMUKAN POLA FITUR TERBAIK PADA SISTEM PENDETEKSI SERAN…
Virgo, Sandika

DDoS is one of many attacks used by hackes in carrying out cyber crimes. As for knowing attacks detectors, in presenting this research looking for parameters that play a major role ini the DDoS dat…

Edition
-
ISBN/ISSN
-
Collation
xiv, 100 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T855732023
Availability1
Add to basket
View DetailCite
cover
PENERAPAN METODE YOLOv3 UNTUK DETEKSI JUMLAH KENDARAAN BERDASARKAN PANTAUAN C…
Nadhila, Sri

Kemacetan lalu lintas masih menjadi permasalahan yang sering dihadapi masyarakat di kota Palembang hingga saat ini masih kesulitan dalam melakukan mobilitas untuk mendukung aktivitas sehari-hari. D…

Edition
-
ISBN/ISSN
-
Collation
xv, 52 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T916332023
Availability1
Add to basket
View DetailCite
cover
PENGOPTIMALAN LONG SHORT-TERM MEMORY (LSTM) DENGAN AUTOENCODER UNTUK MENDETEK…
Hardrian, Marcho

Botnet is a group of programs that have been infected by malware and connected to the internet network that has been controlled by certain parties. Using Long Short-Term Memory (LSTM) can help dete…

Edition
-
ISBN/ISSN
-
Collation
xv, 79 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T879292023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI SERANGAN UDP FLOOD PADA JARINGAN INTERNET OF THINGS (IOT) MENGGUN…
Alfian, Budiman

The Internet of things (IoT) is a network that can connect any device to the internet. Denial of Service (DoS) attacks on IoT use reasonable service requests to gain excessive processing and networ…

Edition
-
ISBN/ISSN
-
Collation
xii, 41 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T861782023
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI ALGORITMA LSTM PADA SISTEM PENDETEKSI SERANGAN BRUTEFORCE MENGGU…
Agustina, Rianti

Bruteforce attack is a form of attack to be able to enter network services by making various pairs of usernames and passwords illegally. To avoid this attack you can use different character combina…

Edition
-
ISBN/ISSN
-
Collation
xvi, 93 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1141782023
Availability1
Add to basket
View DetailCite
cover
REDUKSI DIMENSI FITUR SERANGAN BRUTEFORCE MENGGUNAKAN METODE AUTOENCODER LSTM…
Utami, Risti Auliah

Bruteforce attack is an attack that uses the trial-error method to obtain user information, especially passwords. To overcome these problems, previous research has applied learning algorithms to cy…

Edition
-
ISBN/ISSN
-
Collation
xviii, 157 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1141512023
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN BRUTE FORCE MENGGUNAKAN METODE BIDIRECTIONAL RECURRENT NEURA…
Rizon, M. Alfat Hayatur

Brute Force Attack is an attack that targets private information such as usernames, passwords, passphrases and other information. Brute force attack sends combinations continuously in the form of d…

Edition
-
ISBN/ISSN
-
Collation
viii, 70 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T855962023
Availability1
Add to basket
View DetailCite
cover
ENHANCED STACKED PADA LONG SHORT TERM MEMORY UNTUK MENINGKATKAN KEMAMPUAN KLA…
Anjarwati, Caturning

Distributed Denial Of Service (DDoS) attacks are a type of cyber attack against websites. DDoS is marked by the amount of fake traffic that floods the server, system or internet network. As a resul…

Edition
-
ISBN/ISSN
-
Collation
xvi, 73 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T865312023
Availability1
Add to basket
View DetailCite
cover
SISTEM SMART TRANSPORTATION UNTUK PENENTUAN JALUR TERBAIK DENGAN PERBANDINGAN…
Mariza, Nanda Putri 

Traffic congestion is currently a major problem in big cities in Indonesia. Therefore, a system for determining the best paths is needed to address traffic congestion issues. This system is part of…

Edition
-
ISBN/ISSN
-
Collation
xviii, 132 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1230382023
Availability1
Add to basket
View DetailCite
cover
PREDIKSI PATH LOSS DENGAN PEMODELAN COST-231 PADA JARINGAN 4G LTE FREKUENSI 1…
Mulisari, Nurulia

Propagation is the existence of a signal sharing area from one place to another and is one of the most important perspectives of cellular wireless network planning. Prediction of path loss or commo…

Edition
-
ISBN/ISSN
-
Collation
xv, 61 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T657062022
Availability1
Add to basket
View DetailCite
cover
PERBANDINGAN USER EXPERIENCE APLIKASI TIKET.COM DAN PEGIPEGI MENGGUNAKAN METO…
Ningsih, Rizki Ade

Advances in information technology make many human activities easier and faster. One form of information technology advancement that exists is the existence of a mobile application that can help us…

Edition
-
ISBN/ISSN
-
Collation
xiii, 50 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T889162023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI PDF MALWARE MENGGUNAKAN CLUSTERING K-MEANS PADA LAYANAN GARUDA KE…
Resti, Indah Cahya

K-Means clustering is a method to grouping data based on the similarity of features and detect the hidden patterns in dataset. The dataset is from GARUDA Repository which contains raw data of PDF f…

Edition
-
ISBN/ISSN
-
Collation
xiii, 51 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T865352023
Availability1
Add to basket
View DetailCite
cover
DETEKSI REMCOS REMOTE ACCESS TROJAN (RAT) PADA PHISHING EMAIL CORONA VIRUS DE…
Fitriani, Tarissa

Remote Access Trojan (RAT) is a special type of remote access software commonly used for malicious purposes, in which the installation is performed without the user's consent, the remote control th…

Edition
-
ISBN/ISSN
-
Collation
xii, 58 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T861572023
Availability1
Add to basket
View DetailCite
cover
EFEK JARINGAN RELAY SEDERHANA TERHADAP JARINGAN BITCOIN
Santoso, Imam

Bitcoin has a low transaction throughput. Shortening the block interval is important to improving output. However, it is still difficult to simply shorten the block interval because the interval is…

Edition
-
ISBN/ISSN
-
Collation
viii, 56 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T870542023
Availability1
Add to basket
View DetailCite
cover
DETEKSI QRS COMPLEX PADA SINYAL FETAL ELECTROCARDIOGRAM MENGGUNAKAN DEEP LEAR…
Ardiansyah, Muhammad

This research aims to develop a detection model by combining Convolutional Neural Networks (CNN) and Recurrent Neural Network (RNN) architectures to detect QRS Complex signal waves in fetal electro…

Edition
-
ISBN/ISSN
-
Collation
xii, 41 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1142082023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN PADA MALWARE SPYWARE MENGGUNAKAN METODE NAIVE BAYES CLAS…
Sartika, Sartika

The amount of Malware is constantly increasing. Most Malware is a modification of previous Malware data. The datasets used from CIC-MalMem-2022 are Benign and Spyware-CWS. This study used the Naïv…

Edition
-
ISBN/ISSN
-
Collation
xiv, 52 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1120812023
Availability1
Add to basket
View DetailCite
cover
PERBANDINGAN METODE ARTIFICIAL NEURAL NETWORK YANG DI OPTIMASI DENGAN GENETIC…
Dwinta, Dinda

The development of technology is very rapid so that many applications have emerged, such as smart transportation applications. Smart transport is considered as an umbrella term that includes route …

Edition
-
ISBN/ISSN
-
Collation
xix, 92 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1230372023
Availability1
Add to basket
View DetailCite
cover
PENERAPAN SMART TRANSPORTATION PADA SMART CITY MENGGUNAKAN METODE HYBRID RAND…
Santika, Della

The increasing use of vehicles in urban areas has resulted in high levels of road congestion. The focus of this research is the application of smart transportation in smart city to find the best ro…

Edition
-
ISBN/ISSN
-
Collation
xvi, 134 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1222542023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI SERANGAN SQL INJECTION MENGGUNAKAN METODE SUPPORT VECTOR MACHINE …
Prasetyo, Rendi

The problem in this research is that the number of attack data is much less than the number of non-attack samples, which results in a high error rate in attack detection. The use of Support Vector …

Edition
-
ISBN/ISSN
-
Collation
xi, 56 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1225662023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI AUTHOR MATCHING PADA DATA BIBLIOGRAFI MENGGUNAKAN METODE RECURREN…
Ramadhan, M Jorgi

In bibliographic data analysis, accurate author matching is crucial for various applications such as citation analysis and research profiling. This research focuses on the classification of author …

Edition
-
ISBN/ISSN
-
Collation
xiv, 53 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1058782023
Availability1
Add to basket
View DetailCite
cover
DETEKSI KEPADATAN LALU LINTAS MENGGUNAKAN RFID (RADIO FREQUENCY IDENTIFICATIO…
Fawwaz, Viola Aqila

The role of technology in vehicle monitoring systems in traffic is still widely used, one of which is the use of RFID (Radio Frequency Identification) technology as a vehicle tracking sensor in tra…

Edition
-
ISBN/ISSN
-
Collation
xiv, 103 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T855512022
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DDOS DENGAN INTRUSION DETECTION SYSTEM MENGGUNAKAN METODE BI…
Sujana, Jepi

DDoS attacks can cause targeted servers to become slow and web server services unavailable, but DDoS attacks are difficult to detect in a network because their traffic patterns are similar to those…

Edition
-
ISBN/ISSN
-
Collation
xv, 99 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T855722022
Availability1
Add to basket
View DetailCite
cover
PENINGKATAN KEAMANAN WEB TERHADAP SERANGAN CROSS SITE SCRIPTING DENGAN METODE…
Exaudi, Friski

Sekarang semakin banyak munculnya website baru, maka tingkat traffic Cybercrime akan semakin meningkat juga. Cybercrime adalah tindak kejahatan yang dilakukan dengan memanfaatkan teknologi komputer…

Edition
-
ISBN/ISSN
-
Collation
viii, 67 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T846842022
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI MODEL DETEKSI SERANGAN SMURF DDOS PADA SOFTWARE DEFINED NETWORK …
Mais, Al

This study focuses on the dataset from DDoS Attack SDN Dataset (2020) where the Smurf DDoS attack focuses on the ICMP protocol. The purpose of this study is to detect Smurf DDoS attacks on the Soft…

Edition
-
ISBN/ISSN
-
Collation
xii, 67 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T843962022
Availability1
Add to basket
View DetailCite
First Page Previous 1 2 3 4 5 Next Last Page

Search Result

Found 176 from your keywords: Subject : "Jurusan Sistem Komputer,"
You currently on page 3 of 6 page(s)
Query took 0.01969 second(s) to complete
XML ResultJSON Result

Suggestion
image
CONTEMPORARY BRITISH INDUSTRIAL RELATIONS
Kessler, Sid - Bayliss, Fred
image
Penelitian dan Penilaian PENDIDIKAN
Ibrahim, Ibrahim - Sudjana, Nana.
image
PENGARUH BOOK TAX DIFFERENCE, INTANGIBLE ASSET DAN TUNNELING INCENTIVE TERHADAP KEPUTUSAN TRANSFER PRICING DENGAN KEPEMILIKAN ASING SEBAGAI VARIABEL MODERASI (STUDI EMPIRIS PADA PERUSAHAAN MANUFAKTUR YANG TERDAFTAR DI BURSA EFEK INDONESIA TAHUN 2016-2020).
Sari, Lili Nurindah
image
HUBUNGAN ANTARA KECERDASAN EMOSIONAL DENGAN RESlLIlENSI PADA MANTAN PENYALAHGUNAAN NARKOBA DI PUSAT REHABILITASI KOTA PALEMBANG
Aprianti, Hilda
image
PENGARUH DAR (DEBT TO TOTAL ASSETS RATIO), ROA (RETURN ON ASSETS), UKURAN PERUSAHAAN (FIRM SIZE), PERTUMBUHAN PERUSAHAAN TERHADAP MANAJEMEN LABA PADA PERUSAHAAN JASA SEKTOR INFRASTRUKTUR, UTILITAS DAN TRANSPORTASI YANG TERDAFTAR DI BEI PERIODE 2017 – 2020
Vastreine, Negi
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search