Spyware is a type of malicious software that can collect information about a person or organization without permission. Typically, spyware is installed accidentally through malware or downloaded fr…
Penelitian ini bertujuan untuk mengembangkan model klasifikasi yang akurat untuk mengidentifikasi dan mengkategorikan lalu lintas anonim pada jaringan Tor. Dataset yang digunakan adalah CIC-Darknet…
Perkembangan teknologi internet yang pesat telah menyebabkan meningkatnya aktivitas judi online yang berpotensi mengancam keamanan data dan ketertiban digital. Penelitian ini bertujuan untuk mendet…
This study examines the implementation and analysis of Dynamic Traffic Management on Software Defined Network (SDN) networks with performance assessment through Quality of Service (QoS) parameters …
The development of the Internet of Things (IoT) has brought convenience to human life through the smart home concept, which enables various devices to be interconnected and controlled automatically…
The development of smart home technology enables users to control and monitor household devices automatically through the Internet of Things (IoT). However, this high connectivity also increases th…
Penelitian ini bertujuan membangun model klasifikasi kondisi lalu lintas menggunakan data dari sosial media (Instagram dan Facebook) serta data ETLE dengan arsitektur Long Short-Term Memory (LSTM).…
This study aims to implement the You Only Look Once (YOLOv8) method for detecting acne in acne vulgaris images. Automatic detection of acne types is essential to support rapid, accurate, and effici…
The rapid growth of Internet of Things (IoT) devices in smart home environments increases convenience but also introduces various network security threats, such as Distributed Denial of Service (DD…
This study developed the YOLOv8 model to detect five object classes, with training results showing an accuracy of 95%, an f-1 score of 89%, and mAP@0.5 of 93.1%. In the testing phase, the model ach…
Retinal image based eye disease classification is an important approach to support automated diagnosis in the medical field. This study aims to classify four types of eye diseases normal, cataract,…
The increasing use of Android devices has also led to the rise of security threats, one of which is the Reverse TCP attack technique that enables unauthorized remote access to victim devices. This …
The advancement of network technology drives the need for configuration automation in server infrastructure, especially within complex cluster server environments. This study aims to analyze and co…
Android malware threats using reverse TCP techniques are increasing and require effective detection methods. This study develops a detection systemusing the Naïve Bayes algorithm implemented on a …
The Disaster Recovery Center (DRC) system ensures the availability of information services during incidents, but it remains vulnerable to cyber attacks such as DoS, MiTM, Brute Force, and SQL Injec…
Retina diseases are a major cause of vision problems that can lead to a loss of sight or even blindness if not detected early. Other eye conditions, like cataracts and glaucoma, can also severely i…
A comparison was conducted between social media data and traffic vehicle count data calculated by CCTV ETLE of Sumsel Regional Police Traffic Directorate. Both were processed and classified using t…
This study aims to detect and classify Distributed Denial of Service (DDoS), Denial of Service (DoS), and Man in The Middle (MITM) attacks on smart home devices using the Naïve Bayes method. The r…
The Indonesian Sign Language System (SIBI) is widely used as a communication standard within the deaf community. However, communication barriers still exist between deaf individuals and the general…
Communication is essential in life but poses a significant barrier between the hearing-impaired community and the general public due to a lack of understanding of Sign Language. This research aims …
Indonesian Sign Language (Bisindo) is the primary language used by the Deaf community to communicate. However, the limited understanding of Bisindo among the general public often creates communicat…
Penelitian ini bertujuan untuk mengimplementasikan sistem perintah gerak berbasis gestur jari tangan pada prototipe robot pengantar obat. Sistem ini memanfaatkan metode Weightless Neural Network (W…
The rapid advancement of Android technology makes this operating system vulnerable to malware attacks, one of which is the Reverse TCP Trojan, capable of establishing a back connection from the vic…
The rapid development of the open-source Android operating system has made it vulnerable to various cyberattacks, including malware that utilizes the reverse TCP technique. This attack allows an at…
The rapid growth of online gambling in Indonesia poses significant challenges insocial, economic, and network security aspects. This study aims to visualize networktraffic patterns of online gambli…
Pattern recognition is an essential aspect of artificial intelligence with various applications, including face, voice, and character recognition. In the healthcare field, this technology can suppo…
Air transportation plays an essential role in Indonesia, the world’s largest archipelagic country, in supporting connectivity and national economic growth. This study aims to predict the number o…
This study aims to detect access to online gambling sites encrypted with TLS/SSL using machine learning-based network traffic fingerprint analysis, without accessing content to maintain privacy. Th…