Exploit Reverse HTTPS merupakan sebuah konsep teknik serangan malware yang dilakukan oleh penyerang untuk mengekspos kelemahan dalam lapisan HTTPS pada sistem atau aplikasi untuk mencuri atau menga…
Bitcoin is one of the most popular digital currencies widely used in online transactions. However, Bitcoin transactions are prone to anomalies, which may indicate suspicious activities such as frau…
Smart Home is a form of automation technology designed to facilitate household activities with the help of the Internet of Things (IoT). IoT technology enables objects around us, such as sensors, c…
This research was motivated by conducting underwater exploration, because underwater exploration has a high risk if carried out by humans, with the difficulty of accessing underwater areas, so in t…
Ransomware is a type of malware that encrypts the victim's data and demands a ransom to restore access, with WannaCry being one of the most notorious variants exploiting EternalBlue on the SMB prot…
Advances in technology present challenges in matching individual skills with appropriate job recommendations. This research develops a Natural Language Processing (NLP) based job recommendation sys…
Skin diseases account for 1.79% of the world's disease burden. Indonesia is ranked 3rd of the top ten diseases in the world. Digital processing can enable better feature extraction from images of s…
Fire is one of the disasters that most people worry about, especially indoor fires in office buildings, hospitals, shopping centers or housing, because in addition to possibly causing material loss…
Cyber attacks are a form of threat aimed at stealing, damaging, or altering important data within computer systems or networks. These attacks include hacking, phishing, and malware. Detecting cyber…
In the rapid development of technology, System and Network Security is very important in the ecosystem of digital communication environments. Machine Learning techniques can be used to solve this p…
Cyber attacks have become an increasing threat to the security of modern information systems. To overcome the complexity and diversity of attacks that occur, a sophisticated and reliable detection …
Android menjadi OS paling populer pada perangkat mobile membuatnya menjadi target utama threat actor dalam membuat malware. Beberapa penelitian menunjukkan bahwa deteksi malware pada perangkat mobi…
Watering plants is a tedious thing and is often forgotten by both households and farmers, while plants really need enough water to grow. Seeing these conditions, researchers designed an automation …
K-Means clustering is a tool used to determine the cluster structure of a dataset identified by its strong similarity to other clusters or its strong difference from other clusters. In another pape…
Growth factors such as economic, social, political, and cultural developments have become one of the traffic problems in Palembang City that has caused the occurrence of traffic density. To avoid g…
Traffic congestion is always a primary concern in transportation issues, and it continues to pose challenges in daily activities. To address this problem, a system that can detect vehicle density l…
Cyberattacks are unauthorized attempts to track and disrupt the operation of communication systems and control systems by exploiting the security weaknesses of communication networks. Efforts to pr…
Tujuan penelitian ini adalah Menganalisis jalur terbaik yang didapatkan berdasarkan hasil algoritma CH pada beberapa kondisi jalan di Kota Palembang. Penelitian dilakukan pada bulan Juni 2023 s.d. …
Continuous Deployment (CD) is a method of deploying applications to production servers automatically and continuously. This research aims to explore the application of the Continuous Deployment met…
Bitcoin, introduced in 2008 by Satoshi Nakamoto, is the first digital currency to use blockchain for secure transactions. Despite its popularity, challenges in detecting illegal or suspicious trans…
Kehilangan data merupakan isu umum dalam berbagai kumpulan data dan menjadi salah satu tantangan paling kompleks dalam ilmu komputer. Masalah ini mempersulit proses pengolahan data karena banyaknya…
Apache HTTP Server is one of the most widely used web servers today. Despite its advantages in stability and security, the performance of the Apache HTTP Server is often affected by traffic load an…
With the computing speed possessed by quantum computers, the security of encryption on classical computers is threatened, especially the security of the RSA encryption algorithm, because it is pred…
Maritime transportation plays an important role in international trade, more than 50,000 merchant ships are involved every day and this causes a large opportunity for maritime accidents. Therefore,…
Use of Supply Chain Management (SCM) technology integrated with Smart Contract to increase transparency and data security in the supply chain industry. Several traditional problems in SCM, such as …
As the most widely used mobile operating system, Android is increasingly becoming a prime target for malware attacks. The popularity of this operating system makes it attractive for cyber security …
Pada penerapan AI untuk menentukan kepadatan kendaraan di kota Palembang yang terpantau oleh kamera penulis menggunakan algoritma Convolutional Neural Network. kemudian untuk Mencari rute terbaik d…
Digital Forensics is a part of forensic science that includes inventions and Data investigation on a digital device that aims to prove scientific computer crimes in order to obtain digital evidence…
The title of this research is the Implementation of the End-To-End Encryption Mechanism on IoT Using the Rivest Cipher 4 (RC4) Method. This study aims to implement RC4 cryptography in the process o…
Supervisory Control and Data Acquisition (SCADA) is widely used in industry as a system that is tasked with supervising, controlling while simultaneously collecting data from sensors connected duri…