The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
1 2 3 4 5 Next Last Page
cover
DETEKSI SERANGAN MAN IN THE MIDDLE (MITM) PADA PROTOKOL JARINGAN IEC 61850 SU…
Wijaya, Muhammad Syahrul

International Electrotechnical Commission (IEC) 61850 is a communications standard designed specifically for electrical substation automation, facilitating interoperability among Intelligent Electr…

Edition
-
ISBN/ISSN
-
Collation
xv, 112 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1702842025
Availability1
Add to basket
View DetailCite
cover
DETEKSI MULTI-CLASS CLASSIFICATION TERHADAP SITUS JUDI ONLINE MENGGUNAKAN MET…
Hamas, M. Rafie Al

The rapid development of technology and internet access has fostered the widespread activity of online gambling, becoming a global phenomenon. This research aims to classify multi-class detection o…

Edition
-
ISBN/ISSN
-
Collation
xvi, 97 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1769182025
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN MAN IN THE MIDDLE (MITM) PADA PROTOKOL JARINGAN IEC 61850 SU…
Pradika, Fajar

A Man-in-the-Middle (MITM) attack is a security threat in network communication that allows an attacker to intercept and modify data transmitted between two devices. This attack can disrupt SCADA-b…

Edition
-
ISBN/ISSN
-
Collation
xiv, 86 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1768742025
Availability1
Add to basket
View DetailCite
cover
DETEKSI ANOMALI PADA LALU LINTAS JARINGAN VICTIM REVERSE TCP DENGAN METODE GR…
Meidy, Viona Aulia

Deteksi anomali pada jaringan merupakan aspek penting dalam keamanan siber. Penelitian ini bertujuan untuk mengevaluasi kinerja model Gradient Boosting dalam mendeteksi anomali pada lalu lintas rev…

Edition
-
ISBN/ISSN
-
Collation
xiii, 96 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1769552025
Availability1
Add to basket
View DetailCite
cover
DETEKSI TROJAN METASPLOIT REVERSE TCP PADA NETWORK TRAFFIC DENGAN METODE K-NE…
Sintia, Nabila

Android is one of the most widely used operating systems. Android devices store various personal and sensitive information, which poses significant security risks. One of the major threats is the m…

Edition
-
ISBN/ISSN
-
Collation
xiv, 103 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1764042025
Availability1
Add to basket
View DetailCite
cover
DETEKSI MALWARE TROJAN PADA LALU LINTAS JARINGAN REVERSE TCP DENGAN ALGORITMA…
Febriana, Ririn

Malware, short for malicious software, is a type of harmful software designed to damage, steal data from, or disrupt computer systems and networks. One of the most common types of malware is the Tr…

Edition
-
ISBN/ISSN
-
Collation
ix, 114 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1764032025
Availability1
Add to basket
View DetailCite
cover
ANALISIS HUBUNGAN JUMLAH PENUMPANG DAN BUS SEKOLAH DI KOTA JAKARTA PADA TAHUN…
Sinaga, Aurell Octaviona

This study aims to identify patterns in the relationship between the number of school buses and the number of school passengers in Jakarta during the 2017–2019 period using an unsupervised learni…

Edition
-
ISBN/ISSN
-
Collation
xiii, 85 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1754412025
Availability1
Add to basket
View DetailCite
cover
PENGGOLONGAN KONDISI TANAH PADA HASIL MONITORING SMART FARMING MENGGUNAKAN AL…
Damayanti, Ayu

This research aims to develop a model capable of predicting soil condition classification based on datasets obtained from smart farming monitoring devices using the Support Vector Machine (SVM) alg…

Edition
-
ISBN/ISSN
-
Collation
xv, 94 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1754842025
Availability1
Add to basket
View DetailCite
cover
PENGEMBANGAN MODEL REINFORCEMENT LEARNING DENGAN ALGORITMA DEEP Q NETWORK (DQ…
Firjatullah, Farrel

In digital era right now, with the rapid advancement of time, system and network security is very important in the digital communication environment. Machine learning techniques are currently one o…

Edition
-
ISBN/ISSN
-
Collation
xvii, 190 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1753932025
Availability1
Add to basket
View DetailCite
cover
ANALISIS EFEKTIVITAS MULTILAYER PERCEPTRON (MLP) DALAM MENDETEKSI SERANGAN DI…
Rizqullah, Muhammad Rafi

The Internet of Things (IoT) has brought various conveniences to everyday life, particularly in smart home applications. However, this increased connectivity also heightens the risk of cyber attack…

Edition
-
ISBN/ISSN
-
Collation
xv, 87 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1705632025
Availability1
Add to basket
View DetailCite
cover
SISTEM DETEKSI SERANGAN DISTRIBUTED DENIAL OF SERVICE (DDOS) PADA PERANGKAT S…
Ovilia, Hepra

The Internet of Things (IoT) has facilitated the automation of household device management through the implementation of smart home concepts. However, the increasing number of connected devices in …

Edition
-
ISBN/ISSN
-
Collation
xv, 85 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1760912025
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DDOS PADA SISTEM SMARTHOME DENGAN METODE DEEP LEARNING
Fatih, Aldi Hoirul

The advancement of the Internet of Things (IoT) enables physical devices such as cameras, home doors, televisions, lights, and other household appliances to connect to the internet, forming an inte…

Edition
-
ISBN/ISSN
-
Collation
xvi, 88 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1760552025
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DISTRIBUTED DENIAL OF SERVICE (DDOS) PADA PERANGKAT SMARTHOM…
Makiyah, Makiyah

The Internet of Things (IoT) has brought convenience to everyday life, particularly through the implementation of smarthome devices. However, the connectivity of these devices also increases their …

Edition
-
ISBN/ISSN
-
Collation
xvi, 90 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1760562025
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DISTRIBUTED DENIAL OF SERVICE (DDOS) PADA SISTEM SMARTHOME M…
Tyas, Diah Ayuning

The Internet of Things (IoT) offers numerous benefits but also increases security risks, one of which is Distributed Denial of Service (DDoS) attacks. These attacks can cripple Smarthome systems by…

Edition
-
ISBN/ISSN
-
Collation
xv, 91 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1705622025
Availability1
Add to basket
View DetailCite
cover
DETEKSI KEPADATAN KENDARAAN DENGAN PERBANDINGAN ANALISA DATA MEDIA SOSIAL DAN…
Sari, Tiara Mutia

This study aims to compare data from two different sources, namely social media data and data from the Electronic Traffic Law Enforcement (ETLE) system, using the K-Nearest Neighbor method, in term…

Edition
-
ISBN/ISSN
-
Collation
iv, 115 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1644202025
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DENIAL OF SERVICE (DOS) PADA JARINGAN SMARTHOME IPV6 MENGGUN…
Akmal, Munawirul

Denial of Service attacks are a type of attack that can cripple a network system by flooding the target with a large number of request packets, such as ICMPv6 Flood "Echo Request". This attack is h…

Edition
-
ISBN/ISSN
-
Collation
xiii, 89 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1759882025
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI MALICIOUS URL PADA FILE BERBASIS HOST-BASED FEATURE EXTRACTION ME…
Putra, Muhammad Andiko

The advancement of technology had led to an increasing variety of attacks or threats targeting internet users. Attacks such as phishing, malware, spyware, and ransomware were the common types that …

Edition
-
ISBN/ISSN
-
Collation
xiv, 128 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1759112025
Availability1
Add to basket
View DetailCite
cover
CLINICAL NAMED ENTITY RECOGNITION PADA DATA BIOMEDIS MENGGUNAKAN PRE-TRAINED …
Apriadi, Muhammad Azriel

The rapid growth of digital biomedical data has posed significant challenges in managing and extracting information from unstructured medical texts. This study aims to develop and evaluate a Clinic…

Edition
-
ISBN/ISSN
-
Collation
xviii, 143 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1758112025
Availability1
Add to basket
View DetailCite
cover
CLINICAL NAMED ENTITY RECOGNITION MODEL BERBASIS TRANSFORMER UNTUK DATA BIOMEDIS
Putri, Indah Gala

Clinical Named Entity Recognition (CNER) is a critical task in natural language processing (NLP) aimed at extracting medical entities from complex biomedical texts. The main challenges in this task…

Edition
-
ISBN/ISSN
-
Collation
xvii, 155 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1758072025
Availability1
Add to basket
View DetailCite
cover
CLINICAL NAMED ENTITY RECOGNITION PADA DATA BIOMEDIS MENGGUNAKAN MODEL BERT
Qur'aini, Keisyah Sabinatullah

Named Entity Recognition (NER) is one of the key tasks in natural language processing (NLP), especially within the biomedical domain, which is complex and filled with specific terminologies. This r…

Edition
-
ISBN/ISSN
-
Collation
xviii, 166 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1758082025
Availability1
Add to basket
View DetailCite
cover
 ANALISA KINERJA INFRASTRUCTURE AS A SERVICE PADA CLOUD COMPUTING DENGAN PEN…
Azzahra, Mutia Yasmin

Cloud Computing, particularly Infrastructure as a Service (IaaS), offers high flexibility, cost efficiency, and scalability in managing computing resources. However, fluctuating demands and dynamic…

Edition
-
ISBN/ISSN
-
Collation
xv, 99 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1631532024
Availability1
Add to basket
View DetailCite
cover
ANALISA TRANSAKSI PADA BLOCKCHAIN DENGAN METODE MACHINE LEARNING
Vadithya, Muhammad Dimas

Blockchain offers high security; however, the performance of transactions on this network remains a subject that requires further analysis. Transaction success in blockchain is influenced by variou…

Edition
-
ISBN/ISSN
-
Collation
xix, 108 hlm.: ilus., tab.; 29 cm
Series Title
-
Call Number
T1660552024
Availability1
Add to basket
View DetailCite
cover
ANALISA KEAMANAN PROTOKOL HTTPS DALAM PENGIRIMAN DATA SUPPLY CHAIN MANAGEMENT…
Rohman, Muhammad Fathur

Network security is very important in the increasingly modern era like today, where almost every human activity today requires this, especially the implementation of Warehouse Management Systems wh…

Edition
-
ISBN/ISSN
-
Collation
xix, 63 hlm.; tab.; 29 cm
Series Title
-
Call Number
T1667472025
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI METODE FUZZY TSUKAMOTO DALAM SISTEM MANAJEMEN STOK PERGUDANGAN B…
Padli, Ilham

Supply chain management is a series of business processes that connect several actors to increase the added value of products and distribute them to consumers. In reality, there is a problem that o…

Edition
-
ISBN/ISSN
-
Collation
xv, 90 hlm.: ilus., tab.; 29 cm
Series Title
-
Call Number
T1667502024
Availability1
Add to basket
View DetailCite
cover
ANALISIS SENTIMEN TERHADAP KEMACETAN LALU LINTAS MENGGUNAKAN YOLOV8 DENGAN AL…
Frandesca, Agil Anjas

This research aims to analyse public sentiment towards traffic congestion in Palembang City using YOLOv8 model and Recurrent Neural Network (RNN) algorithm. The background of this research focuses …

Edition
-
ISBN/ISSN
-
Collation
xiv, 138 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1676582025
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI KLASIFIKASI MULTICLASS SERANGAN SIBER DENGAN ALGORITMA PROXIMAL …
Toyyib, Ahmed Athallah

The Proximal Policy Optimization (PPO) and Advantage Actor-Critic (A2C) methods have proven effective in detecting, evaluating, and performing multi-class classification of cyberattacks. This study…

Edition
-
ISBN/ISSN
-
Collation
xvi, 153 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1753242025
Availability1
Add to basket
View DetailCite
cover
DATA ANALISIS KECELAKAAN KERETA API DI INDONESIA MENGGUNAKAN METODE EXPLORATO…
Endy, Afri Wildanu

This research discusses train accidents in Indonesia from 2007-2022. With the aim of identifying the factors that cause train accidents in Indonesia, revealing which years Indonesia experienced the…

Edition
-
ISBN/ISSN
-
Collation
xiv, 55 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1690372025
Availability1
Add to basket
View DetailCite
cover
ANALISIS PENGGUNAAN MEDIA SOSIAL SEBAGAI SARANA MEMAKSIMALKAN FUNGSI WEBSITE …
Khairunnisa, Cahyani

Penggunaan SIPPN oleh masyarakat masih dirasakan belum maksimal, karena keterbatasan sebagian masyarakat dalam menggunakan teknologi informasi. Namun dengan adanya media sosial diharapkan dapat mem…

Edition
-
ISBN/ISSN
-
Collation
xiv, 60 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1685672025
Availability1
Add to basket
View DetailCite
cover
DETEKSI API PADA VIDEO MENGGUNAKAN METODE BACKGROUND SUBTRACTION DAN SEGMENTA…
Anggraini,Yeni

Fire is one of the natural disasters that cause loss of property. objects and endanger the safety of life. The fire started from a small fire that got bigger, causing the fire to spread. This resea…

Edition
-
ISBN/ISSN
-
Collation
xi, 73 hlm.; ilus., tab.: 28 cm
Series Title
-
Call Number
T399262020
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN MIRAI DENGAN MENGGUNAKAN METODE LONG SHORT-TERM MEMORY (LSTM…
PUTRI, THALIA

Perkembangan jaringan Internet of Things (IoT) telah membawa dampak signifikan pada berbagai sektor, termasuk transportasi dan pelayanan kesehatan. Namun, lonjakan adopsi IoT juga memunculkan tanta…

Edition
-
ISBN/ISSN
-
Collation
xv, 63 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1651572025
Availability1
Add to basket
View DetailCite
1 2 3 4 5 Next Last Page

Search Result

Found 494 from your keywords: Subject : "Sistem komputer"
Query took 0.0289 second(s) to complete
XML ResultJSON Result

Suggestion
image
ASPEK HUKUM ISTISHNA (JUAL-BELI PEMESANAN) DALAM PEMBIAYAAN PERBANKAN SYARIAH
Laksana, Agung
image
PERANCANGAN SISTEM PROTEKSI PETIR EKSTERNAL PADA GEDUNG A SMA NEGERI 1 PALEMBANG
Z.A., Putri Aprilia
image
PERSEPSI MAHASISWA PROGRAM STUDI BIMBINGAN DAN KONSELING TERHADAP PEMBELAJARAN DARING UNIVERSITAS SRIWIJAYA
Saputra, Tri Adi
image
KONSTRUKSI TOPIK-KOMEN DALAM PERCAKAPAN INFORMAL MAHASISWA FKIP UNSRI INDRALAYA
Yolanda, Afri
image
ELECTROANALYSIS OF BIOLOGICALLY IMPORTANT COMPOUNDS
Hart, J.P.
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search