Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Avinanta"'
Developing an Agile Cybersecurity Framework With Organizational Culture Approach Using Q Methodology
Publikováno v:
IEEE Access, Vol 12, Pp 108835-108850 (2024)
Cyberattacks continue to pose significant threats and damages across a wide range of sectors. The main problem that causes this lies in the misinterpretation of the implementation of cybersecurity frameworks. They often rely excessively on technology
Externí odkaz:
https://doaj.org/article/7618e858d7cc4fb0b8e03b8aeebeb280
Publikováno v:
Ilkom Jurnal Ilmiah, Vol 10, Iss 2, Pp 190-200 (2018)
The vulnerability of a computer network system is a weakness, lack or hole in the system, which can be exploited by attackers to carry out an attack that may endanger the confidentiality, integrity or availability of a system. The filling process req
Externí odkaz:
https://doaj.org/article/87f83dd29c0c4e90a0460ce3f304aaca
Publikováno v:
Asian Journal of Technology Management, Vol 7, Iss 2 (2014)
In recent business practices, the need of the formal document for business, such as the business license documents, business domicile letters, halal certificates, and other formal documents, is desperately needed and becomes its own problems for busi
Externí odkaz:
https://doaj.org/article/498018cfd02a43d39c9517d5f0e2fda1
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Avinanta Tarigan
Publikováno v:
Jurnal Ilmiah Informatika Komputer. 27:246-257
Surat Keterangan Pendamping Ijazah (SKPI) sangat berharga bagi para lulusan perguruan tinggi yang sedang mencari pekerjaan, oleh karena itu rentan terhadap pemalsuan dan manipulasi. Blockchain merupakan teknologi basis data terdistribusi yang menduku
Publikováno v:
Journal of Computational and Theoretical Nanoscience. 16:5384-5395
Spelling mistakes of words in writing Rejang words are often found so it is difficult to understand. The method used in correcting word errors (spelling checkers) has been carried out by several researchers. In this research, words were improved in R
Publikováno v:
Ilkom Jurnal Ilmiah, Vol 10, Iss 2, Pp 190-200 (2018)
The vulnerability of a computer network system is a weakness, lack or hole in the system, which can be exploited by attackers to carry out an attack that may endanger the confidentiality, integrity or availability of a system. The filling process req
Publikováno v:
Jurnal Ilmiah Informatika Komputer. 23:175-191
To fulfill the prospective student's information need about student admission, Gunadarma University has already many kinds of services which are time limited, such as website, book, registration place, Media Information Center, and Question Answering
Publikováno v:
Journal of Computer Science. 13:590-599
Image retrieval using Support Vector Machine (SVM) classification verydepends on kernel function and parameter. Kernel function used by dot productsubstitution from old dimension feature to new dimension depends on imagedataset condition. In this res
Publikováno v:
Advanced Science Letters. 23:8511-8518