Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Fauzi Adi, Rafrastara"'
Autor:
Ines Aulia Latifah, Fauzi Adi Rafrastara, Jevan Bintoro, Wildanil Ghozi, Waleed Mahgoub Osman
Publikováno v:
Jurnal Sisfokom, Vol 13, Iss 3, Pp 403-409 (2024)
Malware, or malicious software, continues to evolve alongside increasing cyberattacks targeting individual devices and critical infrastructure. Traditional detection methods, such as signature-based detection, are often ineffective against new or pol
Externí odkaz:
https://doaj.org/article/a62bbeebf7a242c084d7939df2d9bc23
Publikováno v:
Jurnal Sisfokom, Vol 13, Iss 3, Pp 396-402 (2024)
The increasing prevalence of malware poses significant risks, including data loss and unauthorized access. These threats manifest in various forms, such as viruses, Trojans, worms, and ransomware. Each continually evolves to exploit system vulnerabil
Externí odkaz:
https://doaj.org/article/b0ed4c49fa4446bea8e40ba5088acc7b
Autor:
Wendy Sarasjati, Supriadi Rustad, null Purwanto, Heru Agus Santoso, null Muljono, Abdul Syukur, Fauzi Adi Rafrastara, De Rosal Ignatius Moses Setiadi
Publikováno v:
2022 International Seminar on Application for Technology of Information and Communication (iSemantic).
Research in High Performance Computing (HPC) is becoming more and more popular recently. Cluster computing is one type of HPC that can be easily deployed. In the meantime, data mining is topic that have been developing where its enormous advantages a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4a9c6f238e0dadd47f51418406566d3a
Autor:
Cinantya Paramita, Catur Supriyanto, Yani Parti Astuti, Lukman Afi Syariffudin, Fauzi Adi Rafrastara
—Cluster computing was introduced to replace the superiority of super computers. Cluster computing is able to overcome the problems that cannot be effectively dealt with supercomputers. In this paper, we are going to evaluate the performance of clu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::106f6390e51230d935c6706a22a2e969
Publikováno v:
Kinetik, Vol 4, Iss 3, Pp 241-248 (2019)
The progress of the development of digital technology today, many people communicate by sending and receiving messages. However, along with extensive technological developments, many crimes were committed. In avoiding these crimes, data security need
—Cluster computing is a part High Performance Computing (HPC) which become more and more popular and necessary in the recent years. Meanwhile, data mining is a technology that have been growing where its huge benefits are inevitable. Once cluster c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::008752b7494374dc0dd81ce3af361781
Autor:
Fauzi Adi Rafrastara, Heru Agus Santoso, De Rosal Ignatius Moses Setiadi, Eko Hari Rachmawanto, Christy Atika Sari, Edi Sugiarto
Publikováno v:
2019 International Conference on Information and Communications Technology (ICOIACT).
This study proposes an encryption method in Arnold chaotic map based imagery. The uniqueness of the proposed method is to divide the image into smaller blocks, then each image is encrypted with the same chaotic map formula. Visually the results of im