Zobrazeno 1 - 10
of 183
pro vyhledávání: '"Kalamullah Ramli"'
Autor:
Sefiulki Weni Sari, Kalamullah Ramli
Publikováno v:
Jurnal Teknologi Informasi dan Ilmu Komputer, Vol 11, Iss 4 (2024)
Pusat Data dan Teknologi Informasi Komunikasi (Pusdatik) adalah bagian penting dari Instansi XYZ yang bertanggung jawab atas manajemen teknologi informasi dan pengoperasian pusat data. Dalam menghadapi tantangan dari era digital dan konektivitas yang
Externí odkaz:
https://doaj.org/article/fa304de2efba436e8eb7031ba6bde746
Autor:
Kuni Inayah, Kalamullah Ramli
Publikováno v:
Jurnal Teknologi Informasi dan Ilmu Komputer, Vol 11, Iss 4 (2024)
Teknologi dan sistem informasi yang semakin berkembang menjadikan ancaman siber juga semakin meningkat. Pada tahun 2023, Indonesia menduduki peringkat pertama sebagai negara dengan sumber serangan tertinggi. Untuk mengatasi permasalahan tersebut, Int
Externí odkaz:
https://doaj.org/article/347917c3468c4c0bae3715216b33a13a
Autor:
Tony Haryanto, Kalamullah Ramli
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 7, Iss 3, Pp 670-680 (2023)
The COVID-19 pandemic has resulted in increased cross-sector cyber-attacks. Passive and reactive cybersecurity techniques relying solely on technology are insufficient to combat sophisticated attacks, necessitating proactive and collaborative securit
Externí odkaz:
https://doaj.org/article/7170b1a5a1734f488cfadd56db95bdb2
Autor:
Susila Windarta, Suryadi Suryadi, Kalamullah Ramli, Andriani Adi Lestari, Wildan Wildan, Bernardi Pranggono, Rini Wisnu Wardhani
Publikováno v:
IEEE Access, Vol 11, Pp 84074-84090 (2023)
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial data transmission have made information integrity susceptible to va
Externí odkaz:
https://doaj.org/article/9cc92d0ab6e548be822c1fd127fc2e88
Publikováno v:
IEEE Access, Vol 11, Pp 42644-42659 (2023)
Data breaches are becoming an increasingly prevalent and global concern due to their massive impact. One of the primary challenges in investigating data breach incidents is the unavailability of a specific framework that acknowledges the characterist
Externí odkaz:
https://doaj.org/article/c1dd9d73fd004caaaa6e197fd22267aa
Publikováno v:
Jurnal Teknologi Informasi dan Ilmu Komputer, Vol 10, Iss 4 (2023)
Aplikasi berbasis Android banyak dikembangkan dan tersedia secara bebas di berbagai sumber aplikasi karena sistem operasi Android yang bersifat open-source. Namun, tidak semua penyedia aplikasi memberikan informasi detail mengenai aspek keamanan apli
Externí odkaz:
https://doaj.org/article/e402aee39fa444aea700915634cc1f58
Publikováno v:
Journal of Applied Engineering and Technological Science, Vol 4, Iss 2 (2023)
The industry and government have recently acknowledged and used virtual machines (VM) to promote their businesses. During the process of VM, some problems might occur. The issues, such as a heavy load of memory, a large load of CPU, a massive load of
Externí odkaz:
https://doaj.org/article/a98a96a8f27e4a7f88df26f07f7703c1
Publikováno v:
Information, Vol 14, Iss 10, p 539 (2023)
One of the WHO’s strategies to reduce road traffic injuries and fatalities is to enhance vehicle safety. Driving fatigue detection can be used to increase vehicle safety. Our previous study developed an ECG-based driving fatigue detection framework
Externí odkaz:
https://doaj.org/article/bf0bcf80feaa4eb6993aff2d8a4119b8
Autor:
Arini Muhafidzah, Kalamullah Ramli
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 6, Iss 3, Pp 403-411 (2022)
The sturdy and reliable payment system is one of the most important systems in the digitalization era, especially in the pandemic COVID-19 period. As part of Critical Infrastructure Information (CII), a strategy to protect the payment system is neede
Externí odkaz:
https://doaj.org/article/ff98329b68ef4cd2a7c90f35871519d5
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 6, Iss 3, Pp 387-396 (2022)
Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, suc
Externí odkaz:
https://doaj.org/article/ca40d35b355648fcb111d88af2248864