p-Index From 2019 - 2024
14.72
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi Perfecting a Video Game with Game Metrics Jurnal Informatika Jurnal Sarjana Teknik Informatika CommIT (Communication & Information Technology) Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) BACA: Jurnal Dokumentasi dan Informasi Edu Komputika Journal Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SISFOTENIKA Jurnal Teknik Komputer AMIK BSI Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO Emerging Science Journal Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Query : Jurnal Sistem Informasi CYBERNETICS Krea-TIF: Jurnal Teknik Informatika IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Edumaspul: Jurnal Pendidikan Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Jurnal Informatika dan Rekayasa Elektronik RADIAL : Jurnal Peradaban Sains, Rekayasa dan Teknologi Mobile and Forensics Jurnal Repositor JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Bubungan Tinggi: Jurnal Pengabdian Masyarakat Edunesia : jurnal Ilmiah Pendidikan Reswara: Jurnal Pengabdian Kepada Masyarakat J-SAKTI (Jurnal Sains Komputer dan Informatika) Techno Insand Comtech : Information Science and Computer Technology Journal Jurnal Informatika: Jurnal Pengembangan IT
Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Jurnal Mantik

Virus Detection In Windows 10 Using Nist Method And Smadav Application 13.4: Virus Detection In Windows 10 Using Nist Method And Smadav Application 13.4 Ahmad Fajar Sidiq; Anton Yudhana; Rusydi Umar
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (760.335 KB)

Abstract

This research has a background in virus detection on a computer, because a virus is something that can damage and damage data on a computer, because the impact is very bad for the computer so that many anti-virus viruses develop and continue to be developed each year, the development of the virus first against anti-virus causes the impact of damage that is getting worse, the most severe is data loss, data is very important for a computer, in this study the authors use a method created by the National Institute of Standards and Technology (NIST), with this method will facilitate research carried out, the results of the study will be in the form of detection carried out by the Smadav software version 13.4.
Bruteforce In The Hydra Process And Telnet Service Using The Naïve Bayes Method: Bruteforce In The Hydra Process And Telnet Service Using The Naïve Bayes Method Tarisno Amijoyo; Rusydi Umar; Anton Yudhana
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (759.536 KB)

Abstract

Internet technology is increasingly developing, in accordance with the needs of an increasingly millennial society. The growth of internet technology has been accompanied by an increasing variety of attack techniques aimed at the media. BruteForce is one of the techniques of attack (hacking) against the internet network by hacking passwords from users who are active or inactive at that time. Through a process with a small application such as Hydra accompanied by telnet service, then hacking techniques with BruteForce can be run, to attack an internet network. The Hydra process and the telnet service referred to in the study are those that included a "wordlist" file containing user information and password data. The count to detect, whether entering the network is a BruteForce attack or just normal / normal network traffic, can be done with the Naïve Bayes theorem or the Naïve Bayes method. The purpose of the Naïve Bayes method, is to be able to distinguish and classify, which is attack traffic, which is normal / normal network traffic. The reason for using the Naïve Bayes method is that the formulation in this method is easier to calculate when classifying the type of network traffic. From the results of the classification, it can be used as a reference for a network administrator to be more careful and better understand how to protect and prevent attacks from hackers, especially those who use BruteForce hacking techniques. The hope of this research, can be understood and understood so that it can be very easy for a network administrator to distinguish between the two traffic on the network, whether it is attack traffic and / or normal / normal traffic that is through the display on the Wireshark tool.
Database Forensics in Software as A Service Service using Stored Procedure Rusydi Umar; Imam Riadi; Purwanto Purwanto
Jurnal Mantik Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Recently, the use of web-based applications has increased significantly, especially online services, most of which are used for digital transaction activities that use the internet. However, the increasing use of online services often ignores the privacy and security aspects of an application, web developers making it an attractive target for security concerns. In this article, the proposed countermeasures include two mechanisms, namely: the use of stored procedure parameters, and the use of stored procedure encryption in SQL server. The goal is to prevent the dangers of internet crime attacks using structured query language injection attacks (SQLIA). In addition, an analytical evaluation of prevention and protection should also be carried out. The solution offered is prevention and protection using stored procedures because it can prevent SQLI attacks effectively and efficiently.
Co-Authors Aang Anwarudin Abdu Fadlil Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Abdullah Hanif Abdullah Hanif Achmad Dito Achmad Nugrahantoro Agus Prasetyo Marsaid Ahmad Fajar Sidiq Ahmad Ikrom Ahmadi, Ahwan ahmadi, ahwan Aini, Fadhilah Dhinur Aji Nugroho Alameka, Faza Alameka, Faza Aldi Rifki Andriawan Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Anak Agung Gede Sugianthara Andhy Sulistyo Anton Yudhana Anton Yudhana Anwar Siswanto Ardi Pujiyanta Arfiani Nur Khusna Ari Periyanto Ari Peryanto Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arif Budiman Arif Budiman Arif Wirawan Muhammad Arif Wirawan Muhammad, Arif Wirawan Arizona Firdonsyah Aulyah Zakilah Ifani Az-Zahra, Rifqi Rahmatika Bashor Fauzan Muthohirin Bintang, Rauhulloh Noor Busthomi, Iqbal Deni Murdiani Dewi Astria Faroek Dewi Estri Jayanti Dewi Estri Jayanti Dewi Sahara Dewi Sahara Nasution Dwi Susanto Eko Handoyo Elfaditiya Wardaya Ermin Ermin Fadhilah Dhinur Aini Fadlillah Mukti Ayudewi Fahmi Anwar Faiz Isnan Abdurrachman Faizin Ridho Fajar R. B Putra Fathia Irbati Ammatulloh Fauzan, Fauzan Faza Alameka Faza Alameka Fijaya Dwi Bimasakti Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitrah Juliansyah Fitrah Juliansyah Fitrah Juliansyah Fitrah Fitriyani Tella Frandika Septa Gema Kharismajati Gustafi, Muhammad Fauzan Gustafi, Muhammad Fauzan Hanif, Abdullah Helmiyah, Siti Herman Herman Herman Herman Herman Hermansa Hermansa H Imam Mahfudl Nasrulloh Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Indra Gunawan Iqbal Busthomi Iqbal Busthomi Iqbal Bustomi Izzan Julda D.E Purwadi Putra Jaka Dernata Jefree Fahana Kgs Muhammad Rizky Alditra Utama Kiagus Muhammad Rizky Aditra Utama Kusuma, Ridho Surya Lisna Zahrotun Lukman Nurhakim M Sabiq Dzakwan Mardhiatul Ihsaniah Maya Anggriani Miladiah Miladiah Miladiah, Miladiah Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Aziz Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Irwan Syahib Muhammad Jundullah Muhammad Jundullah Muhammad Noor Fadillah Muhammad Noor Fadillah Muhammad Nur Ardhiansyah Muhammad Nur Faiz Musri Iskandar N Mustafa Mustafa Muzakkir Pangri Nasrulloh, Imam Mahfudl Novita Ranti Muntiari Ockhy Jey Fhiter Wassalam Panggah Widiandana Prasetyo Hari Prabowo prayudi, Andi Purwanto Purwanto Purwono Purwono, Purwono Putra, Fijaya Dwi Bima Sakti Resmi - Aini Rezki Ramdhani Ridho Surya Kusuma Rifqi Rahmatika Az-Zahra Rio Anggara Sabarudin Saputra Sahiruddin Sahiruddin Saleh khalifa saad Saleh Khalifah Saad Sarjimin Sarjimin Siti Helmiyah Siti Helmiyah Sri Rahayu Astari Sri Rahayu Astari Subhan Subhan Sugandi, Andi Sunardi Sunardi Sunardi, Sunardi Tarisno Amijoyo Tri Lestari Tri Lestari Tri Lestari Tuska Abe Wasito Sukarno Winoto, Sakti Yuminah yuminah Yuminah, Yuminah