p-Index From 2019 - 2024
16.895
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering Dinamik Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Transmisi: Jurnal Ilmiah Teknik Elektro JURNAL SISTEM INFORMASI BISNIS JTEV (Jurnal Teknik Elektro dan Vokasional Jurnal Sistem Komputer Perfecting a Video Game with Game Metrics Bulletin of Electrical Engineering and Informatics Jurnal Informatika Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Bulletin of Electrical Engineering and Informatics Jurnal Ilmiah Kursor Jurnal Algoritma Jurnal Teknologi Telematika : Jurnal Informatika dan Teknologi Informasi Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika International Journal of Advances in Intelligent Informatics Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) Komunikator ICON-CSE Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika JURNAL NASIONAL TEKNIK ELEKTRO KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Bulletin of Electrical Engineering and Informatics Journal of Electrical Technology UMY Format : Jurnal Imiah Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) International Journal of Artificial Intelligence Research Journal of Information Technology and Computer Science (JOINTECS) JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi JIKO (Jurnal Informatika dan Komputer) Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control CogITo Smart Journal IT JOURNAL RESEARCH AND DEVELOPMENT Insect (Informatics and Security): Jurnal Teknik Informatika JOURNAL OF APPLIED INFORMATICS AND COMPUTING JURNAL REKAYASA TEKNOLOGI INFORMASI JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Matrik : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer JSiI (Jurnal Sistem Informasi) CYBERNETICS Krea-TIF: Jurnal Teknik Informatika J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Jurnal Teknik Elektro dan Komputer TRIAC RESISTOR (Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer) Jurnal Ilmiah Mandala Education (JIME) JSI (Jurnal sistem Informasi) Universitas Suryadarma Systemic: Information System and Informatics Journal jurnal teknik informatika dan sistem informasi Jurnal Mantik JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro RADIAL : Jurnal Peradaban Sains, Rekayasa dan Teknologi Mobile and Forensics Jurnal Informatika dan Rekayasa Perangkat Lunak Journal of Robotics and Control (JRC) Jurnal Repositor Respati Indonesian Journal of Electrical Engineering and Computer Science Journal of Innovation Information Technology and Application (JINITA) Reswara: Jurnal Pengabdian Kepada Masyarakat Jurnal Computer Science and Information Technology (CoSciTech) J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Algoritma Techno Jurnal Pengabdian Pada Masyarakat SmartComp Jurnal Informatika: Jurnal Pengembangan IT
Claim Missing Document
Check
Articles

Found 8 Documents
Search
Journal : Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)

Analisis Recovery Bukti Digital Skype berbasis Smartphone Android Menggunakan Framework NIST Anton Yudhana; Abdul Fadlil; Muhammad Rizki Setyawan
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 4 (2020): Agustus 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1291.546 KB) | DOI: 10.29207/resti.v4i4.2093

Abstract

Cybercrime is an activity utilizing electronic devices and network technology as tools or media to commit crimes. One of them uses the Skype application that is installed on the smartphone. In finding evidence from a cybercrime case, a forensic activity known as digital forensic must be carried out. This study aims to recover digital evidence that has been erased using the NIST framework and forensic tools such as Oxygen and Belkasoft. The results of digital evidence recovery from smartphone Samsung J2 in the removal scenario via the application manager, the Oxygen tool cannot recover deleted data and the percentage of success using Belkasoft is 26%. While the results of data recovery with the manual removal method the percentage of success using Oxygen was 63% and Belkasoft was 44%. Digital evidence recovery results from smartphones Andromax A on the erase scenario through the application manager, Oxygen and Belkasoft tools cannot recover deleted data. While manual removal of Oxygen by 61% and Belkasoft cannot restore data. It can be concluded the results of data recovery from both smartphones that are used according to the erasure method through the application manager, Belkasoft has better performance than Oxygen, and data recovery according to the method of erasing manually, Oxygen has better performance than Belkasoft.
Analisis Perbandingan Nilai Kualitas Citra pada Metode Deteksi Tepi Wicaksono Yuli Sulistyo; Imam Riadi; Anton Yudhana
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 2 (2020): April 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (919.771 KB) | DOI: 10.29207/resti.v4i2.1827

Abstract

Identification of object boundaries in a digital image is developing rapidly in line with advances in computer technology for image processing. Edge detection becomes important because humans in recognizing the object of an image will pay attention to the edges contained in the image. Edge detection of an image is done because the edge of the object in the image contains very important information, the information obtained can be either size or shape. The edge detection method used in this study is Sobel operator, Prewitt operator, Laplace operator, Laplacian of Gaussian (LoG) operator and Kirsch operator which are compared and analyzed in the five methods. The results of the comparison show that the clear margins are the Sobel, Prewitt and Kirsch operators, with PSNR calculations that produce values ​​above 30 dB. Laplace and LoG operators only have an average PSNR value below 30 dB. Other quality comparisons use the histogram value and the contrast value with the highest value results in the Laplace and LoG operators with an average histogram value of 110 and a contrast value of 24. The lowest histogram and contrast value are owned by the Sobel and Prewitt operators.
Implementasi Algoritma Playfair Cipher dan Least Significant Bit pada Citra Digital Hermansa; Rusydi Umar; Anton Yudhana
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 3 (2020): Juni 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (425.519 KB) | DOI: 10.29207/resti.v4i3.1877

Abstract

Message security is very important now. Because security is part of the privacy of someone who wants to protect messages from those who do not have the right to read or receive them. The method used for securing information messages with message encryption and decryption techniques is the Playfair Cipher algorithm combined with the Least Significant Bit (LSB) method. In this study it was found that the Playfair Cipher algorithm is quite safe in implementing cryptographic encryption or ciphertext because the playfair cipher has a level of appearance of letters that is so difficult to predict so that the ciphertext becomes a randomized collection of data. For the Least Significant Bit (LSB) steganography method in the insertion of a secret or embedded message it is difficult to guess in plain view the changes that occur between before and after the image is inserted are not too significant. Also see the value of the Peak-Signal-to-Noise ratio or PSNR can still be considered good quality due to> 30 decibels (dB). So the final result of the combination of the Playfair Cipher algorithm with the Least Significant Bit (LSB) method is quite good in securing messages.
Analisis Perbandingan Tools Forensic pada Aplikasi Twitter Menggunakan Metode Digital Forensics Research Workshop Ikhsan Zuhriyanto; Anton Yudhana; Imam Riadi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 5 (2020): Oktober 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1126.66 KB) | DOI: 10.29207/resti.v4i5.2152

Abstract

Current crime is increasing, one of which is the crime of using social media, although no crime does not leave digital evidence. Twitter application is a social media that is widely used by its users. Acts of crime such as fraud, insults, hate speech, and other crimes lately use many social media applications, especially Twitter. This research was conducted to find forensic evidence on the social media Twitter application that is accessed using a smartphone application using the Digital Forensics Research Workshop (DFRWS) method. These digital forensic stages include identification, preservation, collection, examination, analysis, and presentation in finding digital evidence of crime using the MOBILedit Forensic Express software and Belkasoft Evidence Center. Digital evidence sought on smartphones can be found using case scenarios and 16 variables that have been created so that digital proof in the form of smartphone specifications, Twitter accounts, application versions, conversations in the way of messages and status. This study's results indicate that MOBILedit Forensic Express digital forensic software is better with an accuracy rate of 85.75% while Belkasoft Evidence Center is 43.75%.
Implementasi Anti Forensik pada Harddisk Menggunakan Metode DoD 5220.22 M dan British HMG IS5 E Muh Fadli Hasa; Anton Yudhana; Abdul Fadlil
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 4 (2020): Agustus 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (593.743 KB) | DOI: 10.29207/resti.v4i4.2165

Abstract

The process of securing data is related to anti-forensic science, one of the anti-forensic techniques that can be used to safeguard data security, namely by deleting data on storage media. This study examines the implementation of data deletion using the DoD 5220.22 M and British HMG IS5 E methods, then compares these methods. The comparison of the two methods includes performance tests, forensic tests, and data recovery tests. The results of the performance test show that the two methods are strongly influenced by the anti-forensic tools used and do not provide a significant difference when applied using one of the tools. The results of the implementation of data deletion using both methods on the hard disk drive are declared safe to delete data, as evidenced by the extraction results in the forensic test using the Autopsy tool found files on the partition :F with the number of 252 files and on the partition :I with the number of 1 file and the extraction results from the test Forensics using the Recover My File tool managed to find files with the number of 102 files on different partitions, but all the files found in the forensic test process cannot be accessed. The results of the recovery test show that the safest method in the process of deleting data is the British HMG IS5 E method using the Active @ Kill Disk tool, as evidenced by all the results of the recovery process using three tools that do not find any files. Meanwhile, the application of the deletion method that is generally carried out by users, namely the shift + delete method, is declared unsafe, as evidenced by the results of the recovery tests conducted showing that the deleted files can be recovered 100% and can be reaccessed using recovery tools.
Implementation of Naïve Bayes for Fish Freshness Identification Based on Image Processing Sabarudin Saputra; Anton Yudhana; Rusydi Umar
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (746.63 KB) | DOI: 10.29207/resti.v6i3.4062

Abstract

Consumption of fish as a food requirement for the fulfillment of community nutrition is increasing. This was followed by an increase in the amount of fish caught that were sold at fish markets. Market managers must be concerned about the dispersion of huge amounts of fish in the market in order to determine the freshness of the fish before it reaches the hands of consumers. So far, market managers have relied on traditional ways to determine the freshness of fish in circulation. The issue is that traditional solutions, such as the use expert assessment, demand a human physique that quickly experiences fatigue. Technological developments can be a solution to these problems, such as utilizing image processing techniques classification method. Image processing with the use of color features is an effective method to determine the freshness of fish. The classification method used in this research is the Naive Bayes method. This study aims to identify the freshness of fish based on digital images and determine the performance level of the method. The identification process uses the RGB color value feature of fisheye images. The stages of fish freshness identification include cropping, segmentation, RGB value extraction, training, and testing. The classification data are 210 RGB value of extraction images which are divided into 147 data for training and 63 data for testing. The research data were divided into fresh class, started to rot class, and rotted class. The research shows that the Naive Bayes algorithm can be used in the process of identifying the freshness level of fish based on fisheye images with a test accuracy rate of 79.37%.
Integration of AHP and TOPSIS Methods for Small and Medium Industries Development Decision Making Anton Yudhana; Rusdi Umar; Aldi Bastiatul Fawait Fawait
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 5 (2022): Oktober 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (898.876 KB) | DOI: 10.29207/resti.v6i5.4223

Abstract

Financial problems are one of the reasons why small and medium-sized industries (SMIs) in West Kutai have not developed optimally. Government assistance programs are one of the solutions. This program must be appropriate, so a decision-making tool is needed to help choose the right SMIs to be assisted later. The weight of the criteria was determined using the Analytical Hierarchy Process (AHP) technique, and the priority of the SMIs as the preferred proposal for the recipients of development assistance was determined using the Technique for Other Reference by Similarly to Ideal Solution (TOPSIS) approach. Labor, investment, production capacity, production value, and raw materials were used to determine the priorities of SMIs beneficiaries. Furthermore, TOPSIS prioritizes the development of alternative small and medium-sized industries with types of handicraft commodities. Integration of AHP and TOPSIS methods has been successfully used in the IKM Development Priority Determination Application, with 83.3% precision and 96.4% accuracy achieved by using a confusion matrix so that the IKM ranking can be known. The results of the study found that integration of the two methods was successfully used for Small and Medium Industries Development Decision Making.
Comparative Analysis of Forensic Software on Android-based MiChat using ACPO and DFRWS Framework Imam Riadi; Anton Yudhana; Galih Pramuja Inngam Fanani
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 2 (2023): April 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i2.4547

Abstract

Instant Messaging (IM) is a popular and widely used communication application. MiChat is a multi-platform instant chat service with several features that can attract various segments of the population to use it as a tool for committing cybercrimes. A forensic framework and several forensic tools are needed to carry out physical evidence investigation procedures. This study focuses on analyzing and comparing the forensic tools used during the research, based on defined digital evidence parameters and applying a specific mobile forensic framework. The results show that Final Mobile Forensic has the highest ability to obtain digital evidence and can recover deleted data, while Oxygen Forensic Detective has advantages in terms of audio, images, and video but cannot recover data. The best framework is DFRWS, which has the most complete stages so that it can support the investigation process. The best digital evidence is text chat and contacts, which can be used to support valid legal claims.
Co-Authors Aang Anwarudin Abd. Rasyid Syamsuri Abdul Djalil Djayali Abdul Fadil Abdul Fadil Abdul Fadil Abdul Fadlil Abdul Fadlil Abdullah Hanif Ade Firli Ansyori Adi Permadi Agus Jaka Sri Hartanta Ahmad Azhar Kadim Ahmad Fajar Sidiq Ahmad Ikrom Ahmad Ikrom Ahmad Syahril Mohd Nawi ahmadi, ahwan Ahmadi, Ahwan Akhwandi, Dasef Alameka, Faza Alameka, Faza Aldi Bastiatul Fawait Fawait Alfian Ma’arif Alin Khaliduzzaman Alwas Muis Andhy Sulistyo Andiko Putro Suryotomo Andri Pranolo Anggara Ibnu Sidharta Anggi Rizky Windra Putri Anshori, Ikhwan Anton Satria Prabuwono Anwar Siswanto Ari Peryanto Ari Peryanto Arief Setyo Nugroho Asno Azzawagama Firdaus Asno Azzawagama Firdaus Asra Akrima Aznar Abdillah, Muhamad Azrul Mahfurdz Balza Achmad Belly Apriansyah Bintang, Rauhulloh Noor budi putra Choirul Fajri Darso, Muhammad Daryono Daryono Dasef Akhwandi Deni Murdiani Denny Yoga Pratama Didi Siprian djohar, fahrizal Dwi Susanto Dwi Susanto Dwi Susanto Dzakarasma Tazakka Ma’arij Eka Rahmat B Eko Prianto Eko Prianto Fadlil, Abdul Fadlillah Mukti Ayudewi Fahrizal Djohar Fahrizal Djohar Fathoni, Listya Febri Faza Alameka Faza Alameka Febryansah, M. Iqbal Firdausy, Kartika Fitrah Juliansyah Fitri Anggraini Fitriyanto, Rachmad Frandika Septa Furizal Furizal Furizal Furizal Furizal, Furizal Galih Pramuja Inngam Fanani Habsah Hasan Hartanta, Agus Jaka Sri Herman Herman Herman Herman Herman Hermansa Hermansa H Herwindo Rahadian Hidayat, Lalu Amam Hikmatyar Insani Himawan I Azmi Igo Putra Pratama Iif Alfiatul Mukaromah Ikhsan Sugianto Ikhsan Zuhriyanto Ikhsan Zuhriyanto Ikhsan Zuhriyanto Ikhwan Anshori Ikrom, Ahmad Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Ivan Triyatno Jafri Din Jaka Dernata Jaka Dernata Jaka Kalbuadi, Dimas Baskoro Kartika Firdausy Kartika Firdausy Kartika Firdausy Kaspul Anwar Kawarul Hawari Ghazali Kgs Muhammad Rizky Alditra Utama Kgs Muhammad Rizky Alditra Utama Kharis Hudaiby Hanif Kiagus Muhammad Rizky Aditra Utama Listya Febri Fathoni Liya Yusrina Sabila Luh Putu Ratna Sundari Lutfatul Kholifah M Rosyidi Djou M Rosyidi Djou M. Rosyidi Djou Mahsun Mahsun Mardi Sugama Mawadati, Siti Miftahuddin Fahmi Miftahus Surur, Miftahus Miko Wardani Mitra Adhimukti Muchamad Kurniawan Muchlas, Muchlas Mudinillah, Adam Muflih, Ghufron Zaida Muh. Fadli Hasa Muhamad Caesar Febriansyah Putra, Muhamad Caesar Febriansyah Muhamad Fahrul Reza Muhamad Rosidin Muhammad Aris Fajar Ilmawan Muhammad Darso Muhammad Irfan Pure Muhammad Kunta Biddinika Muhammad Kunta Biddinika Muhammad Miftahul Amri Muhammad Noor Fadillah Muhammad Noor Fadillah Muhammad Nur Faiz Muhammad Nur Faiz Muhammad Rizki Setyawan Muhammad Sabiq Dzakwan Muhammad Sabiq Dzakwan Muhammad, Khairul Mukaromah, Iif Alfiatul Mushab Al Barra Mushlihudin Mushlihudin Mushlihudin Mushlihudin Mushlihudin, Mushlihudin Mushlihudin, Mushlihudin Nathalie Japkowicz Nurina Umy Habibah Nuryono Satya Widodo Ockhy Jey Fhiter Wassalam Phisca Aditya Rosyady Pratama, Denny Yoga prayudi, Andi Prianto, Eko Priyatno Priyatno Putra, Aji Surya Kurniawan Putra, Marta Dwi Darma Rachmad Fitriyanto Rachmad Very Ananda Saputra Rafal Drezewski Raja Bidin Raja Hassan Rani Rotul Muhima Rauhulloh Ayatulloh Khomeini Noor Bintang Renangga Yudianto Resmi Aini Retnosyari Septiyani Reza, Muhamad Fahrul Rezki Ramdhani Riski Prasongko Yudhi Prasongko Riski Yudhi Prasongko Riski Yudhi Prasongko Rizky Andhika Surya Rosad, Safiq Rusdi Umar Rusydi Umar Rusydi Umar Rusydi Umar Rusydi Umar Sabarudin Saputra Saberi Mawi Safiq Rosad Saifullah, Shoffan Samadri Samadri saputro, tahap Sarjimin Sarjimin Sarjimin Sarjimin Satriya Dwi Putra Satriya Dwi Putra Sefindra Purnama Seno Aji Putra Septa, Frandika Septiyawan Rosetya Wardhana Setiawan Ardi Wijaya Sharipah Salwa Mohamed Sidharta, Anggara Ibnu Sigit Wijaya Siswaya Siswaya Siswaya, Siswaya Siti Helmiyah Siti Helmiyah Siti Helmiyah Son Ali Akbar sri suharti Sri Suharti Sulistyo, Andhy Sunardi - Sunardi Sunardi sunardi sunardi Sunardi, Sunardi Suwanti Suwanti Syahrani Lonang Syaiful Amrial Khoir Syed Abdullah Syinta Brata Tarisno Amijoyo Tiara Widyakunthaningrum Tole Sutikno Tugiman Tugiman Tuska Abe Umar, Rusydi Ummi Syafiqoh Ummi Syafiqoh W, Yunanri Wahidah Mahanani Rahayu Wahyu Prawoto Wahyu Sapto Aji Wardani, Miko Wicaksono Yuli Sulistyo Wicaksono Yuli Sulistyo Wilis Kaswijanti Yofita Sandra, S.Pd., M.Pd., Zico Farlin, Dr. Budiwirman, M.Pd., Yusril Rumagia Zeehaida Mohamed