[PDF][PDF] Smart learning media based on android technology

D Novaliendry, R Darmi, Y Hendriyani, M Nor… - International Journal of …, 2020 - ijicc.net
Education play an important role in developing human resources to be capable of making
changes and generating ideas in learning. This article aims to explain the process of …

Sejarah, cara kerja dan manfaat internet of things

W Wilianto, A Kurniawan - Matrix: Jurnal Manajemen Teknologi Dan …, 2018 - ojs.pnb.ac.id
Penelitian ini bertujuan untuk mengumpulkan dan meringkas beberapa sumber pustaka
terbaru tentang Internet of Things (IoT) dengan tiga sudut pandang: Sejarah, Cara Kerja dan …

[PDF][PDF] Analisis keamanan sistem informasi berdasarkan framework COBIT 5 menggunakan Capability Maturity Model Integration (CMMI)

R Umar, I Riadi, E Handoyo - J. Sist. Inf. Bisnis, 2019 - academia.edu
Teknologi informasi adalah bagian yang sangat penting bagi perusahaan atau institusi.
Sistem informasi sendiri di harapkan mampu memberikan keuntungan yang baik untuk …

Analisis Keamanan Website Open Journal System Menggunakan Metode Vulnerability Assessment

I Riadi, A Yudhana, W Yunanri - Jurnal Teknologi Informasi Dan Ilmu …, 2020 - jtiik.ub.ac.id
Open Journal System (OJS) merupakan perangkat lunak yang berfungsi sebagai sarana
publikasi ilmiah dan digunakan diseluruh dunia. OJS yang tidak dipantau beresiko diserang …

Development of media-based learning using android mobile learning

K Said, ADE Kurniawan… - Journal of Theoretical …, 2018 - data.p2m.stainkepri.ac.id
Untitled Page 1 Page 2 DEVELOPMENT OF MEDIABASED LEARNING USING ANDROID
MOBILE LEARNING by Khaeruddin Said Submission date: 26-Jan-2021 08:05PM (UTC+0700) …

Perancangan Internet of Things (IoT) Smart Home

A Zein, ES Eriana - … : Jurnal Penelitian Dan Pengkajian Sains Dan …, 2021 - ejournal.istn.ac.id
The main purpose of this research is to design a smart home using IoT where the technology
is to automate various activities at home such as turning off and turning on the lights …

WebApplication Vulnerabilities: Exploitation and Prevention

AK Priyanka, SS Smruthi - 2020 Second International …, 2020 - ieeexplore.ieee.org
Web application security has become a major challenge due to the common vulnerabilities
found in web applications. Attackers possess a never-ending list of vulnerabilities and …

[PDF][PDF] Detection and analysis cerber ransomware based on network forensics behavior

A Kurniawan, I Riadi - International Journal of Network Security, 2018 - researchgate.net
Kaspersky and other information security firms mentioned 2016 as the year of Ransomware.
The impact of attacks has allowed financial damage on the business or individual. The FBI …

[PDF][PDF] Forensic Investigation on WhatsApp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2

B Actoriano, I Riadi - International Journal of Cyber-Security and …, 2018 - researchgate.net
WhatsApp Web is a computer-based extension connected to WhatsApp on smartphones.
The handling of crime cases on computers or smartphones has four main stages, namely …

[PDF][PDF] Forensic analysis whatsapp mobile application on android-based smartphones using national institute of standard and technology (nist) framework

VA Yuliani, I Riadi - International Journal of Cyber-Security and …, 2019 - researchgate.net
The Whatsapp application is an alternative to exchange messages because of its ease of
use. The number of WhatsApp users and security features is available, allowing WhatsApp …