[PDF][PDF] Evolution of malware threats and techniques: A review

MN Alenezi, H Alabdulrazzaq… - International journal …, 2020 - researchgate.net
The rapid development of technology, and its usage, in our everyday lives caused us to
depend on many of the aspects it offers. The evolution of the Internet in recent decades has …

[PDF][PDF] The phenomenon of cyber-crime and fraud victimization in online shop

M Nasution, Y Rossanty, APU Siahaan, S Aryza - Int. J. Civ. Eng. Technol, 2018 - osf.io
Simple negligence can be a fatal impact. The threat of cyber in 2017 is feeble, and it starts
from “wanna cry” until “nopetya” that the impact is relatively weak. The public also feels the …

[PDF][PDF] A review of security issues in SDLC

N Nazir, MK Nazir - American Scientific Research Journal for …, 2018 - core.ac.uk
Software Engineers do not implement security as a continuing process in software
development; they give it worth at the end of software development. Security implementation …

Cyber threat ransomware and marketing to networked consumers

UJ Butt, MF Abbod, A Kumar - … in technology and marketing for the …, 2020 - igi-global.com
Marketing is a process of creating, capturing, and exchanging 'value'for the mutual benefits
of marketers, customers, intermediaries, and other stakeholders. Such a transaction requires …

Prim and genetic algorithms performance in determining optimum route on graph

APU Siahaan - 2018 - osf.io
Performance is a process of assessment of the algorithm. Speed and security is the
performance to be achieved in determining which algorithm is better to use. In determining …

[PDF][PDF] Modified Playfair Cipher Using Random Key Linear Congruent Method

M Syahrizal, SD Murdani, M Nasution, R Rahim… - J. Online Jar. COT …, 2017 - osf.io
The number of crimes that arise due to data does not have good security makes many users
choose one or more cryptographic algorithms to secure data. The application of …

Computer viruses, attacks, and security methods

MZ Hasan, MZ Hussain, Z Ullah - Lahore Garrison University …, 2019 - lgurjcsit.lgu.edu.pk
Abstract with the fast growth of the Internet, computer threats and viruses have become a
very serious issue for us, which attract public attention. Therefore, the distribution of …

SOSIALISASI DAN KUNJUNGAN KAMPUS DALAM PROMOSI PROGRAM STUDI SISTEM KOMPUTER UNIVERSITAS PEMBANGUNAN PANCA BUDI DI SMK …

APU Siahaan - Jurnal Hasil Pengabdian Masyarakat …, 2023 - ejurnal.lkpkaryaprima.id
Kegiatan sosialisasi dan kunjungan kampus merupakan salah satu cara untuk
mempromosikan program studi Sistem Komputer Universitas Pembangunan Panca Budi …

Pengenalan dan Sosialisasi Website Sistem Informasi Portal Mahasiswa di SMK Tritech Indonesia

APU Siahaan - Jurnal Hasil Pengabdian Masyarakat …, 2023 - ejurnal.lkpkaryaprima.id
Pendidikan memiliki peran utama dalam perkembangan individu dan kemajuan suatu
negara. SMK Tritech Indonesia, sebagai lembaga pendidikan yang berkomitmen tinggi …

Implementation of super playfair in messaging

APU Siahaan, M Mesran, I Solihin - Proceedings of the Joint …, 2018 - books.google.com
Data is the essential thing in the world of communication. Text messaging is a way of
communicating that is sent in digital form. This message is very widely used in electronic …