Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 81–90 dari 2452 artikel
Evaluasi Keamanan Wirelles Network WPA2 Vs WPA3 Terhadap Serangan Deauthentication dan Brute Force menggunakan Aircrack-ng
Fitrian, Harry Pribadi
; Eriyana, Eri
; Ibrahim, Hendrick Maulana
; Rizqullah, Riordan Pramana
; Meliansyah, Silvia Putri
; Fitrian, Harry Pribadi
; Eriyana, Eri
; Ibrahim, Hendrick Maulana
; Rizqullah, Riordan Pramana
; Meliansyah, Silvia Putri
JUISI : Jurnal Ilmiah Sistem Informasi
Vol 5
, No 1
(2026)
Keamanan jaringan nirkabel menjadi perhatian kritis seiring meningkatnya penggunaan Wireless Local-Area Network (WLAN) diberbagai sektor. Penelitian ini mengevaluasi efektivitas protokol keamanan WPA2-PSK dan WPA3-SAE dalam mencegah serangan deauthentication dan brute-force menggunakan Aircrack-ng suite. Metodologi penelitian menggunakan pendekatan penetration testing etis dalam lingkungan lab terkontrol dengan dua access point yang di konfigurasi menggunakan protokol WPA2-PSK dan WPA3-SAE. Peng...
Sumber Asli
Google Scholar
DOI
Hybrid Apriori–MST Framework for Revealing the Structural Backbone of Consumer Purchase Patterns
Jurnal Elektronika dan Komputer
Vol 18
, No 2
(2026)
Traditional association rule analysis is effective at uncovering co-purchase patterns but fails to provide a global structural view of the market, which often results in fragmented and isolated insights. This study proposes a hybrid framework that integrates the Apriori algorithm with a Minimum Spanning Tree (MST) in order to validate and contextualize association rules within a single structural backbone. Transaction data from a retail store are transformed into a weighted, undirected product g...
Sumber Asli
Google Scholar
DOI
Persepsi Pengrajin Batik Kapuronto Banyuwangi terhadap Penerapan Manajemen Kualitas dan Inovasi Produk dalam Meningkatkan Daya Saing
Wawasan : Jurnal Ilmu Manajemenx, Ekonomi dan Kewirausahan
Vol 4
, No 1
(2026)
This study is motivated by increasing business competition in the globalization era, which requires batik artisans to implement quality management and product innovation to enhance competitiveness. Batik has high cultural and economic value, yet small enterprises still face limitations in quality control, innovation, and marketing. This research aims to analyze the implementation of quality management and product innovation and their implications for the competitiveness of Batik Kapuronto in Ban...
Sumber Asli
Google Scholar
DOI
Efektivitas Program Pelatihan Kewirausahaan DPKUKMP bagi Pelaku UMKM di Kota Palangkaraya
Public Service And Governance Journal
Vol 7
, No 1
(2026)
This study aims to assess the effectiveness of the entrepreneurship training program for Micro, Small, and Medium Enterprises (MSMEs) held by the Palangka Raya City Department of Trade, Cooperatives, Small and Medium Enterprises, and Industry (DPKUKMP) on August 20-21, 2025. This study uses a qualitative approach, data collection is obtained through interviews and documentation to evaluate the program's impact on knowledge, managerial skills, digital adaptation, and business performance of MSMEs...
Sumber Asli
Google Scholar
DOI
Hybrid Real-time Framework for Detecting Adaptive Prompt Injection Attacks in Large Language Models
Journal of Computing Theories and Applications
Vol 3
, No 3
(2026)
Prompt injection has emerged as a critical security threat for Large Language Models (LLMs), exploiting their inability to separate instructions from data within application contexts reliably. This paper provides a structured review of current attack vectors, including direct and indirect prompt injection, and highlights the limitations of existing defenses, with particular attention to the fragility of Known-Answer Detection (KAD) against adaptive attacks such as DataFlip. To address these gaps...
Sumber Asli
Google Scholar
DOI
2 Sitasi
Pengaruh Penempatan Kerja, Fringe Benefits dan Fasilitas Kerja Terhadap Kinerja Karyawan Jawa Pos Kediri
Jurnal Ekonomi, Bisnis dan Manajemen (EBISMEN)
Vol 5
, No 1
(2026)
This research aims to analyze the influence of job placement, fringe benefits, and work facilities on the performance of employees at Jawa Pos Kediri, both partially and simultaneously. The method used is quantitative with a descriptive and associative approach. Data were collected through the distribution of questionnaires to 50 respondents who are employees of Jawa Pos Kediri. The data analysis techniques used include multiple linear regression, t-test (partial), F-test (simultaneous), and the...
Sumber Asli
Google Scholar
DOI
Renovasi Perpustakaan Nagari: Mewujudkan Pusat Baca dan Informasi Masyarakat Kenagarian Sumpur Kudus
Samuel Martin
; Seprian Saputra
; Feni Farmilia
; Mhd Zhaky Ananda
; Refy Faustina Khairani
; Rizka Nailatul Hasanah
Karunia: Jurnal Hasil Pengabdian Masyarakat Indonesia
Vol 4
, No 4
(2026)
The Community Service Program (KKN) conducted by students of Padang State University (UNP) focuses on community service to address social issues and improve the quality of life for a more developed nation. One of the programs implemented is digital literacy and the renovation of the village library located at the Sumpur Kudus Village Head's office, Sumpur Kudus District, Sinjunjung Regency, West Sumatra Province. Given the widespread use of technology today, accessing information related to the...
Sumber Asli
Google Scholar
DOI
Evaluasi penerapan Kemanan Informasi Pada SIAKAD Universitas Ibrahimy Berbasis ISO/IEC 27001:2022
Izzani, Maghfira
; Nellatul, Noer
; Ismatul, Amelia
; Hamdani, Ahmad
; Izzani, Maghfira
; Nellatul, Noer
; Ismatul, Amelia
; Hamdani, Ahmad
JUISI : Jurnal Ilmiah Sistem Informasi
Vol 5
, No 1
(2026)
Perkembangan pesat teknologi informasi di bidang pendidikan tinggi telah secara signifikan meningkatkan efisiensi dan aksesibilitas layanan akademik. Namun, kemajuan ini juga membawa tantangan baru, terutama dalam memastikan keamanan dan perlindungan data institusi. Sistem Informasi Akademik (SIAKAD) Universitas Ibrahimy berfungsi sebagai platform utama untuk mengelola informasi sensitif terkait mahasiswa, dosen, dan kegiatan akademik, sehingga manajemen keamanannya menjadi aspek kritis dalam ta...
Sumber Asli
Google Scholar
DOI
Evaluasi Kematangan dan Kualitas Layanan SIAKAD Berbasis ITIL V4 di IALM
Tazudin, Muhamad Ikhsan
; Saomi, Fakhri
; Noer, Hyuga Ramadhan
; Adawiyah, Siti Fauziah
; Dzulfikar, Helmy
; Tazudin, Muhamad Ikhsan
; Saomi, Fakhri
; Noer, Hyuga Ramadhan
; Adawiyah, Siti Fauziah
; Dzulfikar, Helmy
JUISI : Jurnal Ilmiah Sistem Informasi
Vol 5
, No 1
(2026)
Institut Agama Islam Latifah Mubarokiyah (IAILM) Pondok Pesantren Suryalaya telah memanfaatkan Sistem Informasi Akademik (SIAKAD) untuk mendukung kegiatan administrasi dan akademik di kampus. Namun, hasil observasi dan wawancara menunjukkan bahwa masih ada berbagai kendala, seperti lambatnya akses sistem pada jam sibuk, kesalahan dalam input data, serta kurangnya tindak lanjut terhadap keluhan pengguna. Penelitian ini bertujuan untuk mengevaluasi tingkat kematangan dan kualitas layanan SIAKAD di...
Sumber Asli
Google Scholar
DOI
Legal Consequences of a Will Deed Unknown to the Heirs and Legatees After the Distribution of Inherited Assets Based on Western Inheritance Law
Jurnal Penelitian Serambi Hukum
Vol 19
, No 01
(2026)
A Will (testament) is a legal instrument containing a person’s declaration regarding what he or she wishes to take effect after death, and it may be revoked by the testator at any time. In practice, a testator often does not inform family members or even beneficiaries of the existence of a will, with the expectation that upon death the will shall be implemented and the estate distributed in accordance with its provisions. This study examines the legal consequences of a will that is unknown to th...
Sumber Asli
Google Scholar
DOI