Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–2 dari 2 artikel
Model Hybrid Random Forest dan Information Gain untuk meningkatkan Performa Algoritma Machine Learning pada Deteksi Malicious Software
Rafrastara, Fauzi Adi
; Ghozi, Wildanil
; Sani, Ramadhan Rakhmat
; Handoko, L. Budi
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
The evolution of malware, or malicious software, has raised increasing concerns, targeting not only computers but also other devices like smartphones. Malware is no longer just monomorphic but has evolved into polymorphic, metamorphic, and oligomorphic forms. With this massive development, conventional antivirus software is becoming less effective at countering it. This is due to malware's ability to propagate itself using different fingerprint and behavioral patterns. Therefore, an intelligent...
Sumber Asli
Google Scholar
Deteksi Serangan Denial of Service (DoS) dan Spoofing pada Internet of Vehicles menggunakan Algoritma K-Nearest Neighbor (KNN)
Ghozi, Wildanil
; Rafrastara, Fauzi Adi
; Sani, Ramadhan Rakhmat
; Abdussalam, Abdussalam
Jurnal Informatika dan Rekayasa Perangkat Lunak
Vol 6
, No 2
(2024)
The implementation of Internet of Things (IoT) technology in motor vehicles has been increasing over time and is known as the Internet of Vehicles (IoV). IoV is becoming more essential to society as it provides comfort, safety, and efficiency in driving. Unfortunately, the use of internet technology in IoV brings the potential for cyber-attacks, such as Denial of Service (DoS) and Spoofing. Intrusion Detection Systems in IoV have not yet fully matured, as this technology is still relatively new....
Sumber Asli
Google Scholar