Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–10 dari 27 artikel
Evaluasi Keamanan Wirelles Network WPA2 Vs WPA3 Terhadap Serangan Deauthentication dan Brute Force menggunakan Aircrack-ng
Harry Pribadi Fitrian
; Eri Eriyana
; Hendrick Maulana Ibrahim
; Riordan Pramana Rizqullah
; Silvia Putri Meliansyah
Vol 5
, No 1
(2026)
Keamanan jaringan nirkabel menjadi perhatian kritis seiring meningkatnya penggunaan Wireless Local-Area Network (WLAN) diberbagai sektor. Penelitian ini mengevaluasi efektivitas protokol keamanan WPA2-PSK dan WPA3-SAE dalam mencegah serangan deauthentication dan brute-force menggunakan Aircrack-ng suite. Metodologi penelitian menggunakan pendekatan penetration testing etis dalam lingkungan lab terkontrol dengan dua access point yang di konfigurasi menggunakan protokol WPA2-PSK dan WPA3-SAE. Peng...
Sumber Asli
Google Scholar
DOI
Evaluasi Keamanan Wirelles Network WPA2 Vs WPA3 Terhadap Serangan Deauthentication dan Brute Force menggunakan Aircrack-ng
Fitrian, Harry Pribadi
; Eriyana, Eri
; Ibrahim, Hendrick Maulana
; Rizqullah, Riordan Pramana
; Meliansyah, Silvia Putri
; Fitrian, Harry Pribadi
; Eriyana, Eri
; Ibrahim, Hendrick Maulana
; Rizqullah, Riordan Pramana
; Meliansyah, Silvia Putri
JUISI : Jurnal Ilmiah Sistem Informasi
Vol 5
, No 1
(2026)
Keamanan jaringan nirkabel menjadi perhatian kritis seiring meningkatnya penggunaan Wireless Local-Area Network (WLAN) diberbagai sektor. Penelitian ini mengevaluasi efektivitas protokol keamanan WPA2-PSK dan WPA3-SAE dalam mencegah serangan deauthentication dan brute-force menggunakan Aircrack-ng suite. Metodologi penelitian menggunakan pendekatan penetration testing etis dalam lingkungan lab terkontrol dengan dua access point yang di konfigurasi menggunakan protokol WPA2-PSK dan WPA3-SAE. Peng...
Sumber Asli
Google Scholar
DOI
Improved Website SecurityUsing SSL and HAProxy Based PFSense Routers
Teknik: Jurnal Ilmu Teknik dan Informatika
Vol 5
, No 1
(2025)
Website security is a crucial aspect in the face of increasing cyber threats. This study aims to implement website protection using SSL (Secure Sockets Layer) and HAProxy (High Availability Proxy) through a PFSense router, and to evaluate its effectiveness using the securityheaders.com platform. The methodology used is an experimental study with a reverse proxy server configuration based on HAProxy and SSL certificates from Let's Encrypt. Measurement results indicate an improvement in the websit...
Sumber Asli
Google Scholar
DOI
Single Tone Trigger Implementation for Seamless and Automated Broadcast to Ad Insertion
Teknik: Jurnal Ilmu Teknik dan Informatika
Vol 5
, No 1
(2025)
Abstract. The advancement of broadcasting technology has driven the demand for reliable and efficient automation systems, particularly in managing the transition from broadcast content to advertisement segments. In this context, the present study proposes the application of the Single Tone Trigger (STT) method as an automatic triggering mechanism to systematically regulate content switching. This method utilizes a single-frequency audio signal embedded within the primary broadcast, which can be...
Sumber Asli
Google Scholar
DOI
Implementasi Jaringan Syaraf Tiruan dalam Memprediksi Hujan
Jurnal Elektronika dan Komputer
Vol 18
, No 1
(2025)
Information technology is a technology used to manage data, including processing, acquiring, organizing, storing, and manipulating data in various ways to produce high-quality information—namely, information that is relevant, accurate, and timely. This information is used for personal, business, and governmental purposes, serving as strategic information in decision-making. To anticipate changes in weather conditions, particularly rainfall, a valid and accurate report is needed that can be usefu...
Sumber Asli
Google Scholar
DOI
Application of RED and PCQ Algorithms for Network Traffic Management in CBT Systems
Prastika Indriyanti
; Silviana Windasari
; Abdurohman
; Rahman Hakim
; Adi Affandi Rotib
; Silviana Windasari
Jurnal Elektronika dan Komputer
Vol 18
, No 1
(2025)
The digital transformation in education has encouraged the adoption of computer-based tests (CBT) using video content, which demands stable and efficient network performance. This study aims to evaluate the performance of two queue management algorithms, namely Random Early Detection (RED) and Per Connection Queue (PCQ), in maintaining the quality of service (QoS) of school networks during online video-based examinations. A case study approach was applied using a real network topology in a schoo...
Sumber Asli
Google Scholar
DOI
The Role of Financial Strategies for MSMEs in Responding to Macroeconomic Uncertainty: A Literature Review and Secondary Data Analysis
EBISNIS : JURNAL ILMIAH EKONOMI DAN BISNIS
Vol 18
, No 1
(2025)
Macroeconomic uncertainty poses a structural challenge for the sustainability of micro, small, and medium enterprises (MSMEs) in Indonesia. Fluctuations in inflation, benchmark interest rates, and exchange rates have a direct impact on liquidity, cost structures, and investment decisions. This study aims to explore the types of financial strategies adopted by MSMEs in response to macroeconomic pressures using a systematic literature review and secondary data analysis covering the period from 201...
Sumber Asli
Google Scholar
DOI
The Rise of Web-Based AR in Interactive Design: A Multi-Year Trend and User Experience Analysis
JURNAL ILMIAH KOMPUTER GRAFIS
Vol 17
, No 2
(2025)
Web-Based Augmented Reality (AR) is an emerging interactive technology that is increasingly adopted in the fields of visual communication design and digital education. This study aims to analyze trends in the use of Web-Based AR within interactive design contexts and to identify user preferences regarding its features. The research employs a literature review and secondary data analysis, drawing from academic publications, industry reports, and online surveys conducted between 2019 and 2024. The...
Sumber Asli
Google Scholar
DOI
PKM PENGUATAN PROFIL PELAJAR PANCASILA DENGAN MEDIA ECOPRINT BERBASIS TEKNIK POUNDING
Sirait, Syahriani
; Putri Lidiana Permata Sari
; Anim, Anim
; Wati, Herni Wati Julianingsih
; Amelia Putri
; Silvia, Siska Silvia
Adi Widya: Jurnal Pengabdian Masyarakat
Vol 9
, No 1
(2025)
In the Pancasila Student Profile, creativity is defined as a student's ability to modify and create something that is original, meaningful, useful and has a positive impact. In developing student creativity, PKM was held to strengthen the profile of Pancasila students using ecoprint media based on the pounding technique. Dyeing using the ecoprint method based on the pounding technique is an environmentally friendly method, which uses natural ingredients to create patterns on the fabric. Ecoprint...
Sumber Asli
Google Scholar
DOI
PENERAPAN METODE PROFILE MATCHING DALAM SISTEM INFORMASI SELEKSI BEASISWA PADA SMA NU 03 MUALLIMIN WELERI: PENERAPAN METODE PROFILE MATCHING DALAM SISTEM INFORMASI SELEKSI BEASISWA PADA SMA NU 03 MUALLIMIN WELERI
JUISI : Jurnal Ilmiah Sistem Informasi
Vol 3
, No 1
(2025)
Providing Scholarships is a work program that exists in every school. The scholarship program was held to ease the burden on students during their study period, especially regarding costs. Providing scholarships to students must be done selectively according to the type of scholarship being provided. Scholarships are income for those who receive them and the purpose of the scholarship is to help ease the burden of educational costs for students who receive scholarships.
One of the methods used t...
Sumber Asli
Google Scholar
DOI