Ahmad Almaarif

ORCID: 0000-0002-2209-9422
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Blockchain Technology in Education and Learning
  • Edcuational Technology Systems
  • Information Retrieval and Data Mining
  • Multimedia Learning Systems
  • Digital and Cyber Forensics
  • IoT-based Control Systems
  • Network Security and Intrusion Detection
  • Web Application Security Vulnerabilities
  • Decision Support System Applications
  • Spam and Phishing Detection
  • Environmental Engineering and Cultural Studies
  • IoT-based Smart Home Systems
  • Mobile and Web Applications
  • Privacy, Security, and Data Protection
  • Cloud Computing and Resource Management
  • Software System Performance and Reliability
  • Management and Optimization Techniques
  • Coastal Management and Development
  • Technology Adoption and User Behaviour
  • Information and Cyber Security
  • Islamic Finance and Communication
  • User Authentication and Security Systems
  • Legal and Social Justice Studies
  • Digital Marketing and Social Media

Telkom University
2018-2023

Bandung Institute of Technology
2014

Indonesia has a capital city which is one of the many big cities in world called Jakarta. Jakarta's role dynamics that occur very central because it functions as political and government center, business economic center drives economy. Recently discourse to relocate invited various reactions from community. Therefore, this study, sentiment analysis relocation was carried out. The performed by doing classification describe public sourced twitter data, data classified into 2 classes, namely...

10.11591/eei.v9i4.2352 article EN Bulletin of Electrical Engineering and Informatics 2020-08-01

The quality of students can be seen from the academic achievements, which are evidence efforts made by students. Student achievement is evaluated at end each semester to determine learning outcomes that have been achieved. If a student cannot meet certain criteria stated fulfilling requirements continue his studies, may potential not graduate on time or even Drop Out (DO). high number who do DO in higher education institutions minimized detecting risk early stages and supported making...

10.29207/resti.v4i1.1502 article EN cc-by Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 2020-02-08

Abstract Zakat institution have been essential entity in the collection and distribution process of zakat management effectively efficiently. Although, it is clear that there are some difficulties, which require great attention such as transparency, accessibility, fairness compatibility due to cultural, geographical political context. The purpose this paper analyse common approaches used various countries through comparison best practice managing fund. It expected provide more understanding...

10.1088/1742-6596/1235/1/012048 article EN Journal of Physics Conference Series 2019-06-01

Windows is one of the popular operating systems in use today, while Universal Serial Bus (USB) mechanisms used by many people with practical plug and play functions. USB has long been as a vector attacks on computers. One method attack Keylogger. The Keylogger can take advantage existing vulnerabilities 10 system carried out form recording computer keystroke activity without victim knowing. In this research, an will be running Powershell Script using BadUSB to able activate program. script...

10.1109/ic2ie50715.2020.9274631 article EN 2020-09-15

The need for data exchange and storage is currently increasing. increased also increases the devices media. One of most commonly used media exchanges USB Flash Drive. Drive are widely because they easy to carry have a fairly large storage. Unfortunately, this not directly proportional an increase in awareness device security, both flash drive computer that as primary devices. This research shows threats can arise from use threat fork bomb implemented on Arduino Pro Micro converted drive....

10.1109/iciss48059.2019.8969789 article EN 2019-11-01

Information security often neglected by individual or employee even the enterprise, with there is no proper strategy to raise awareness, promote consistency and maintain performance regarding protect sensitive, confidential, critical data. One of common techniques used a vulnerability assessment penetration testing (VAPT) assure has been implemented into computer system analyzing both its strength weakness. SQL plays an essential role in Relation Database Management System (RDBMS)...

10.18517/ijaseit.10.5.8862 article EN cc-by-sa International Journal on Advanced Science Engineering and Information Technology 2020-10-15

Currently, Wireless LAN has been widely used in public places, one of which is cafe. that are increasingly developing still have problems when implementing this network, security issues. Thus, study aims to evaluate the WLAN networks This can be done using Vulnerability Assessment and Penetration Testing methods. Execution Standard (PTES) was as a standard for experiment. testing conducted by simulating several attacks namely Unauthorized Access Attack, DoS Packet Sniffing. The test results...

10.1109/iciss53185.2021.9533216 article EN 2021-08-02

Currently the website has become an effective communication tool. However, it is essential to have vulnerabilities assessment and penetration testing using specific standards on released websites public for securing information. The problems raised in this research are conducting vulnerability XYZ analyze security gaps website, as well high found. Testing was conducted NIST 800 – 115 Standard through 4 main stages: planning, discovery, attack, report. Several tools were used: Nmap, OWASP...

10.36418/syntax-literate.v7i1.5800 article EN Syntax Literate Jurnal Ilmiah Indonesia 2022-01-11

Abstract User engagement can be defined as the perception of user to qualify experience towards certain application, which focus on positive aspects interaction through Internet in context desire use it continuously and for longer time. It is fundamental concept design online applications regardless platform, driven by observation that successful are not only used but those work. However, technology advancement a paradox phenomenon, they recognize potentiality reluctant adopt or realize its...

10.1088/1742-6596/1235/1/012040 article EN Journal of Physics Conference Series 2019-06-01

Malware is a software or computer program that used to carry out malicious activity. made with the aim of harming user’s device because it can change data, use up bandwidth and other resources without user's permission. Some research has been done before identify type malware its effects. But previous only focused on grouping types attack via network traffic. This analyzes impact traffic using behavior-based detection techniques. technique by running samples into an environment monitoring...

10.25008/ijadis.v1i1.14 article EN International Journal of Advances in Data and Information Systems 2020-04-01

Penggunaan aplikasi berbasis web sudah menjadi bagian penting dalam institusi pendidikan saat ini khususnya perguruan tinggi. Aplikasi dapat berkembang dengan adanya dukungan hosting server yang penyimpanan data web, menjadikan sebagai sasaran utama serangan untuk mendapatkan dari web. Serangan pada sangat pesat dikarenakan data-data ada bisa disalahgunakan oleh pihak tidak bertanggung jawab, metode security hardening digunakan akan membantu proses keamanan sebuah server. Penelitian...

10.29100/jipi.v8i1.3438 article ID cc-by-sa JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 2023-02-25

XYZ Regional Public Hospital is one of the government-owned hospitals Indonesia, regional public hospital has numerous patient and employee, yet it not been supported by a good information system, there no integrated system that helps exchange data between each sector in hospital. Data done conventionally using paper as physical document. The archives document would cost lot spent wide space made several rooms are filled with pile due to lack ERP concept integrates all business process...

10.1109/iciss50791.2020.9307535 article EN 2020-11-19

Malware is a software or computer program that used to carry out malicious activity. made with the aim of harming users because it can change users' data, use up bandwidth and other resources without user's permission. Some research has been done before identify type malware its effects. But previous only focused on grouping types attack via network traffic. P. This analyzes impact traffic using behavior-based detection techniques. technique by running samples into an environment monitoring...

10.25008/ijadis.v1i1.8 article EN International Journal of Advances in Data and Information Systems 2020-03-09

Abstract The adoption of e -voting in several countries poses certain challenges, which are very similar when electronic means applied to any activities, such as -governance or -commerce. Therefore, some people due economics, politics social reasons expect the use will facilitate and solve previous election’s problem. Unfortunately, most complex difficult practical implementation with distinct problems depends on particular condition culture. One essential factor concerning related privacy...

10.1088/1742-6596/1566/1/012111 article EN Journal of Physics Conference Series 2020-06-01

Along with the development of Windows operating system, browser applications to surf internet are also growing rapidly. The most widely used browsers today Google Chrome and Mozilla Firefox. Both have a username password management feature that makes users login website easily, but saving usernames passwords in is quite dangerous because stored data can be hacked using brute force attacks or read through program. One way get use program Firefox from computer's internal storage then show...

10.1109/ic2ie50715.2020.9274566 article EN 2020-09-15

Smart Village di Desa Lengkong merupakan upaya terintegrasi untuk memfasilitasi agenda pembangunan daerah mulai level paling bawah yaitu desa. Salah satu sub-program dari ini adalah digitalisasi aktivitas usaha melalui peningkatan kompetensi perempuan pelaku Usaha Mikro, Kecil dan Menengah (UMKM) menuju online commerce wilayah Lengkong. Persaingan saat membutuhkan keterampilan baik dalam pemasaran produk, manajemen usaha, pengemasan produk yang menarik, pelayanan terbaik sehingga membuat...

10.25008/abdiformatika.v2i2.161 article ID cc-by-sa Abdiformatika Jurnal Pengabdian Masyarakat Informatika 2022-11-04

With the rapid pace of development and change in mobile device technology Android versions, malware has emerged become a focus current research.Subsequently, security privacy have one main issues android malware.Therefore, it is essential to understand behavior order conceive an effective technique detection analysis.This article presents comprehensive study regarding platform, its features code also discusses result from previous studies support forward-looking study.

10.30880/ijie.2018.10.06.029 article EN International Journal of Integrated Engineering 2018-11-01

Kepadatan trafik data pada jaringan menyebabkan timbulnya kemacetan atau congestion lalu lintas data. Jika terjadi di internet publik, kondisi ini akan mengganggu kenyamanan pengguna. Seringkali kepadatan disebabkan oleh pengguna yang melakukan pengunduhan dalam jumlah besar. Solusi sering digunakan untuk mengurangi adalah dengan memperbesar bandwidth menggunakan metode seperti traffic policing serta queue management. Permasalahannya, solusi sulit diterapkan organisasi skala kecil sekolah...

10.25124/jrsi.v5i02.367 article ID Jurnal Rekayasa Sistem & Industri (JRSI) 2018-12-27

Pondok Pesantren Miftahul Falah merupakan pondok pesantren yang berlokasi di Jl. Gedebage Selatan No.115, Kel.Derwati Kec.Rancasari, Bandung, Jawa Barat, menjadi sebuah lembaga resmi bernama Yayasan Pendidikan Islam Falah. Dalam pengembangannya hingga saat ini, YPI telah mendirikan Putra Putri, Majlis Ta’lim, Madrasah Diniyah, Ibtidaiyah, Tsanawiyah dan Aliyah. Pengabdian masyarakat ini adalah seri ketiga pertama, tim PKM Telkom University melakukan kegiatan dengan tema SDGs Pekerjaan Layak...

10.25124/cosecant.v2i2.18653 article ID Prosiding COSECANT Community Service and Engagement Seminar 2023-03-16

Software defined network (SDN) is becoming more and popular due to its feature such as programming control, centralize monitoring, fine-grained flexibility, multitenant support scalability. Problems with the previous architecture called traditional like device configuration process done one by one, decentralize on there are still problem for enforcement tenant, tenants cannot manage their own without being disturbed other tenants. This study aims perform slicing SDN enforce isolation between...

10.1109/icsmartgrid55722.2022.9848585 article EN 2022-06-27

Pesantren dalam perkembangannya menjadi salah satu pilar struktur pendidikan Indonesia. Tidak hanya mengajarkan agama, pesantren juga umum dan membentuk karakter santri agar siap menghadapi tantangan setelah lulus. Karena hal inilah tujuan bagi banyak orang tua sebagai tempat untuk anaknya bersekolah. Namun bencana Pandemi Covid-19 telah mengubah preferensi tersebut karena kekhawatiran terhadap penyebaran virus. Hal ini berdampak pada kondisi keuangan yang kebanyakan bergantung iuran santri....

10.25008/abdiformatika.v2i1.145 article ID cc-by-sa Abdiformatika Jurnal Pengabdian Masyarakat Informatika 2022-05-30

The current level of technological development is very rapid. most prominent example the use websites in industry and government environments. website provides convenience supporting ongoing business processes can assist work solving problems that occur an organization. In using website, course, a server needed to process data requests or provide information users. XYZ Faculty at University has virtualxyz which contains used support academic administrative activities. However, technology...

10.47065/josh.v4i1.2299 article EN cc-by Journal of Information System Research (JOSH) 2022-10-29
Coming Soon ...