- Advanced Malware Detection Techniques
- Blockchain Technology in Education and Learning
- Edcuational Technology Systems
- Information Retrieval and Data Mining
- Multimedia Learning Systems
- Digital and Cyber Forensics
- IoT-based Control Systems
- Network Security and Intrusion Detection
- Web Application Security Vulnerabilities
- Decision Support System Applications
- Spam and Phishing Detection
- Environmental Engineering and Cultural Studies
- IoT-based Smart Home Systems
- Mobile and Web Applications
- Privacy, Security, and Data Protection
- Cloud Computing and Resource Management
- Software System Performance and Reliability
- Management and Optimization Techniques
- Coastal Management and Development
- Technology Adoption and User Behaviour
- Information and Cyber Security
- Islamic Finance and Communication
- User Authentication and Security Systems
- Legal and Social Justice Studies
- Digital Marketing and Social Media
Telkom University
2018-2023
Bandung Institute of Technology
2014
Indonesia has a capital city which is one of the many big cities in world called Jakarta. Jakarta's role dynamics that occur very central because it functions as political and government center, business economic center drives economy. Recently discourse to relocate invited various reactions from community. Therefore, this study, sentiment analysis relocation was carried out. The performed by doing classification describe public sourced twitter data, data classified into 2 classes, namely...
The quality of students can be seen from the academic achievements, which are evidence efforts made by students. Student achievement is evaluated at end each semester to determine learning outcomes that have been achieved. If a student cannot meet certain criteria stated fulfilling requirements continue his studies, may potential not graduate on time or even Drop Out (DO). high number who do DO in higher education institutions minimized detecting risk early stages and supported making...
Abstract Zakat institution have been essential entity in the collection and distribution process of zakat management effectively efficiently. Although, it is clear that there are some difficulties, which require great attention such as transparency, accessibility, fairness compatibility due to cultural, geographical political context. The purpose this paper analyse common approaches used various countries through comparison best practice managing fund. It expected provide more understanding...
Windows is one of the popular operating systems in use today, while Universal Serial Bus (USB) mechanisms used by many people with practical plug and play functions. USB has long been as a vector attacks on computers. One method attack Keylogger. The Keylogger can take advantage existing vulnerabilities 10 system carried out form recording computer keystroke activity without victim knowing. In this research, an will be running Powershell Script using BadUSB to able activate program. script...
The need for data exchange and storage is currently increasing. increased also increases the devices media. One of most commonly used media exchanges USB Flash Drive. Drive are widely because they easy to carry have a fairly large storage. Unfortunately, this not directly proportional an increase in awareness device security, both flash drive computer that as primary devices. This research shows threats can arise from use threat fork bomb implemented on Arduino Pro Micro converted drive....
Information security often neglected by individual or employee even the enterprise, with there is no proper strategy to raise awareness, promote consistency and maintain performance regarding protect sensitive, confidential, critical data. One of common techniques used a vulnerability assessment penetration testing (VAPT) assure has been implemented into computer system analyzing both its strength weakness. SQL plays an essential role in Relation Database Management System (RDBMS)...
Currently, Wireless LAN has been widely used in public places, one of which is cafe. that are increasingly developing still have problems when implementing this network, security issues. Thus, study aims to evaluate the WLAN networks This can be done using Vulnerability Assessment and Penetration Testing methods. Execution Standard (PTES) was as a standard for experiment. testing conducted by simulating several attacks namely Unauthorized Access Attack, DoS Packet Sniffing. The test results...
Currently the website has become an effective communication tool. However, it is essential to have vulnerabilities assessment and penetration testing using specific standards on released websites public for securing information. The problems raised in this research are conducting vulnerability XYZ analyze security gaps website, as well high found. Testing was conducted NIST 800 – 115 Standard through 4 main stages: planning, discovery, attack, report. Several tools were used: Nmap, OWASP...
Abstract User engagement can be defined as the perception of user to qualify experience towards certain application, which focus on positive aspects interaction through Internet in context desire use it continuously and for longer time. It is fundamental concept design online applications regardless platform, driven by observation that successful are not only used but those work. However, technology advancement a paradox phenomenon, they recognize potentiality reluctant adopt or realize its...
Malware is a software or computer program that used to carry out malicious activity. made with the aim of harming user’s device because it can change data, use up bandwidth and other resources without user's permission. Some research has been done before identify type malware its effects. But previous only focused on grouping types attack via network traffic. This analyzes impact traffic using behavior-based detection techniques. technique by running samples into an environment monitoring...
Penggunaan aplikasi berbasis web sudah menjadi bagian penting dalam institusi pendidikan saat ini khususnya perguruan tinggi. Aplikasi dapat berkembang dengan adanya dukungan hosting server yang penyimpanan data web, menjadikan sebagai sasaran utama serangan untuk mendapatkan dari web. Serangan pada sangat pesat dikarenakan data-data ada bisa disalahgunakan oleh pihak tidak bertanggung jawab, metode security hardening digunakan akan membantu proses keamanan sebuah server. Penelitian...
XYZ Regional Public Hospital is one of the government-owned hospitals Indonesia, regional public hospital has numerous patient and employee, yet it not been supported by a good information system, there no integrated system that helps exchange data between each sector in hospital. Data done conventionally using paper as physical document. The archives document would cost lot spent wide space made several rooms are filled with pile due to lack ERP concept integrates all business process...
Malware is a software or computer program that used to carry out malicious activity. made with the aim of harming users because it can change users' data, use up bandwidth and other resources without user's permission. Some research has been done before identify type malware its effects. But previous only focused on grouping types attack via network traffic. P. This analyzes impact traffic using behavior-based detection techniques. technique by running samples into an environment monitoring...
Abstract The adoption of e -voting in several countries poses certain challenges, which are very similar when electronic means applied to any activities, such as -governance or -commerce. Therefore, some people due economics, politics social reasons expect the use will facilitate and solve previous election’s problem. Unfortunately, most complex difficult practical implementation with distinct problems depends on particular condition culture. One essential factor concerning related privacy...
Along with the development of Windows operating system, browser applications to surf internet are also growing rapidly. The most widely used browsers today Google Chrome and Mozilla Firefox. Both have a username password management feature that makes users login website easily, but saving usernames passwords in is quite dangerous because stored data can be hacked using brute force attacks or read through program. One way get use program Firefox from computer's internal storage then show...
Smart Village di Desa Lengkong merupakan upaya terintegrasi untuk memfasilitasi agenda pembangunan daerah mulai level paling bawah yaitu desa. Salah satu sub-program dari ini adalah digitalisasi aktivitas usaha melalui peningkatan kompetensi perempuan pelaku Usaha Mikro, Kecil dan Menengah (UMKM) menuju online commerce wilayah Lengkong. Persaingan saat membutuhkan keterampilan baik dalam pemasaran produk, manajemen usaha, pengemasan produk yang menarik, pelayanan terbaik sehingga membuat...
With the rapid pace of development and change in mobile device technology Android versions, malware has emerged become a focus current research.Subsequently, security privacy have one main issues android malware.Therefore, it is essential to understand behavior order conceive an effective technique detection analysis.This article presents comprehensive study regarding platform, its features code also discusses result from previous studies support forward-looking study.
Kepadatan trafik data pada jaringan menyebabkan timbulnya kemacetan atau congestion lalu lintas data. Jika terjadi di internet publik, kondisi ini akan mengganggu kenyamanan pengguna. Seringkali kepadatan disebabkan oleh pengguna yang melakukan pengunduhan dalam jumlah besar. Solusi sering digunakan untuk mengurangi adalah dengan memperbesar bandwidth menggunakan metode seperti traffic policing serta queue management. Permasalahannya, solusi sulit diterapkan organisasi skala kecil sekolah...
Pondok Pesantren Miftahul Falah merupakan pondok pesantren yang berlokasi di Jl. Gedebage Selatan No.115, Kel.Derwati Kec.Rancasari, Bandung, Jawa Barat, menjadi sebuah lembaga resmi bernama Yayasan Pendidikan Islam Falah. Dalam pengembangannya hingga saat ini, YPI telah mendirikan Putra Putri, Majlis Ta’lim, Madrasah Diniyah, Ibtidaiyah, Tsanawiyah dan Aliyah. Pengabdian masyarakat ini adalah seri ketiga pertama, tim PKM Telkom University melakukan kegiatan dengan tema SDGs Pekerjaan Layak...
Software defined network (SDN) is becoming more and popular due to its feature such as programming control, centralize monitoring, fine-grained flexibility, multitenant support scalability. Problems with the previous architecture called traditional like device configuration process done one by one, decentralize on there are still problem for enforcement tenant, tenants cannot manage their own without being disturbed other tenants. This study aims perform slicing SDN enforce isolation between...
Pesantren dalam perkembangannya menjadi salah satu pilar struktur pendidikan Indonesia. Tidak hanya mengajarkan agama, pesantren juga umum dan membentuk karakter santri agar siap menghadapi tantangan setelah lulus. Karena hal inilah tujuan bagi banyak orang tua sebagai tempat untuk anaknya bersekolah. Namun bencana Pandemi Covid-19 telah mengubah preferensi tersebut karena kekhawatiran terhadap penyebaran virus. Hal ini berdampak pada kondisi keuangan yang kebanyakan bergantung iuran santri....
The current level of technological development is very rapid. most prominent example the use websites in industry and government environments. website provides convenience supporting ongoing business processes can assist work solving problems that occur an organization. In using website, course, a server needed to process data requests or provide information users. XYZ Faculty at University has virtualxyz which contains used support academic administrative activities. However, technology...