Quick jump to page content
Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
Home
Current
Archives
Announcements
For Author
Ethical Guidelines
Submissions
Frequently Asked Questions (FAQ)
About
About the Journal
Editorial Team
Reviewer Team
Indexing Service
Privacy Statement
Publisher
Contact
Search
Search
Search articles for
Advanced filters
Published After
2020
2021
2022
2023
2024
2025
2026
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Published Before
2020
2021
2022
2023
2024
2025
2026
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
By Author
Search Results
Analisis dan Rekomendasi Keamanan Website Kampus X Menggunakan ISSAF
Dio Wahyu Saputra, Risqy Siwi Pradini, Mochammad Anshori
830-843
Views:
379, PDF
PDF Download:
282,
,
Optimasi Access Control List (ACL) Jaringan dalam Menangkal Akses Ilegal Jaringan Cisco
Sulthan Cendikia Arif, Untung Surapati, Yuma Akbar, Aditya Zakaria Hidayat
1806-1816
Views:
169, PDF
PDF Download:
89,
,
Analisis Konfigurasi Tunnel IPv6, Auto Tunnel, dan ISATAP dalam Pembangunan Infrastruktur Jaringan
Yuma Akbar, Kiki Setiawan, Raisah Fajri Aula, Muqorrobin Aimar
3107-3124
Views:
410, PDF
PDF Download:
185,
,
Analisis Efektivitas Keamanan Jaringan Layer 2: Port Security, VLAN Hopping, DHCP Snooping
Muhammad Dzaky Nurfaishal, Yuma Akbar
3278-3290
Views:
692, PDF
PDF Download:
381,
,
OPTIMALISASI KINERJA JARINGAN VPN DENGAN METODE DMVPN
Jodi Juliansah, Yuma Akbar
1788-1798
Views:
256, PDF
PDF Download:
184,
,
Analisis Kelemahan Fitur Cloud pada Access Point Berbasis Cloud
Kaiva Alby Aufinanta
10-18
Views:
12, PDF
PDF Download:
5,
,
ANALISIS SERANGAN CYBER MENGGUNAKAN HONEYPOT PADA WEB BERBASIS CLOUD
Bayu Setyanto Pamungkas, Irwan Sembiring
1284-1295
Views:
588, PDF
PDF Download:
428,
,
IMPLEMENTASI FAILOVER VPN KANTOR PUSAT DAN CABANG MENGGUNAKAN TEKNOLOGI SDWAN DENGAN STRATEGI BEST QUALITY
Sahrul Hidayat, Yuma Akbar
1598-1608
Views:
490, PDF
PDF Download:
347,
,
Perbandingan Kinerja Model Pre-Trained CNN (VGG16, RESNET, dan INCEPTIONV3) untuk Aplikasi Pengenalan Wajah pada Sistem Absensi Karyawan
Muhammad Khatama Insani, Dwi Budi Santoso
2612-2622
Views:
565, PDF
PDF Download:
714,
,
1 - 9 of 9 items