Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–3 dari 3 artikel
Evaluasi Kinerja AI berbasis Recurrent Neural Network (RNN) dalam Mengidentifikasi Ancaman Phising pada URL Website
Bridge : Jurnal Publikasi Sistem Informasi dan Telekomunikasi
Vol 3
, No 3
(2025)
Phishing is an evolving form of cybercrime that targets users' sensitive information through URL manipulation. Conventional detection methods such as blacklists and signature-based approaches have become increasingly inadequate in addressing the dynamic variations of modern phishing attacks. This study evaluates the effectiveness of Recurrent Neural Network (RNN) variants, such Long Short-Term Memory (LSTM), Bidirectional LSTM (Bi-LSTM), and Gated Recurrent Unit (GRU), in detecting phishing thre...
Sumber Asli
Google Scholar
DOI
Penggunaan User Acceptance Testing (UAT) Pada Pengujian Sistem Informasi Pengelolaan Keuangan Dan Inventaris Barang
Aliyah Aliyah
; Nahrun Hartono
; Asrul Azhari Muin
Switch : Jurnal Sains dan Teknologi Informasi
Vol 3
, No 2
(2025)
Software testing is a crucial stage in the development of information systems to ensure that applications can function according to user needs. System feasibility testing using UAT is intended to ensure that the system meets the functional requirements specified by the users. This study aims to apply UAT to a financial and inventory management information system used to manage various operational needs of the company, such as inventory recording, expense and income reporting, and employee wages....
Sumber Asli
Google Scholar
DOI
Analisis Sentimen Twitter terhadap Tren Penyebaran Informasi Pelaku Kejahatan Menggunakan Algoritma Naives Bayes
Bridge : Jurnal Publikasi Sistem Informasi dan Telekomunikasi
Vol 2
, No 2
(2024)
In the rapidly developing digital era, social media such as Twitter has become part of everyday life and facilitates the rapid dissemination of information, including information about criminals. This research aims to analyze public sentiment towards information about criminals spread on Twitter using the Naive Bayes algorithm. This algorithm was chosen because of its simplicity and effectiveness in text classification. Data was collected through a crawling process from Twitter, followed by a pr...
Sumber Asli
Google Scholar
DOI