Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–10 dari 60 artikel
Implementasi Website Deteksi Phishing Link Menggunakan SSL Validation dan URL Scoring
Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi
Vol 4
, No 1
(2026)
The rapid expansion of internet usage has led to a significant increase in cybersecurity threats, particularly phishing attacks delivered through malicious links. Phishing links are designed to imitate legitimate websites in order to deceive users and steal sensitive information. This study presents the implementation of a phishing link detection website based on SSL validation and URL scoring mechanisms. The proposed system integrates heuristic-based URL analysis with real-time SSL certificate...
Sumber Asli
Google Scholar
DOI
Analisis Probabilitas Pencapaian Target Produksi pada UMKM Menggunakan Simulasi Monte Carlo
Jupiter: Publikasi Ilmu Keteknikan Industri, Teknik Elektro dan Informatika
Vol 4
, No 1
(2026)
Micro, Small, and Medium Enterprises (MSMEs) play a vital role in driving economic growth; however, their production activities frequently face uncertainty in achieving predetermined targets. Such uncertainty arises from fluctuating market demand, delays in raw material supply, labor limitations, variations in processing time, and other technical constraints. Conventional deterministic production planning methods often fail to capture these real-world risks and variations, leading to less accura...
Sumber Asli
Google Scholar
DOI
Design Of A Transaction Data Security System In A Bouqet Sales Application Using An Aes Algorithm
Saturnus: Jurnal Teknologi dan Sistem Informasi
Vol 4
, No 1
(2026)
This research presents the development of a transaction data protection mechanism for a bouquet sales application by utilizing the Advanced Encryption Standard (AES) algorithm. The rapid growth of digital commerce has led to an increase in online transactions, which in turn raises serious concerns regarding the security of sensitive transaction data. Information such as customer identities, order details, delivery addresses, and payment data are vulnerable to unauthorized access, data leakage, a...
Sumber Asli
Google Scholar
DOI
Analisis Perbedaan Volume Lalu Lintas Sepeda Motor pada Pagi dan Sore sebagai Indikator Kinerja Luas Jalan Berdasarkan PKJI 2014
Konstruksi: Publikasi Ilmu Teknik, Perencanaan Tata Ruang dan Teknik Sipil
Vol 4
, No 1
(2026)
This study aims to analyze the differences in motorcycle traffic flow (Q) during the morning and afternoon peak hours as an indicator of roadway operational performance, referring to the Indonesian Road Capacity Guidelines (PKJI) 2014, with a case study on Mawar Street–Wijaya Kusuma Street, Jember Regency. The research data were obtained from 12 observation points through traffic surveys that recorded motorcycle traffic flow in vehicles per hour (veh/h). The analytical methods used include descr...
Sumber Asli
Google Scholar
DOI
Perbandingan Waktu Pemecahan Password Menggunakan Algoritma Hash MD5, SHA-256, dan SHA-512 pada Serangan Brute Force
Nur Bainatun Nisa
; Noni Fauzia Rahmadani
; Aulia Kartika Dewi
; Luftia Rahma Nasution
; Dzilhulaifa Siregara
; Rifdah Syahputri
; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Vol 4
, No 1
(2026)
Password security is a critical component in protecting information systems, as passwords are often the primary target of various attacks, particularly brute force attacks. A brute force attack works by systematically attempting all possible character combinations until the correct password corresponding to a stored hash value is found. Therefore, the choice of an appropriate hash algorithm plays a significant role in determining a system’s resistance to such attacks. This study aims to analyze...
Sumber Asli
Google Scholar
DOI
Keamanan Data melalui Enkripsi Studi Kasus dengan Algoritma RSA
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Vol 4
, No 1
(2026)
Data security is a critical aspect in the digital era due to the increasing exchange of sensitive information through electronic media. One widely used approach to protect data confidentiality is cryptography, particularly asymmetric encryption algorithms. This study aims to analyze the implementation of the Rivest–Shamir–Adleman (RSA) algorithm as a data security mechanism through an encryption and decryption process. The research method used is an experimental approach by implementing the RSA...
Sumber Asli
Google Scholar
DOI
Pembatasan Laju Adaptif Berbasis Verifiable Delay Function untuk Mitigasi Penyalahgunaan API pada Gateway Edge Ringan
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Vol 4
, No 1
(2026)
API abuse on lightweight edge gateways has intensified as microservice-based services expose many REST endpoints to heterogeneous clients. Conventional per-identity rate limiting, such as static token buckets, is frequently bypassed through distributed bots and identity rotation, while legitimate burst traffic may be rejected and degrade user experience. This study proposes Adaptive Rate Limiting with Verifiable Delay Functions (ARL-VDF), which couples a lightweight risk score with selective VDF...
Sumber Asli
Google Scholar
DOI
Implementasi Algoritma Caesar Cipher untuk Enkripsi dan Dekripsi Pesan
Siti Fadiyah Nabila
; Maisyarah Maisyarah
; Zahara Vonna
; Salsabila Arifa Hasibuan
; Silfia Rahmadani Sitorus
; Aninda Evioni
; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Vol 4
, No 1
(2026)
Information security is an essential aspect of digital communication, particularly in the exchange of text-based messages through open networks. Messages transmitted without protection are vulnerable to interception and unauthorized modification. One classical cryptographic technique that remains relevant as a foundational learning tool is the Caesar Cipher algorithm. This study aims to implement the Caesar Cipher algorithm for message encryption and decryption and to analyze its effectiveness a...
Sumber Asli
Google Scholar
DOI
Implementasi Sistem Temu Balik Informasi Data Cryptocurrency Berbasis Atribut Menggunakan Vector Space Model (VSM)
Bridge : Jurnal Publikasi Sistem Informasi dan Telekomunikasi
Vol 3
, No 4
(2025)
This study aims to implement an information retrieval system for cryptocurrency data using an attribute-based approach integrated with the Vector Space Model (VSM). The primary objective is to develop a system capable of retrieving the most relevant digital asset information according to specific search attributes, including positive sentiment, price fluctuation, and prediction confidence level. The research adopts a descriptive qualitative method combined with an experimental approach to evalua...
Sumber Asli
Google Scholar
DOI
Integrating Indigenous Spiritual Knowledge into Environmental Ethics: A Philosophical Inquiry into Ancestral Worldviews and Ecological Stewardship
International Journal of Religious Education and Philosophy
Vol 2
, No 3
(2025)
This study explores the integration of indigenous spiritual knowledge into modern environmental ethics, focusing on the role of traditional ecological wisdom, spiritual cosmology, and stewardship practices in promoting sustainability. Indigenous worldviews often emphasize the interconnectedness between humans, the spirit world, and nature, viewing these relationships as sacred and reciprocal. This paper highlights the philosophical contributions of indigenous environmental ethics, which contrast...
Sumber Asli
Google Scholar
DOI