Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–6 dari 6 artikel
Implementasi Website Deteksi Phishing Link Menggunakan SSL Validation dan URL Scoring
Rusma Riansyah
; Dimas Aqila Aptanta
; Hafiz Aryanda
; Muhammad Farhan
; Ibnu Rusydi
Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi
Vol 4
, No 1
(2026)
The rapid expansion of internet usage has led to a significant increase in cybersecurity threats, particularly phishing attacks delivered through malicious links. Phishing links are designed to imitate legitimate websites in order to deceive users and steal sensitive information. This study presents the implementation of a phishing link detection website based on SSL validation and URL scoring mechanisms. The proposed system integrates heuristic-based URL analysis with real-time SSL certificate...
Sumber Asli
Google Scholar
DOI
Design Of A Transaction Data Security System In A Bouqet Sales Application Using An Aes Algorithm
Ibnu Rusydi
; Laila Ali Putri
; Maria Ulfa
Saturnus: Jurnal Teknologi dan Sistem Informasi
Vol 4
, No 1
(2026)
This research presents the development of a transaction data protection mechanism for a bouquet sales application by utilizing the Advanced Encryption Standard (AES) algorithm. The rapid growth of digital commerce has led to an increase in online transactions, which in turn raises serious concerns regarding the security of sensitive transaction data. Information such as customer identities, order details, delivery addresses, and payment data are vulnerable to unauthorized access, data leakage, a...
Sumber Asli
Google Scholar
DOI
Perbandingan Waktu Pemecahan Password Menggunakan Algoritma Hash MD5, SHA-256, dan SHA-512 pada Serangan Brute Force
Nur Bainatun Nisa
; Noni Fauzia Rahmadani
; Aulia Kartika Dewi
; Luftia Rahma Nasution
; Dzilhulaifa Siregara
; Rifdah Syahputri
; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Vol 4
, No 1
(2026)
Password security is a critical component in protecting information systems, as passwords are often the primary target of various attacks, particularly brute force attacks. A brute force attack works by systematically attempting all possible character combinations until the correct password corresponding to a stored hash value is found. Therefore, the choice of an appropriate hash algorithm plays a significant role in determining a system’s resistance to such attacks. This study aims to analyze...
Sumber Asli
Google Scholar
DOI
Keamanan Data melalui Enkripsi Studi Kasus dengan Algoritma RSA
Salsabila Putri Hati Siregar
; Nur Aisyah Pandia
; Putri Ramadani
; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Vol 4
, No 1
(2026)
Data security is a critical aspect in the digital era due to the increasing exchange of sensitive information through electronic media. One widely used approach to protect data confidentiality is cryptography, particularly asymmetric encryption algorithms. This study aims to analyze the implementation of the Rivest–Shamir–Adleman (RSA) algorithm as a data security mechanism through an encryption and decryption process. The research method used is an experimental approach by implementing the RSA...
Sumber Asli
Google Scholar
DOI
Pembatasan Laju Adaptif Berbasis Verifiable Delay Function untuk Mitigasi Penyalahgunaan API pada Gateway Edge Ringan
Diah Putri Kartikasari
; Tiara Ayu Triarta Tambak
; Agung Nugroho
; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Vol 4
, No 1
(2026)
API abuse on lightweight edge gateways has intensified as microservice-based services expose many REST endpoints to heterogeneous clients. Conventional per-identity rate limiting, such as static token buckets, is frequently bypassed through distributed bots and identity rotation, while legitimate burst traffic may be rejected and degrade user experience. This study proposes Adaptive Rate Limiting with Verifiable Delay Functions (ARL-VDF), which couples a lightweight risk score with selective VDF...
Sumber Asli
Google Scholar
DOI
Implementasi Algoritma Caesar Cipher untuk Enkripsi dan Dekripsi Pesan
Siti Fadiyah Nabila
; Maisyarah Maisyarah
; Zahara Vonna
; Salsabila Arifa Hasibuan
; Silfia Rahmadani Sitorus
; Aninda Evioni
; Ibnu Rusydi
Polygon : Jurnal Ilmu Komputer dan Ilmu Pengetahuan Alam
Vol 4
, No 1
(2026)
Information security is an essential aspect of digital communication, particularly in the exchange of text-based messages through open networks. Messages transmitted without protection are vulnerable to interception and unauthorized modification. One classical cryptographic technique that remains relevant as a foundational learning tool is the Caesar Cipher algorithm. This study aims to implement the Caesar Cipher algorithm for message encryption and decryption and to analyze its effectiveness a...
Sumber Asli
Google Scholar
DOI