Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–2 dari 2 artikel
CyberBERT: A Semantic Search Framework for Security Terminologies Using Transformer Models
Sinaga, Rudolf
; Frangky
Journal of Information Technology and Computer Science
Vol 1
, No 4
(2025)
: The rapid expansion of cybersecurity standards and threat intelligence frameworks has led to significant semantic fragmentation among security terminologies, hindering effective information retrieval and interoperability across systems. Traditional keyword-based search approaches are inadequate for capturing the contextual meaning of security terms, particularly within formal frameworks such as NIST, MITRE ATT&CK, and CWE. This study addresses this challenge by proposing CyberBERT, a trans...
Sumber Asli
Google Scholar
DOI
A Comprehensive Study of Ethical Frameworks, Privacy Concerns, and Technological Implications for Secure Distributed Systems
Sinaga, Rudolf
; Frangky Frangky
Systematic Literature Review Journal
Vol 1
, No 4
(2025)
This systematic literature review examines the philosophy of science approaches to user security in distributed devices, such as IoT and Federated Learning. The review was conducted in response to the exponential growth of connected devices and the increasing security threats, including cyberattacks, data breaches, and unauthorized access. As distributed systems become more complex, traditional security approaches, such as cryptography and differential privacy, are often insufficient to address...
Sumber Asli
Google Scholar
DOI