Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal E-Komtek

Phishing Website Detection Using the Decision Tree Algorithm Method Prasetyo, Stefanus Eko; Haeruddin , Haeruddin; ., Arron
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 8 No 2 (2024)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v8i2.2167

Abstract

Along with the increasing number of internet users and the rapid development of technology, cyber security threats are becoming more complex, including phishing threats that often cause major losses such as loss of individual or corporate privacy. This study aims to identify phishing websites effectively through the application of machine learning algorithms. The dataset used in this study comes from the UCI learning repository developed by the University of Huddersfield. The research methodology includes the stages of problem identification, Cart algorithm collection, validation, and model evaluation. With this method, the study found that the CART algorithm was able to achieve an accuracy level of 90.5% in detecting phishing sites. These results show cyber security, especially in protecting users from phishing threats, this study is expected to contribute to improving data protection and privacy of internet users, as well as encouraging the application of machine learning technology in a more adaptive cyber security system.
The Application of Smart Contracts in Cybersecurity for Threat Detection and Response Prasetyo, Stefanus Eko; Wijaya, Gautama; ., Kennedi
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2285

Abstract

Cybersecurity is becoming an increasingly important issue in the digital era due to the rise in threats and attacks on information systems. One innovative technology with great potential to enhance cybersecurity is smart contracts. This article discusses the application of smart contracts in detecting and responding to cybersecurity threats. With their automatic, transparent, and immutable nature, smart contracts can be used to manage threat responses in real-time, improve attack detection efficiency, and minimize the risk of human error. This study also explores use cases such as secure data access management, blockchain-based anomaly detection, and incident response automation. Furthermore, implementation challenges such as scalability, interoperability, and smart contract code vulnerabilities are also addressed to provide a comprehensive overview. Through the integration of smart contracts into cybersecurity, this article concludes that this technology holds great potential to strengthen information systems' resilience against increasingly complex and dynamic threats.