p-Index From 2021 - 2026
7.298
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering International Journal of Reconfigurable and Embedded Systems (IJRES) Transmisi: Jurnal Ilmiah Teknik Elektro JURNAL SISTEM INFORMASI BISNIS Jurnal Sistem Komputer TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Jurnal Informatika Disease Prevention and Public Health Journal Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI) Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik CommIT (Communication & Information Technology) Bulletin of Electrical Engineering and Informatics Jurnal Teknologi Jurnal sistem informasi, Teknologi informasi dan komputer Sinergi Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika International Journal of Advances in Intelligent Informatics Seminar Nasional Informatika (SEMNASIF) Jurnas Nasional Teknologi dan Sistem Informasi Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika JURNAL NASIONAL TEKNIK ELEKTRO KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Proceeding of the Electrical Engineering Computer Science and Informatics Fountain of Informatics Journal Jurnal Teknologi dan Sistem Komputer Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Jurnal Ilmiah FIFO Emerging Science Journal JIKO (Jurnal Informatika dan Komputer) Jurnal CoreIT Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA Jurnal Penelitian Pendidikan IPA (JPPIPA) MUST: Journal of Mathematics Education, Science and Technology IT JOURNAL RESEARCH AND DEVELOPMENT Al-MARSHAD: Jurnal Astronomi Islam dan Ilmu-Ilmu Berkaitan JRST (Jurnal Riset Sains dan Teknologi) JURNAL REKAYASA TEKNOLOGI INFORMASI Jurnal Informatika Universitas Pamulang ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer CYBERNETICS JURIKOM (Jurnal Riset Komputer) JUMANJI (Jurnal Masyarakat Informatika Unjani) Informatika : Jurnal Informatika, Manajemen dan Komputer Jurnal Ilmiah Mandala Education (JIME) Abdimas Umtas : Jurnal Pengabdian kepada Masyarakat Jurnal Mantik JISKa (Jurnal Informatika Sunan Kalijaga) Buletin Ilmiah Sarjana Teknik Elektro Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Genta Mulia : Jurnal Ilmiah Pendidikan Journal of Robotics and Control (JRC) Journal of Applied Engineering and Technological Science (JAETS) Indonesian Journal of Electrical Engineering and Computer Science Bubungan Tinggi: Jurnal Pengabdian Masyarakat Journal of Innovation Information Technology and Application (JINITA) Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jurnal Pengabdian Masyarakat Indonesia Jurnal Nasional Pengabdian Masyarakat Techno Jurnal Informatika: Jurnal Pengembangan IT Advance Sustainable Science, Engineering and Technology (ASSET) JOCHAC
Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Jurnal Mantik

Security Of Dynamic Domain Name System Servers Against DDOS Attacks Using IPTABLE And FAIL2BA: Security Of Dynamic Domain Name System Servers Against DDOS Attacks Using IPTABLE And FAIL2BA Ibnu Muakhori; Sunardi Sunardi; Abdul Fadlil
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (933.248 KB)

Abstract

Availability, integrity and confidentiality are the main objectives of information security and server security. These three elements are links that are interconnected in the concept of information protection.Distributed Denial of Service (DDoS) is an attack to make online services, networks and applications not available by flooding data traffic so that services is unvailable or availability aspects disrupted. This attack resulted in huge losses for institutions and companies engaged in online services and web-based applications being one of the main targets of attackers to carry out DDoS attacks. Countermeasures that take a long time and large recovery costs are a loss for the institution or company that owns the service due to loss of integrity. NDLC (Network Development Life Cycle) is a method that has stages namely analysis, design, simulation, prototyping, implementation, monitoring and management. The NDLC method used aim for the results obtained focused and detailed. Snort IDS applied on the DDNS server functions to record when there is a DDoS attack. Implemention fail2ban as realtime preventation tool on the server by configuring based on the rules applied to fail2ban. The results showed Snort IDS managed to detect DDoS attacks based on the rules applied to Snort IDS. Realtime prevention using Fail2ban successfully functions as a DDoS attack by blocking the attacker's IP Address.
Analysis of Mobile Based Activity Reporting Systems Using Usability Testing Methods and Use Questioners: Analysis of Mobile Based Activity Reporting Systems Using Usability Testing Methods and Use Questioners Wawan Darmawan; Sunardi Sunardi; Anton Yudhana
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (386.578 KB)

Abstract

Reporting is a part that must be prepared, monitored and evaluated by the leader in this case the director, organizational activities often overlap with each other and reporting activities are not well documented. The purpose of this study is to analyze the usability of the Activity Reporting System application. In this study the authors used the Usability Testing and USE Questioner methods. The level of usability can determine the extent to which an application or product can be used by users to achieve their goals and how easy it is to use the application interface. Applications with a high level of usability will usually be liked by many users. Vice versa, if the usability level of an application is low it will eventually be left by the user. This study also uses a USE Questioner that includes four parameters namely usefulness, ease of use, ease of learning and satisfaction. Each parameter has several statements that will be given to the user to assess the usability level of the spkditpdpontren application. The results of this study note that the usability value before the recommendation for improvement is 47.58% with sufficient predicate and the usability value after the display improvement recommendation is 78.27% with a good predicate. The general conclusion is that the activity reporting system can make it easy for users to find information related to activities and evaluation and financial management of reporting transparency and accountability.
Web Server Security Analysis Using The OWASP Mantra Method: Web Server Security Analysis Using The OWASP Mantra Method Bambang Subana; Abdul Fadlil; Sunardi Sunardi
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (434.86 KB)

Abstract

Higher Education has been using web-based academic information system, for all academic administration process in this academic system such as study plan, academic transcipt, lecturers and Curriculum and student data. So that required maintenance in database and system management whith well-maintained and scheduled. It is necessary to apply the system to determine the level of vulnerability in order to avoid attacks from irresponsible parties. OWASP (Open Web Application Security Project) is one of the methods for testing the web-based applications released by owasp.org. Using OWASP may indicate that authentication management, authorization and session management.The STMIK Jakarta website often has problems on the web and the loss of some important data that interferes with lectures. At the end of 2016, around September when preparing for the first semester of the Study Plan, the website experienced programmed data loss, consequently the academic system was disrupted. The STMIK Jakarta has used a web-based academic information system, for all academic administrative processes such as study plans, academic transcripts, lecturers, curriculum and student data.This system requires data base and system management. It is important to implement a security system to determine the level of vulnerability to avoid attacks from irresponsible parties. OWASP (Open Web Application Security Project) is one method for testing web-based applications released by owasp.org. The results of the research have been carried out with the results reaching around 90% management authentication, authorization, and session management not being implemented properly.
Bitcoin Price Prediction Using Long Short Term Memory (LSTM): Bitcoin Price Prediction Using Long Short Term Memory (LSTM) Ihyak Ulumuddin; Sunardi Sunardi; Abdul Fadlil
Jurnal Mantik Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.889.pp1090-1095

Abstract

Price fluctuation is a necessity in every business, including the price of Bitcoin. Therefore humans need a device or application that can assist in making predictions quickly and accurately. Deep Learning can be used to make predictions which include setting the parameters used during training, choosing the best parameters for prediction, and choosing the prediction results with the smallest error level in the actual situation. This study performs a Bitcoin price prediction using Long Short Term Memory (LSTM). This study uses quantitative calculations on the prediction results. Measurement of accuracy is done by testing the previous price (back testing) and calculating the average error using RMSE and MAPE. The method for generating predictions is LSTM as a type of Recurrent Neural Network (RNN) which has the advantage of using long-term memory in handling time series data. LSTM implementation using Python is used for price forecasting with stages starting from data collection and normalization, input and output modeling. The result of this research is a prediction of Bitcoin price with an accuracy rate of 97.48% based on the best model with input layer 2, the number of epochs 100, the number of hidden layers 100, and activation using Softmax. These price predictions can be used as a reference and consideration for traders to create trading strategies and run them automatically on the digital currency market.
Co-Authors Abd. Rasyid Syamsuri Abdul Djalil Djayali Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Achmad Dito Ahmad Azhar Kadim Ahmad Ikrom Ahmad Raditya Cahya Baswara Ahmad Syahril Mohd Nawi Aldi Bastiatul Fawait Fawait Alfian Ma’arif Alwas Muis Anggit Pamungkas Anton Yudhana Anton Yudhana Anton Yudhana Anton Yudhana Apik Rusdiarna Indra Praja Ardiansyah Ardiningtias, Syifa Riski Ardiningtias Arief Setyo Nugroho Arif Wirawan Muhammad Ariful Aziz Arizona Firdonsyah Asep Setyaji Azrul Mahfurdz Azrul Mahfurdz Azrul Mahfurdz Bambang Subana Budi Santosa Deco Aprilliansyah Denis Prayogi Denis Prayogi Dewi Sahara Dewi Sahara Nasution Dewi Soyusiawaty Doddy Teguh Yuwono Dwi Aryanto Dwi Aryanto Eko Aribowo Eko Handoyo Ermin Al Munawar Ermin Ermin Evrynda Widyasari Puspa Dewi Faqihuddin Al-anshori Fatma Nuraisyah, Fatma Fiftin Noviyanto Fijaya Dwi Bima Sakti Putra Fijaya Dwi Bima Sakti Putra Fijaya Dwi Bimasakti Firdonsyah, Arizona Fitriyani Tella Fitriyanto, Rachmad Furizal Furizal Furizal Furizal Gema Kharismajati Guguh Makbul Rahmadani Fitra H. Ahmad Hartanta, Agus Jaka Sri Hartini, Sri Haryani Alamsyah Herman Herman Herman Herman Hernawan Aji Nugroho Heru Hermawan Hikmatyar Insani Himawan I Azmi Ibnu Muakhori Ihyak Ulumuddin Iif Alfiatul Mukaromah Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Irhash Ainur Rafiq Jafri Din Janu Prasetyo januari audrey January Audrey Joko Supriyanto Joko Triyanto Kemal Thoriq Al-Azis Khoir, Syaiful Amrial Lina Handayani Luh Putu Ratna Sundari Lukman Reza Lukman Reza M Murinto M. Ihya A. Elfatih Mardhiatul Ihsaniah Miftahuddin Fahmi Mitra Adhimukti Muchamad Kurniawan Muchlas, Muchlas Muchrisal Muchrisal Muchrisal Muflih, Ghufron Zaida Muh. Hajar Akbar Muhammad Amirul Mu'min Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Kunta Biddinika Muhammad Kunta Biddinika Muhammad Nashiruddin Darajat Muhammad Nur Ardhiansyah Muhammad Sabiq Dzakwan Muhammad Sabiq Dzakwan Muntiari, Novita Ranti Murinto Murinto Musri Iskandar Nasution Muzakkir Pangri Nasirudin Nasirudin Nazuki Nazuki Nugroho, Hernawan Aji Nur Makkie Perdana Kusuma Nur Ratnawati Nuril Mustofa Pahlevi, Ryan Fitrian Panggah Widiandana Pradana Ananda Raharja Priyatno Priyatno Puji Ristianto Puriyanto, Riky Dwi Rachmad Fitriyanto Rachmad Very Ananda Saputra Raja Bidin Raja Hassan Rani Rotul Muhima Restu Prima Yudha Restu Prima Yudha Rezki Ramdhani Ricky Irawan Putra Rifkan Firdaus Rio Dwi Listianto Rio Ikhsan Alfian Rosmini Rosmini Rusydi Umar Rusydi Umar Rusydi Umar Rusydi Umar Saberi Mawi Sahiruddin Sahiruddin Saifullah, Shoffan Salsabilla Azahra Putri Saputro, Mochammad Yulianto Andi Septiyawan Rosetya Wardhana Sharipah Salwa Mohamed Son Ali Akbar Sri Rahayu Astari Sri Rahayu Astari Sri Winiarti Subrata, Arsyad Cahya Sukma Aji Supriyanto Syaiful Khoir Syed Abdullah Syed Abdullah Syifa Riski Ardiningtias Syifa'ah Setya Mawarni Syifa’ah Setya Mawarni Tole Sutikno Tomy Chandra Mahendra Tresna Yudha Prawira Tri Antoro Tristanti, Novi Ummi Syafiqoh Ummi Syafiqoh Virasanty Muslimah Wahyu S Aji Watra Arsadiando Wawan Darmawan Wijaya, Setiawan Ardi Yana Mulyana Yuniarti Lestari Yuwono Fitri Widodo