p-Index From 2021 - 2026
9.638
P-Index
This Author published in this journals
All Journal IAES International Journal of Artificial Intelligence (IJ-AI) Bulletin of Electrical Engineering and Informatics Jurnal Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Edukasi dan Penelitian Informatika (JEPIN) Sistemasi: Jurnal Sistem Informasi Jurnal ELTIKOM : Jurnal Teknik Elektro, Teknologi Informasi dan Komputer JOIV : International Journal on Informatics Visualization Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Jurnal Pendidikan UNIGA Jurnal Ilmiah Universitas Batanghari Jambi INOVTEK Polbeng - Seri Informatika IJIS - Indonesian Journal On Information System Sebatik ILKOM Jurnal Ilmiah INTECOMS: Journal of Information Technology and Computer Science Jiko (Jurnal Informatika dan komputer) IJISTECH (International Journal Of Information System & Technology) JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) EDUMATIC: Jurnal Pendidikan Informatika METIK JURNAL Jurnal Manajemen Informatika dan Sistem Informasi Journal of Information Systems and Informatics JATI (Jurnal Mahasiswa Teknik Informatika) PRAJA: Jurnal Ilmiah Pemerintahan Indonesian Journal of Electrical Engineering and Computer Science JTIULM (Jurnal Teknologi Informasi Universitas Lambung Mangkurat) Jurnal Informa: Jurnal Penelitian dan Pengabdian Masyarakat Pilar Teknologi : Jurnal Penelitian Ilmu-ilmu Teknik JiTEKH (Jurnal Ilmiah Teknologi Harapan) Journal of Electrical Engineering and Computer (JEECOM) IJISTECH Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Buletin Poltanesa International Research on Big-data and Computer Technology (IRobot) Bulletin of Computer Science Research Journal of Applied Sciences, Management and Engineering Technology (JASMET) Journal of Information Technology (JIfoTech) Jurnal Informatika Teknologi dan Sains (Jinteks) JAIA - Journal of Artificial Intelligence and Applications Nusantara of Engineering (NOE) Jurnal Bangkit Indonesia Jikom: Jurnal Informatika dan Komputer Journal of Informatics, Electrical and Electronics Engineering SmartComp Jurnal Informatika Polinema (JIP) TECHNOVATAR Intechno Journal : Information Technology Journal Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi Teknologi : Jurnal Ilmiah Sistem Informasi
Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Journal of Information Technology (JIfoTech)

Penerapan Kombinasi Algoritma Caesar Cipher pada Block Acak dan Cipher Transposisi Dalam Mengamankan Pesan mahmuda saputra; Alva Hendi Muhammad
Journal of Information Technology Vol 1 No 1 (2021): Journal of Information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v1i1.235

Abstract

The developments in technology for using security of information are still a threat to every party in processing and transaction confidentiality of messages sent received by users. In this study, the authors carried out a process of learning in terms of classical security with a Caesarean algorithm model with technical support for random blocks of messages and the use of ciphertexts in password transposition. This is to see how the flow can be controlled in describing a message to be conveyed to the required destination. This process is invincible with a few simple experiments, in order to achieve the desired results. Some of the research results carried out in this study include (1) the existence of a process in using the Caesarean cipher cryptographic algorithm, (2) For learning in an information or message that will be sent every time it is received, (3) Each stage of the Caesarean Cipher algorithm is very useful for exploring a messages with a more secure yahoo combination. (4) Can carry out a combination process with random block techniques and transposition ciphers.
Modifikasi Algoritma Kriptografi Caesar Chiper pada Deretan Simbol dan Huruf di Smarphone dan Laptop Prima Giri Pamungkas; Alva Hendi Muhammad
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.234

Abstract

Perkembangan dalam dunia teknologi informasi memanfaatkan teknologi komputer menjadikan salah satu pilihan dalam melakukan berbagai hal yang terdapat di dalamnya dapat berupa aplikasi, sms atapun sistem pegamanan data yang menjaga keamanan dan kerahasiaan data informasi dalam ilmu pengembangan seperti kriptografi. Pada penerapan yang di lakukan tidak dari satu teknik keamanan saja melainkan dapat dilakukan dengan bebagai kombinasi ataupun modifikasi dalam keamanan data dan informasi. Konsep utama pada kriptografi yakni enkripsi dan dekripsi. Sebuah pesan , informasi ataupun data yang di enkripsi agar orang yang tidak berhak untuk membaca pesan tersebut tidak akan dapat membacanya. Dari perkembangan berbagai metode penggunaan kriptografi dapat sering kali di pecahkan dan di selesaikan oleh pihak lain yang tidak berhak di karenakan kunci dari informasi pesan data tersebut tidak sulit memecahkannya. Dalam tulisan yang di buat ini penulis memodifikasi metode Caesar chiper menggunakan beberapa symbol dan angka sehingga menghasilkan pola dengan beberapa tahap metode.
Identifikasi Malware pada Android menggunakan Algoritma K-Nearest Neighbor Nadya Chitayae; Alva Hendi Muhammad
Journal of Information Technology Vol 3 No 2 (2023): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v3i2.752

Abstract

Not a few people abuse technology to commit crimes or what is called a cybercrime. One form of cybercrime is a malware or malicious software attacks. It is necessary to detect malware attacks so that users can find out whether the data comes from the internet or whether an Android application is safe from inserting malware or not. Malware is quite difficult to classify and differentiate directly; therefore, we need a way to classify good websites and malicious websites. This study uses the K-Nearest Neighbor method to classify android application malware. This study uses Android Malware/Benign Permissions data in the form of CSV files obtained from Kaggle.com. The results showed that malware classification and not malware in the android application permit could be done well using the K-Nearest Neighbor algorithm, which produces an accuracy of 77%. Classification of malware and not malware is better done by combining the K-Nearest Neighbor method with feature selection, which increases the accuracy value from 44% to 77%.
Co-Authors Abdul latif Adhien Kenya Estetikha Aditama, Galih Agung Harimurti, Agung Agus Purwanto Ahmad Yusuf Alif Syaiful Huda Ananda Fikri Akbar Andi Sunyoto Anggit Dwi Hartanto Anggrainy, Shynta Eza Annisa Hestiningtyas Apriadi, Frans Nilwan Arief Rahman Hakim Arif Baktiar Ariningsih, Puji Arsad Arta Perdana, Bagus Gede Asro Nasiri Asro Nasiri A’yuni, Ashlih Qurota Baiq Yulia Fitriyani Bambang Soedijono Bambang Soedijono W.A Bambang Soedijono W.A Bambang Soedijono, Bambang Bernadhed, Bernadhed Chaedar Fatach, Muhamad Reza Danu Prawira Utama Dhani Ariatmanto DHANI ARIATMANTO Diamanta, David Eka Sakti, Putra Utama Eko Pramono Ema Utami Fauzi, Moch Farid Fitriyani, Baiq Yulia Hanafi Hanafi Hanafi Hanafi Harahap, Muhammad Sya'ban Haris, Ruby Hasan, Nurul Rahmawati Hasibuan, M. Rivai Hery Priandoko Hewen, Maria Beliti Ilham Setya Budi Irawan, Hafizhan Irawan, Ridwan Dwi Irwan Oyong Jangkung Tri Nygroho Jeki Kuswanto Joko Dwi Santoso Juslan, Wulandari kurniawan, Ade Kurniawan Kusnawi Kusnawi Kusrini Kusrini Kusrini Kusrini Kusrini, K Kusrini, Kusrini Leo, Donatus Lubna Lubna Malik, Husni Hidayat Maradona, Maradona Muh Adha Muhamad Rodi Muhammad Husein Budiraharjo Muhammad Imam Munandar Muhartini, Sitti Muktafin, Elik Hari Nadya Chitayae Nasiri, Asro Novel Adil Dwijaksana Nugroho, Hanantyo Sri Nur Aini Nur Aziz Nugroho Prasetya, Bismar Rifki wahyu Prasetya, Rendra Prima Giri Pamungkas Raynold, Raynold Razaq, Thata Authar Richki Hardi Rifqi Anugrah Robert Marco, Robert Rosady, Melinne Maldini Saputra, Mahmuda Setiajid, Bayu Simanjuntak, Nurcahaya Sofian Dwi Hadiwinata Suparyati Suparyati Suseno, Hari Budhi Taryoko, Taryoko TONNY HIDAYAT Ula, M. Izul Verawati, Ike Wahyunia Ningsih Syam Widodo, Cynthia Wiwi Widayani, Wiwi Yana Hendriana Yossy Ariyanto Zakiri, Hasani Zitnaa Dhiaaul Kusnaa Washilatul Arba'ah Zitnaa Dhiaaul KWA Zubaedi, Umam Faqih