p-Index From 2020 - 2025
14.807
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering JURNAL SISTEM INFORMASI BISNIS Techno.Com: Jurnal Teknologi Informasi TELKOMNIKA (Telecommunication Computing Electronics and Control) Jurnal Informatika Jurnal Sarjana Teknik Informatika PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic CommIT (Communication & Information Technology) Jurnal Teknologi Informasi dan Ilmu Komputer Telematika Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika Scientific Journal of Informatics Seminar Nasional Informatika (SEMNASIF) ELINVO (Electronics, Informatics, and Vocational Education) Annual Research Seminar JURNAL PENGABDIAN KEPADA MASYARAKAT Proceeding SENDI_U Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika Register: Jurnal Ilmiah Teknologi Sistem Informasi KLIK (Kumpulan jurnaL Ilmu Komputer) (e-Journal) Edu Komputika Journal Jurnal Teknologi dan Sistem Komputer Jurnal Pengabdian UntukMu NegeRI Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SISFOTENIKA Jurnal Teknik Komputer AMIK BSI Jurnal Khatulistiwa Informatika Journal of Information Technology and Computer Science (JOINTECS) Jurnal Ilmiah FIFO Emerging Science Journal Bina Insani ICT Journal JURNAL MEDIA INFORMATIKA BUDIDARMA Jurnal Penelitian Pendidikan IPA (JPPIPA) JIEET (Journal of Information Engineering and Educational Technology) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Insect (Informatics and Security): Jurnal Teknik Informatika JITK (Jurnal Ilmu Pengetahuan dan Komputer) METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) Query : Jurnal Sistem Informasi CYBERNETICS Krea-TIF: Jurnal Teknik Informatika IJID (International Journal on Informatics for Development) J-SAKTI (Jurnal Sains Komputer dan Informatika) JURIKOM (Jurnal Riset Komputer) Edumaspul: Jurnal Pendidikan Jurnal Pemberdayaan: Publikasi Hasil Pengabdian Kepada Masyarakat JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Jurnal Mantik Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi JISKa (Jurnal Informatika Sunan Kalijaga) Jurnal Informatika dan Rekayasa Elektronik RADIAL: JuRnal PerADaban SaIns RekAyasan dan TeknoLogi Mobile and Forensics Jurnal Pengabdian Masyarakat Bumi Raflesia Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Jurnal Repositor JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Bubungan Tinggi: Jurnal Pengabdian Masyarakat Edunesia : jurnal Ilmiah Pendidikan Reswara: Jurnal Pengabdian Kepada Masyarakat Jurnal Teknik Informatika (JUTIF) Jumat Informatika: Jurnal Pengabdian Masyarakat Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) J-SAKTI (Jurnal Sains Komputer dan Informatika) Techno JOINCS (Journal of Informatics, Network, and Computer Science) Insand Comtech : Information Science and Computer Technology Journal Jurnal Pengabdian Informatika (JUPITA) Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Innovation, Technology, and Entrepreneurship Journal BACA: Jurnal Dokumentasi dan Informasi RADIAL: Jurnal Peradaban Sains, Rekayasa dan Teknologi
Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control

Clustering Majors for New Students at Vocational High School Muhammadiyah 3 Yogyakarta Using Fuzzy C-Means Az-Zahra, Rifqi Rahmatika; Umar, Rusydi; Fadlil, Abdul
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (283.811 KB) | DOI: 10.22219/kinetik.v3i4.642

Abstract

The development of the era demands quality human resources. For that need to be equipped with the knowledge and skills to be ready to compete in the world of work. Vocational High School has many skills programs. Examples of skills programs in Vocational High School are Computer Network Engineering, Audio and Video Engineering, Mechanical Engineering, Building, Drawing Techniques, Motorcycle Engineering, Installation and Power Engineering, systems that can assist in the decision-making process of prospective students. The grouping system will be created using the Fuzzy C-Means method. Grouping majors using fuzzy c-means algorithm is expected to help prospective students choose majors from the many majors that exist. This is done so that prospective students do not experience difficulties in learning activities, can develop optimally and is expected to work in accordance with the expertise that has been owned, so that ultimately can improve the quality of output and outcome of vocational education. The results obtained in this study in the form of data grouped based on 3 clusters, so that prospective students can choose the majors in accordance with the selected cluster.
Acquisition of Email Service Based Android Using NIST Umar, Rusydi; Riadi, Imam; Muthohirin, Bashor Fauzan
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1004.832 KB) | DOI: 10.22219/kinetik.v3i4.637

Abstract

Email is one of the results of the development of information and communication technology. Email is widely used to exchange information by sending and receiving data, such as document files, images, correspondence and others. With the development of technology and information causing crimes in communicating also growing, the perpetrators of cyber crime commonly referred to as cybercrime. Any crime committed by cybercrime will surely leave the evidence, in this study will make the acquisition of android-based email using the method of national institute of standards and technology (NIST). The results obtained IP address of the senders email header as digital evidence.
Acquisition of Email Service Based Android Using NIST Rusydi Umar; Imam Riadi; Bashor Fauzan Muthohirin
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1004.832 KB) | DOI: 10.22219/kinetik.v3i3.637

Abstract

Email is one of the results of the development of information and communication technology. Email is widely used to exchange information by sending and receiving data, such as document files, images, correspondence and others. With the development of technology and information causing crimes in communicating also growing, the perpetrators of cyber crime commonly referred to as cybercrime. Any crime committed by cybercrime will surely leave the evidence, in this study will make the acquisition of android-based email using the method of national institute of standards and technology (NIST). The results obtained IP address of the sender's email header as digital evidence.
Clustering Majors for New Students at Vocational High School Muhammadiyah 3 Yogyakarta Using Fuzzy C-Means Rifqi Rahmatika Az-Zahra; Rusydi Umar; Abdul Fadlil
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (283.811 KB) | DOI: 10.22219/kinetik.v3i3.642

Abstract

The development of the era demands quality human resources. For that need to be equipped with the knowledge and skills to be ready to compete in the world of work. Vocational High School has many skills programs. Examples of skills programs in Vocational High School are Computer Network Engineering, Audio and Video Engineering, Mechanical Engineering, Building, Drawing Techniques, Motorcycle Engineering, Installation and Power Engineering, systems that can assist in the decision-making process of prospective students. The grouping system will be created using the Fuzzy C-Means method. Grouping majors using fuzzy c-means algorithm is expected to help prospective students choose majors from the many majors that exist. This is done so that prospective students do not experience difficulties in learning activities, can develop optimally and is expected to work in accordance with the expertise that has been owned, so that ultimately can improve the quality of output and outcome of vocational education. The results obtained in this study in the form of data grouped based on 3 clusters, so that prospective students can choose the majors in accordance with the selected cluster.
Network Forensics Against Ryuk Ransomware Using Trigger, Acquire, Analysis, Report, and Action (TAARA) Method Ridho Surya Kusuma; Rusydi Umar; Imam Riadi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 6, No. 2, May 2021
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v6i2.1225

Abstract

This study aims to reconstruct an attack event and analyze the source of viral infection based on network traffic logs so that the information obtained can be used for a new reference in the security system. Recent attacks on computer network systems cannot be easily detected, as cybercrime has used a variant of the Ryuk Ransomware virus to penetrate security systems, encrypt drives, and computer network resources. This virus is very destructive and has an effective design with a file size of about 200,487 Bytes so it does not look suspicious. The research steps are done through Trigger, Acquire, Analysis, Report, and Action (TAARA). The forensic tools used to obtain log data are Wireshark, NetworkMiner, and TCPDUMP. Based on the results of forensic data obtained include a timestamp, source of the attack, IP address, MAC address, hash signature sha256, internet protocol, and the process of infection. Based on the data obtained in this study has been by the expected objectives.
Co-Authors Aang Anwarudin Abdul Fadlil Abdul Fadlil Abdul Fadlil Abdul Hadi Abdullah Hanif Abdullah Hanif Abe, Tuska Achmad Dito Achmad Nugrahantoro Agus Prasetyo Marsaid Ahmad Fajar Sidiq Ahmad Ikrom Ahmad Ridwan Ahmadi, Ahwan Ahnafi, Muhammad Ghazi Aini, Fadhilah Dhinur Aji Nugroho Alameka, Faza Alameka, Faza Aldi Rifki Andriawan Alfiansyah Imanda Putra Alfiansyah Imanda Putra Alfian Anak Agung Gede Sugianthara Andhy Sulistyo Anggara, Rio Anton Yudhana Anton Yudhana Ardi Pujiyanta Ardiansyah, Ricy Arfiani Nur Khusna Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arief Setyo Nugroho Arif Budiman Arif Budiman Arif Wirawan Muhammad Arif Wirawan Muhammad Arizona Firdonsyah Asy’am, Muhammad Hasfar Aulyah Zakilah Ifani Az-Zahra, Rifqi Rahmatika Bashor Fauzan Muthohirin Bella Okta Sari Miranda Bintang, Rauhulloh Noor Busthomi, Iqbal Bustomi, Iqbal Deni Murdiani Dewi Astria Faroek Dewi Estri Jayanti Dewi Estri Jayanti Dewi Sahara Dewi Sahara Nasution Dwi Susanto Dzakwan, M Sabiq E, Ermin Eko Handoyo Elfaditiya Wardaya Ermin Ermin Fadhilah Dhinur Aini Fadlil, Abdu Fadlillah Mukti Ayudewi Fahmi Anwar Faiz Isnan Abdurrachman Faizin Ridho Fathia Irbati Ammatulloh Fauzan, Fauzan Faza Alameka Faza Alameka Fijaya Dwi Bimasakti Firmansyah Firmansyah Firmansyah Firmansyah Firmansyah Yasin Fitrah Juliansyah Fitrah Juliansyah Fitrah Juliansyah Fitrah Gustafi, Muhammad Fauzan Gustafi, Muhammad Fauzan H, Hermansa Hadi, Wisnu Setiawan Hafidz, Muhammad Nasir Hanif, Abdullah Hanif, Kharis Hudaiby Helmiyah, Siti Herman Herman Herman Herman Herman Herman Yuliansyah, Herman Hermansa Imam Mahfudl Nasrulloh Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Indra Gunawan Iqbal Busthomi Iqbal Busthomi Irjayana, Rizky Caesar Ismail Adji Nugroho Izzan Julda D.E Purwadi Putra Jaka Dernata Jefree Fahana Kencana, Nagala Wangsa Kgs Muhammad Rizky Alditra Utama Kharismajati, Gema Khoirul Anam Dahlan Kiagus Muhammad Rizky Aditra Utama Kusuma, Ridho Surya Lisna Zahrotun Lukman Nurhakim Maftukhah, Ainin Mardhiatul Ihsaniah Maulana, Irvan Maya Anggriani Miladiah Miladiah Miladiah, Miladiah Moch. Nasheh Annafii Mochammad Imron Awalludin Muammar Muammar, Muammar Muhajir Yunus Muhammad Abdul Aziz Muhammad Abdul Aziz Muhammad Aziz Muhammad Aziz Muhammad Fauzan Gustafi Muhammad Fauzan Gustafi Muhammad Ihya Aulia Elfatiha Muhammad Irwan Syahib Muhammad Irwan Syahib Muhammad Jundullah Muhammad Noor Fadillah Muhammad Noor Fadillah Muhammad Nur Ardhiansyah Muhammad Nur Faiz Muis, Alwas Muntiari, Novita Ranti Murinto Mustafa Mustafa Muzakkir Pangri N, Musri Iskandar Nahdli, Muhammad Fahmi Mubarok Nasrulloh, Imam Mahfudl Ockhy Jey Fhiter Wassalam Panggah Widiandana Periyanto, Ari Peryanto, Ari Prasetyo Hari Prabowo prayudi, Andi Purwanto Purwanto Purwono Purwono P Purwono, Purwono Putra, Alfiansyah Imanda Putra, Fajar R. B Putra, Fijaya Dwi Bima Sakti Putri Silmina, Esi Resmi - Aini Rezki Ramdhani Rezki Rezki Ridho Surya Kusuma Rifqi Rahmatika Az-Zahra Saad, Saleh Khalifah Sabarudin Saputra Sahiruddin Sahiruddin Sakti, Fijaya Bima Dwi Saleh khalifa saad Sarjimin Sarjimin Sarmin, Sarmini Septa, Frandika Siswanto, Anwar Siti Helmiyah Siti Helmiyah Sonny Abriantoro Wicaksono Sri Rahayu Astari Sri Rahayu Astari Subandi, Rio Subhan Subhan Sugandi, Andi Sunardi Sunardi Sunardi, Sunardi Syahib, Muhammad Irwan Tarisno Amijoyo Tella, Fitriyani Tole Sutikno Tri Lestari Tri Lestari Tri Lestari Utama, Kgs Muhammad Rizky Alditra Utama, Kiagus Muhammad Rizky Aditra Veithzal Rivai Zainal Wahyudin, Widya Cholid Wala, Jihan Wasito Sukarno Wicaksono, Sonny Abriantoro Winoto, Sakti Yuminah yuminah Yuminah, Yuminah