Claim Missing Document
Check
Articles

Found 3 Documents
Search

Evaluation of Information Security at the XYZ Foundation Using OWASP Top 10 2021 Framework Mustafa Kamal; Muhammad Nasrullah; Rully Rosadi; Yuvens Anggito; Roy, Sujan Chandra
Journal of Advances in Information and Industrial Technology Vol. 6 No. 2 (2024): Nov
Publisher : LPPM Telkom University Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52435/jaiit.v6i2.397

Abstract

More than three billion users use the Internet in various fields, including economic, commercial, cultural, social, and governmental activities. The XYZ Foundation is a non-governmental organization that has more than one hundred thousand donors and its partners also use the Internet for their operations, including online zakat and alms transactions. Increasing the use of online transactions also increases the opportunities for cybercrime to occur. Vulnerability testing is required to observe information security in online zakat and alms transactions in the XYZ foundation. This study uses the top 10 OWASP 2021 vulnerability tests on the online zakat and alms transaction website at the XYZ foundation. The results of this research show that one aspect has a medium risk, one aspect is low, and eight aspects are very low. Based on these results, the weak aspects of online zakat and alms transactions in the XYZ foundation must be immediately improved.
Performance assessment of routing protocols for campus area emergency delay-tolerant network Roy, Sujan Chandra; Rahim, Muhammad Sajjadur; Islam, Md Ashraful
International Journal of Advances in Applied Sciences Vol 13, No 1: March 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijaas.v13.i1.pp54-62

Abstract

Handheld devices have recently become an indispensable part of our daily lives. These devices always require an end-to-end connection for proper message transmission. Message transmission will be halted if the connection fails. In this case, delay-tolerant networks (DTNs) are preferable. One of the most important applications of DTN is the transmission of emergency messages among rescue personnel in the aftermath of a disaster. Previously, we created a simulation map in the Rajshahi University (RU) campus area of Bangladesh and studied the performance of DTN routing protocols. This paper used our developed simulation map to evaluate the performance of DTN and social-based routing protocols for emergency message circulation in the RU campus area when traditional communication networks are unavailable. We conducted extensive experiments with the opportunistic network environment (ONE) simulator for evaluations. The performance analysis is based on the delivery ratio, average latency, transmission cost, and average hop count of each group when the message size and node density are changed. According to the simulation results, dLife outperforms all other routing protocols in terms of delivery ratio, while the Spray-and-Focus routing protocol outperforms all other performance metrics.
FuelGuard: Fuel Consumption Anomaly Detection and Visual Verification in Logistics Using Isolation Forest, CBIR, and OCR Auliana, Sigit; Permana, Basuki Rakhim Setya; Darip, Mochammad; Roy, Sujan Chandra
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 6 (2025): JUTIF Volume 6, Number 6, Desember 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.6.5276

Abstract

Manual fuel reporting in Indonesian logistics companies, such as PT Balaraja Distribusindoraya, often leads to inefficiency, fraud, and lack of anomaly supervision. This research aims to develop a web-based system that integrates machine learning and computer vision to monitor fuel consumption and detect anomalies in logistics fleets. The proposed system employs Isolation Forest for unsupervised anomaly detection based on fuel volume, travel distance, and fuel ratio, combined with a deep learning–based CBIR module using MobileNetV2 to validate fuel station images, and OCR to extract numerical data from receipts. Following the CRISP-DM methodology, the model was trained and deployed through a Flask-based API and evaluated using black-box and white-box testing. Experimental results show that Isolation Forest achieves the highest anomaly detection performance (F1-Score = 0.81, ROC-AUC = 0.99), CBIR validates official fuel stations with ≥95% similarity, and OCR reaches 97% accuracy in receipt recognition. The novelty of this study lies in its hybrid integration of anomaly detection and visual verification within a single scalable platform. This research contributes to Informatics by providing a framework for hybrid anomaly detection systems that enhance digitalization, transparency, and operational efficiency in the logistics sector.