cover
Contact Name
Abdul Wahab Abdul Rahman
Contact Email
abdul.wahab@iiast-journal.org
Phone
0852778834017
Journal Mail Official
admin.ijcitsm@iiast-journal.org
Editorial Address
Premier Park 2 Ruko Blok B-11 Jl. Kampung Kelapa PLN Kel. Cikokol Kec. Tangerang, Tangerang, Provinsi Banten
Location
Kota tangerang,
Banten
INDONESIA
International Journal of Cyber and IT Service Management (IJCITSM)
ISSN : 27971325     EISSN : 2808554X     DOI : https://doi.org/10.34306/ijcitsm
Core Subject : Science,
International Journal of Cyber and Service Management (IJCITSM) is an international peer-reviewed journal that publishes high quality and refereed papers which reports original research and innovative applications in all areas of Computer Science, Informatics, Electronics Engineering, Communication Network and Information Technologies. Papers for publication in the journal are selected through rigorous peer review, to ensure originality, timeliness, relevance, and readability. The journal also seeks clearly written survey and review articles from experts in the field, to promote insightful understanding of the state-of-the-art and technology trends.
Articles 3 Documents
Search results for , issue "Vol. 2 No. 1 (2022): April" : 3 Documents clear
Adoption Computerized Certificate Transparency And Confidentiality Rustiana, Deden; Pratama, Julysar Diti; Mudabbir, Taufan; Fahmi, Muhamad Ali; Rofei, Galih Ahmad
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 2 No. 1 (2022): April
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (325.67 KB) | DOI: 10.34306/ijcitsm.v2i1.65

Abstract

Due to the unavailability of issuing entities, the increasing number of valuable documents that are still being issued in printed form has an impact on forgery and cannot be verified. Academic certification is an achievement that everyone desires because it has a positive effect and has a continuity in their social life. These activities are listed as being able to identify, analyze, and try out any of the ledger options that are available. arise to provide greater efficiency, reliability, and a level of independence. By implementing a prototype that could issue, verify, and distribute certificates, the fact of the concept was proposed. The experimental test results are given, as well as the use of blockchain technology for the purpose of analyzing. Finally, this work outlines the current growth and maturity of equipment encountered, reports progress and limitations, and reveals issues that still need to be addressed.
Cyber Security in Smart Grid Technology: A systematic Review Alfiah, Fifit; Prastiwi, Novi Rifkhah
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 2 No. 1 (2022): April
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (364.728 KB) | DOI: 10.34306/ijcitsm.v2i1.79

Abstract

A Smart Grid (SG) is an electrical infrastructure that functions similarly to a traditional power grid but includes scalable and ubiquitous two-way communications, timely control capabilities, large-scale integration of dispersed resources, and resource efficiency. Pervasive smart monitoring technologies, autonomous equipment defect detecting, and self-healing are all included in the SG. It is intelligent infrastructure because of features such as 'Wireless Automatic Meter Reading' (WAMR), power system stability monitoring, distributed energy resource optimization, and Demand Response system applications. Given some of these distinguishing characteristics, SGs are without a doubt the world's future power infrastructure. A smart grid may link millions of people and devices in a network, necessitating its robustness, reliability, and security. Because of the long-range communication over open networks, one of the primary issues of today's smart grid systems is security. Cybercriminals, hackers, and terrorists are attempting to assault this national infrastructure in order to obtain control over automated energy monitoring and remote control for personal benefit. This research article provides a full overview of Smart Grids, including their design, methodology, and communication protocols, but the attention is mostly on the cyber-attacks that have been carried out and the remedies that have been advised for smart grids. Finally, we cover the numerous cyber security difficulties, as well as the topics that remain unsolved in the literature and the present solution area, as well as prospective research gaps.
Boarding House Search Information System Database Design Anwar, Muhammad Rehan; Purnama, Suryari
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 2 No. 1 (2022): April
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (292.1 KB) | DOI: 10.34306/ijcitsm.v2i1.89

Abstract

Technological advancements are causing humans to produce several inventions and developments to accomplish anything. Which one utilizes internet technology to obtain information as quickly and simply as possible? For example, if someone moves to a new area for work or school, they will need boarding houses. However, this information is difficult to obtain because it is traditionally passed down from person to person, and the boarding house owner finds it difficult to promote his boarding house. As a result, individuals require a computerized system to resolve this issue. This study aims to create a database design for a boarding home information system. This study employs the DBLC (Database Life Cycle) technique, which illustrates the life cycle of a database that may be developed at any time. Database design is separated into three parts: conceptual, logical, and physical database design.

Page 1 of 1 | Total Record : 3