Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
Submissions
Privacy Statement
Reviewer
About the Journal
Contact
About
Editorial Masthead
Announcements
Search
Register
Login
Home
/
Archives
/
Vol. 6 No. 2 (2023): Edisi Bulan November tahun 2023
Vol. 6 No. 2 (2023): Edisi Bulan November tahun 2023
Published:
01-02-2024
Full Issue
Requires Subscription
Cover
Articles
Keamanan Jaringan Wi-Fi Terhadap Serangan Packet Sniffing Menggunakan Firewall Rule (Studi Kasus : Pt. Akurat.Co)
Arini Arini, Muhammad Luthfi Arsalan, Husni Teja Sukmana
30-38
PDF
DOI:
https://doi.org/10.14421/csecurity.2023.6.2.4075
Views: 1728 Downloads: 1730
Analisis Malware Hummingbad Dan Copycat Pada Android Menggunakan Metode Hybrid
Nurul Qomariah, Erick Irawadi Alwi, Muhammad Arfah Asis
39-47
PDF
DOI:
https://doi.org/10.14421/csecurity.2023.6.2.4180
Views: 534 Downloads: 484
A Implementasi Model Digital Forensik Procces Untuk Sosial Media Investigation Dengan Tools Hunchly
Muhammad Na'im Al Jum'ah, Hamid Wijaya, Rima Ruktiari Ismail
48-53
PDF
DOI:
https://doi.org/10.14421/csecurity.2023.6.2.4265
Views: 458 Downloads: 495
Perbandingan Hasil Recovery Tools Mobile Forensic Di Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ)
Muhammad Fadil Fadillah, Trihastuti Yuniati
54-61
PDF
DOI:
https://doi.org/10.14421/csecurity.2023.6.2.4172
Views: 468 Downloads: 579
Analisis Dan Monitor Sniffing Paket Data Jaringan Lokal Dengan Network Analyzer Wireshark
Rahma Milan Sari Milan, Tri Rochmadi Tri Rochmadi
62-68
PDF
DOI:
https://doi.org/10.14421/csecurity.2023.6.2.4279
Views: 607 Downloads: 527
Analisis Dan Pengukuran Quality Of Service (Qos) Jaringan 4G (Operator Telkomsel, Xl, Dan Indosat)
Eko Jhony Pranata, Rizki Dewantara
69-75
PDF
DOI:
https://doi.org/10.14421/csecurity.2023.6.2.4246
Views: 909 Downloads: 1072
Penerapan Sistem Manajemen Keamanan Informasi ISO 27001 pada Perpusnas RI dalam mendukung Keamanan Tata Kelola Teknologi Informasi
Moh. Abdul Fattah Ys, Bita Parga Zen, Dewi Endah Wasitarini
76-82
PDF
DOI:
https://doi.org/10.14421/csecurity.2023.6.2.4190
Views: 1268 Downloads: 2106
Visitors Statistic
Visitor By Country
Statistik Kunjungan Bulanan
Indexed By
side-menu
Journal Navigation
Online Submission
Online Submission Guidelines
Editorial Team
Peer Review Process
Focus and Scope
Publication Ethics
Plagiarism Check
Article Proccessing Charge
Open Access Statement
License Term
SUPLEMENTARY FILES
Article Template
Free Plagiarism Statement
Covering Letter and Statement Form
License
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Make a Submission
Make a Submission
Browse
Categories