Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
Submissions
Privacy Statement
Reviewer
About the Journal
Contact
About
Editorial Team
Announcements
Search
Register
Login
Home
/
Archives
/
Vol. 7 No. 1 (2024): Edisi Bulan Mei Tahun 2024
Vol. 7 No. 1 (2024): Edisi Bulan Mei Tahun 2024
Published:
08-11-2024
Articles
Pengamanan Pesan Teks Menggunakan Affine Cipher dan Algoritma Goldbach Code
Rafika Zahrotul Fauziah, Muhammad Khudzaifah, Erna Herawati
1-6
PDF
DOI:
https://doi.org/10.14421/csecurity.2024.7.1.4406
Views: 296 Downloads: 311
Evaluasi Keamanan Sistem Informasi Pada Penyedia Layanan Cloud Dan Perlindungan Data Pribadi Berdasarkan Index Kami Versi 4.2 (Studi Kasus : PTIPD UIN Sunan Kalijaga Yogyakarta)
Faiz Akhmad Hafizuddin, Bambang Sugiantoro
7-17
PDF
DOI:
https://doi.org/10.14421/csecurity.2024.7.1.4280
Views: 597 Downloads: 992
Analisis Bukti Digital Pada Media Penyimpanan Flash Disk Menggunakan Metode National Institute Of Standards And Technology (NIST)
Aidil Wijaya Kusuma, Erick Irawadi Alwi, Ramdaniah Ramdaniah
18-24
PDF
DOI:
https://doi.org/10.14421/csecurity.2024.7.1.4345
Views: 1219 Downloads: 1295
Analisa Kerentanan Website Terhadap Serangan Cross-Site Scripting (XSS) Metode Penetration Testing
Ade Gustiyonoo, Erick Irawadi Alwi, Syahrul Mubarak Abdullah
25-33
PDF
DOI:
https://doi.org/10.14421/csecurity.2024.7.1.4432
Views: 1145 Downloads: 933
Systematic Literature Review (SLR): Dampak Pemanfaatan Artificial Intelligence untuk Meningkatkan Cyber Security
Arthur Gregorius Pongoh, Rizqy Achmad Fahreza, Bilal Al Kindi, Feddy Setio Pribadi, Rizky Ajie Aprilianto
34-41
PDF
DOI:
https://doi.org/10.14421/csecurity.2024.7.1.4486
Views: 1614 Downloads: 1195
Evaluasi Tingkat Kesiapan Keamanan Informasi Pada SMK XYZ Menggunakan Indeks KAMI Versi 4.2
Himawan Imtikhan Azmi, tulus_akbar, Bella Tasya Kumala Dewi, Bambang Sugiantoro
42-49
PDF
DOI:
https://doi.org/10.14421/csecurity.2024.7.1.4422
Views: 517 Downloads: 448
Analisis Bibliometrika: 4 Dekade Penelitian Cyber Weapon dalam Peperangan Modern
Dedy Hariyadi
50-55
PDF
DOI:
https://doi.org/10.14421/csecurity.2024.7.1.4860
Views: 307 Downloads: 270
Analisis Keamanan Sistem Informasi Pusaka Magelang Menggunakan Open Web Application Security Project (OWASP) Dan Information Systems Security Assessment Framework (ISSAF)
SAEROZI ALFAN NUGROHO, Tri Rochmadi
56-61
PDF
DOI:
https://doi.org/10.14421/csecurity.2024.7.1.4555
Views: 516 Downloads: 595
Visitors Statistic
Visitor By Country
Statistik Kunjungan Bulanan
Indexed By
side-menu
Journal Navigation
Online Submission
Online Submission Guidelines
Editorial Team
Peer Review Process
Focus and Scope
Publication Ethics
Plagiarism Check
Article Proccessing Charge
Open Access Statement
License Term
SUPLEMENTARY FILES
Article Template
Free Plagiarism Statement
Covering Letter and Statement Form
License
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Make a Submission
Make a Submission
Browse
Categories