The terrorism activities are not only in real world as development of technology,rnbut also in cyber world. Terrorism activities in cyber world are called cyber terrorism.rnOne of methodology for c…
The most common way used to cluster a data from a data set is to use k-means clustering algorithm. It categorized as one of the fastest algorithm. In fact, it performs slower once it has to process…
Visual impairment is a vision loss is caused by trauma, disease, and congenital or degenerative conditions. This disability condition makes visual impairment people difficult or even could not unde…
The increasing of malware that are exploiting the Internet daily has become a serious threat. The manual heuristic inspection of malware analysis is no longer considered effective and efficient com…
Internet Protocol (IP) is a standard protocol for communication in modern times. But IP has a problem in the implementation of Quality of Service(QoS). Indonesia wants to implement IPTV and one of …
Hierarchical Clustering is one of many clustering methods used to exploringrnthe relationship in statistical data. It cluster data based on distance, similarities andrncorrelation. The result will …
Social Networking are changing the ways in which people use and engage with the internet and with each other. people are quick to use the new technology in ways which increasingly blur the boundari…
Some companies and researches around the world have used honeypot for certain purpose. Especially in the malware research, honeypot can be used to collect malware samples. Malwares that can be coll…
Enterprise Resource Planning is an integrated information system that has been used by many organizations to easily store, retrieve, manipulate and share their data across the departments. PT. Cipt…
The understanding and predict threats to the security of information systems become really important in order to protect critical systems. Protection against the threat of computer threats have bee…