Issue | Title | |
Vol 10, No 1 (2024): March | Uncovering Security Vulnerabilities in Electronic Medical Record Systems: A Comprehensive Review of Threats and Recommendations for Enhancement | Abstract PDF |
Dian Wijayanti, Erik Iman Heri Ujianto, Rianto Rianto | ||
Vol 6, No 1 (2020): June | Web-Based Dashboard for Monitoring Penetration Testing Activities Based on OWASP Standards | Abstract PDF |
Yansyah Saputra Wijaya, Imaniar Ramadhani | ||
Vol 9, No 2 (2023): June | Implementation of Open Web Application Security Project for Penetration Testing on Educational Institution Websites | Abstract PDF |
Nani Sulisnawati, Subektiningsih Subektiningsih | ||
Vol 8, No 2 (2022): June | Anti-Forensics with Steganographic File Embedding in Digital Image Using Genetic Algorithm | Abstract PDF |
Amadeus Pondera Purnacandra, Subektiningsih Subektiningsih | ||
1 - 4 of 4 Items |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"