Analisis dan Pengujian Celah Keamanan pada Website DIV Teknik Informatika Politeknik Harapan Bersama
This work is licensed under a Creative Commons Attribution 4.0 International License.
- Articles
- Issue: Vol. 7 No. 1 (2022)
-
Published: Jun 7, 2022
Abstract
Downloads
X. YAO, B. SUN, Z. Yang, and J. CAO, “A New Method For Vulnerability Analysis And Application In
Rural Dwellings,” in 2019 13th Symposium on Piezoelectrcity, Acoustic Waves and Device
Applications (SPAWDA), Jan. 2019, vol. 7, no. 1, pp. 1–4, doi: 10.1109/SPAWDA.2019.8681872
K. Sicchio, “Hacking Choreography: Dance and Live Coding,” Comput. Music J., vol. 38, no. 1, pp.
–39, Mar. 2014, doi: 10.1162/COMJ_a_00218
A. Fadlil, I. Riadi, and S. Aji, “Development Of Computer Network Security Systems So That
Network Forensic Analysis,” J. Ilmu Tek. Elektro Komput. dan Inform., vol. 3, no. 1, pp. 11–18, 2017
A. K. Kaushik, “2010c - Network Forensic System for ICMP Attacks - 2010.pdf,” vol. 2, no. 3, pp. 14–
, 2010
W. G. J. Halfond and A. Orso, “AMNESIA: Analysis and monitoring for NEutralizing SQL-injection
attacks,” 20th IEEE/ACM Int. Conf. Autom. Softw. Eng. ASE 2005, pp. 174–183, 2005, doi:
1145/1101908.1101935
A. Pomeroy and Q. Tan, “Effective SQL injection attack reconstruction using network recording,”
Proc. - 11th IEEE Int. Conf. Comput. Inf. Technol. CIT 2011, pp. 552–556, 2011, doi:
1109/CIT.2011.103
M. Nurkamid, “Analisa Keefektifan Jaringan Local Area Network (Intranet) Universitas Muria
Kudus,” J. Sains dan Teknol., vol. 4, no. 2, pp. 143–150, 2011
V. Baryamureeba and F. Tushabe, “The enhanced digital investigation process model,” Proc.
Digit. Forensic Res. Conf. DFRWS 2004 USA, pp. 1–9, 2004.
Title | Analisis dan Pengujian Celah Keamanan pada Website DIV Teknik Informatika Politeknik Harapan Bersama |
---|---|
Issue: | Vol. 7 No. 1 (2022): JURNAL PILAR TEKNOLOGI |
Section | Articles |
Published: | Jun 7, 2022 |
DOI: | https://doi.org/10.33319/piltek.v7i1.114 |
Keywords: | web, keamanan, kerentanan |
Author |