Main Article Content
Abstract
Keywords
Article Details
Copyright (c) 2024 Jurnal Komputer Terapan
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright info for authors
1. Authors hold the copyright in any process, procedure, or article described in the work and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors retain publishing rights to re-use all or portion of the work in different work but can not granting third-party requests for reprinting and republishing the work.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License
References
- R. Salamah, I., Lindawati, L., Fadhli, M., & Kusumanto, “Evaluasi Pengukuran Website Learning Management System Polsri Dengan Metode Webqual 4.0,” J. Digit Digit. Inf. Technol., vol. Vol. 10, N, pp. 1–10, 2020, doi: 10.51920/jd.v10i1.151.
- F. Awaluddin, Amsori, and M. Mulyana, “Tantangan dan Peran Digital Forensik dalam Penegakan Hukum terhadap Kejahatan di Ranah Digital,” Humaniorum, vol. 2, no. 1, pp. 14–19, 2024, doi: 10.37010/hmr.v2i1.35.
- A. E. Saragih, N. Christian, and P. Khoirunisa, “Analisis Penggunaan Barang Bukti Digital di Dalam Sistem Hukum di Indonesia (Studi Kasus Putusan Nomor 3 K/PID.SUS/2019),” vol. Vol.2, No., no. 2, pp. 504–510, 2024, doi: https://doi.org/10.5281/zenodo.12082755.
- R. Indonesia, “Pasal 25 Undang-Undang Nomor 1 Tahun 2024 tentang Perubahan Kedua Atas Undang-Undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik,” no. 190185, p. 39, 2024.
- Rahmat Inggi and Heri Pebrianto Alam, “Analisis Forensik Web Browser Pada Perangkat Android,” Simtek J. Sist. Inf. dan Tek. Komput., vol. 8, no. 1, pp. 215–220, 2023, doi: 10.51876/simtek.v8i1.249.
- I. Riadi, R. Umar, and D. Bernadisman, “Analisis Forensik Database Menggunakan Metode Forensik Statis,” J. Sist. Inf. Bisnis, vol. Vol 9, No, pp. 9–17, 2019, doi: https://doi.org/10.21456/.
- A. D. Djayali, “Analisa Serangan SQL Injection pada Server pengisian Kartu Rencana Studi (KRS) Online,” JAMINFOKOM J. Manaj. Inform. dan Komput., vol. Vol 1 No 1, pp. 16–24, 2020, [Online]. Available: https://garuda.kemdikbud.go.id/documents/detail/1973246
- D. Kurnia, “Analisis Forensik Serangan SQL Injection dan DoS Menggunakan Instrution Detection System Pada Server Berbasis Lokal,” InfoTekJar J. Nas. Inform. dan Teknol. Jar., vol. Vol 4 No 2, pp. 0–4, 2020.
- M. Mushlihudin, “Analisis Forensik pada Web Phishing Menggunakan Metode National Institute Of Standards And Technology ( NIST ),” vol. 8, no. 2, pp. 11–23, 2020.
- I. W. Ardiyasa, “Analisa Serangan Remote Exploit pada Jaringan Komputer dengan menggunakan Metode Network Forensic,” Explore, vol. 11, no. 2, p. 46, 2021, doi: 10.35200/explore.v11i2.451.
- D. Hariyadi, M. W. Indriyanto, and M. Habibi, “Investigasi dan Analisis Forensik Digital Pada Percakapan Grup WhatsApp Menggunakan NIST SP 800-86 dan Support Vector Machine,” Cyber Secur. dan Forensik Digit., vol. 3, no. 2, pp. 34–38, 2020, doi: 10.14421/csecurity.2020.3.2.2193.
- Imam Riadi, Abdul Fadlil, and Muhammad Immawan Aulia, “Investigasi Bukti Digital Optical Drive Menggunakan Metode National Institute of Standard and Technology (NIST),” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 5, pp. 820–828, 2020, doi: 10.29207/resti.v4i5.2224.
- M. F. Hasa, A. Yudhana, and A. Fadlil, “Analisis Bukti Digital pada Storage Secure Digital Card Menggunakan Metode Static Forensic,” Mob. Forensics, vol. 1, no. 2, pp. 76–84, 2019, doi: 10.12928/mf.v1i2.1217.
- B. S. Santoso and P. M. Sulaksono, “Static Forensic Pada USB Mass Storage Menggunakan Forensics Toolkit Imager,” J. Komput. Terap., vol. 8, no. 1, pp. 132–142, 2022, doi: 10.35143/jkt.v8i1.5334.
References
R. Salamah, I., Lindawati, L., Fadhli, M., & Kusumanto, “Evaluasi Pengukuran Website Learning Management System Polsri Dengan Metode Webqual 4.0,” J. Digit Digit. Inf. Technol., vol. Vol. 10, N, pp. 1–10, 2020, doi: 10.51920/jd.v10i1.151.
F. Awaluddin, Amsori, and M. Mulyana, “Tantangan dan Peran Digital Forensik dalam Penegakan Hukum terhadap Kejahatan di Ranah Digital,” Humaniorum, vol. 2, no. 1, pp. 14–19, 2024, doi: 10.37010/hmr.v2i1.35.
A. E. Saragih, N. Christian, and P. Khoirunisa, “Analisis Penggunaan Barang Bukti Digital di Dalam Sistem Hukum di Indonesia (Studi Kasus Putusan Nomor 3 K/PID.SUS/2019),” vol. Vol.2, No., no. 2, pp. 504–510, 2024, doi: https://doi.org/10.5281/zenodo.12082755.
R. Indonesia, “Pasal 25 Undang-Undang Nomor 1 Tahun 2024 tentang Perubahan Kedua Atas Undang-Undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik,” no. 190185, p. 39, 2024.
Rahmat Inggi and Heri Pebrianto Alam, “Analisis Forensik Web Browser Pada Perangkat Android,” Simtek J. Sist. Inf. dan Tek. Komput., vol. 8, no. 1, pp. 215–220, 2023, doi: 10.51876/simtek.v8i1.249.
I. Riadi, R. Umar, and D. Bernadisman, “Analisis Forensik Database Menggunakan Metode Forensik Statis,” J. Sist. Inf. Bisnis, vol. Vol 9, No, pp. 9–17, 2019, doi: https://doi.org/10.21456/.
A. D. Djayali, “Analisa Serangan SQL Injection pada Server pengisian Kartu Rencana Studi (KRS) Online,” JAMINFOKOM J. Manaj. Inform. dan Komput., vol. Vol 1 No 1, pp. 16–24, 2020, [Online]. Available: https://garuda.kemdikbud.go.id/documents/detail/1973246
D. Kurnia, “Analisis Forensik Serangan SQL Injection dan DoS Menggunakan Instrution Detection System Pada Server Berbasis Lokal,” InfoTekJar J. Nas. Inform. dan Teknol. Jar., vol. Vol 4 No 2, pp. 0–4, 2020.
M. Mushlihudin, “Analisis Forensik pada Web Phishing Menggunakan Metode National Institute Of Standards And Technology ( NIST ),” vol. 8, no. 2, pp. 11–23, 2020.
I. W. Ardiyasa, “Analisa Serangan Remote Exploit pada Jaringan Komputer dengan menggunakan Metode Network Forensic,” Explore, vol. 11, no. 2, p. 46, 2021, doi: 10.35200/explore.v11i2.451.
D. Hariyadi, M. W. Indriyanto, and M. Habibi, “Investigasi dan Analisis Forensik Digital Pada Percakapan Grup WhatsApp Menggunakan NIST SP 800-86 dan Support Vector Machine,” Cyber Secur. dan Forensik Digit., vol. 3, no. 2, pp. 34–38, 2020, doi: 10.14421/csecurity.2020.3.2.2193.
Imam Riadi, Abdul Fadlil, and Muhammad Immawan Aulia, “Investigasi Bukti Digital Optical Drive Menggunakan Metode National Institute of Standard and Technology (NIST),” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 5, pp. 820–828, 2020, doi: 10.29207/resti.v4i5.2224.
M. F. Hasa, A. Yudhana, and A. Fadlil, “Analisis Bukti Digital pada Storage Secure Digital Card Menggunakan Metode Static Forensic,” Mob. Forensics, vol. 1, no. 2, pp. 76–84, 2019, doi: 10.12928/mf.v1i2.1217.
B. S. Santoso and P. M. Sulaksono, “Static Forensic Pada USB Mass Storage Menggunakan Forensics Toolkit Imager,” J. Komput. Terap., vol. 8, no. 1, pp. 132–142, 2022, doi: 10.35143/jkt.v8i1.5334.