2022
DOI: 10.30812/matrik.v21i2.1556
|View full text |Cite
|
Sign up to set email alerts
|

Pengukuran Kelayakan Simulator Forensik Digital Menggunakan Metode Multimedia Mania

Abstract: Pengujian kelayakan suatu media pembelajaran merupakan hal yang penting dilakukan untuk menjamin keberlangsungan, keberlanjutan dan keterikatan (engagement) antara aplikasi dengan penggunanya. Tujuan dari penelitian ini adalah menguji kelayakan dari aplikasi simulator forensik digital sebagai media ajar untuk menginvestigasi keamanan sistem pada lingkungan jaringan komputer menggunakan metode multimedia mania. Bidang jaringan komputer dan internet merupakan lingkungan yang memiliki kerentanan yang sangat tingg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
1
0
Order By: Relevance
“…Meanwhile, the traceability model is intended to make it easier for users to browse the data stored in the system and to see its authenticity and origin [39]. However, this research has only been completed at the model development stage, so it needs to be continued in prototype development [40] and system testing [41], where data, transactions, security, and APIs are used, and the blockchain platform has been tested.…”
Section: Data Modellingmentioning
confidence: 99%
“…Meanwhile, the traceability model is intended to make it easier for users to browse the data stored in the system and to see its authenticity and origin [39]. However, this research has only been completed at the model development stage, so it needs to be continued in prototype development [40] and system testing [41], where data, transactions, security, and APIs are used, and the blockchain platform has been tested.…”
Section: Data Modellingmentioning
confidence: 99%
“…It is expected to obtain field data on Drones and GCS communication in the LoRaWAN Network in tea plantations which are rural environments. In future research, it is also possible to exploit attacks from intrusions in the process of transmitting payload data packets from drones to GCS [24]. However, it is possible to do this in an intrusion detection system on an IoT system [25] if an intrusion reference dataset has been formed on drone networks in tea plantations.…”
Section: Sub-system Function Formulamentioning
confidence: 99%