Abstract is missing.
- Designing Intelligent Coastal Surveillance based on Big Maritime DataAmarulla Octavian, Wisnu Jatmiko. 1-8 [doi]
- Towards Using Universal Big Data in Artificial Intelligence Research and Development to Gain Meaningful Insights and Automation SystemsZainal A. Hasibuan. 9-18 [doi]
- Analyzing Highway Road Accident Characteristic Using Data MiningMuhammad Yogi Ilham, Isti Surjandari, Enrico Laoh. 17-22 [doi]
- Sentiment Analysis of the Covid-19 Virus Infection in Indonesian Public Transportation on Twitter Data: A Case Study of Commuter Line PassengersIntania Cahya Sari, Yova Ruldeviyani. 23-28 [doi]
- Risk Classification of Peer-to-Peer Lending Platform Using SVM AlgorithmCorry Elsa Noviyanti, Yova Ruldeviyani. 29-34 [doi]
- Sentiment Analysis and Topic Modelling of 2018 Central Java Gubernatorial Election using Twitter DataGede Rizky Gustisa Wisnu, Ahmadi, Ahmad Rizaqu Muttaqi, Aris Budi Santoso, Prabu Kresna Putra, Indra Budi. 35-40 [doi]
- Time-Series Big Data Stream EvaluationPetrus Mursanto, Ari Wibisono, Wendy D. W. T. Bayu, Valian Fil Ahli, May Iffah Rizki, Lintang Matahari Hasani, Jihan Adibah. 41-46 [doi]
- Automobile Insurance Fraud Detection using Supervised ClassifiersIffa Maula Nur Prasasti, Arian Dhini, Enrico Laoh. 47-52 [doi]
- Triaxial accelerometer-based human activity recognition using 1D convolution neural networkWahyu Andhyka Kusuma, Agus Eko Minarno, Mochamad Satriyo Wibowo. 53-58 [doi]
- Fast Ellipse Fitting Implementation on USG Mobile Telehealth ApplicationMade Wira Dhanar Santika, Muhammad Anwar Ma'sum, Aria Kekalih, Alhadi Bustamam, Adila Alfa Krisnadhi, Noor Akhmad Setiawan, I Made Agus Dwi Suarjaya, Adi Nurhadiyatna, Wisnu Jatmiko. 59-64 [doi]
- Segmentation and Approximation of Blood Volume in Intracranial Hemorrhage Patients Based on Computed Tomography Scan Images Using Deep Learning MethodKezia Irene, M. Anwar Ma'sum, Reyhan Eddy Yunus, Wisnu Jatmiko. 65-72 [doi]
- Prediction of Protein Tertiary Structure Using Pre-Trained Self-Supervised Learning Based on TransformerAlif Kurniawan, Wisnu Jatmiko, Rukman Hertadi, Novian Habibie. 73-80 [doi]
- Financial Statement Fraud Detection in Indonesia Listed Companies using Machine Learning based on Meta-Heuristic OptimizationSyafiq Hidayattullah, Isti Surjandari, Enrico Laoh. 79-84 [doi]
- Improving Security of Web-Based Application Using ModSecurity and Reverse Proxy in Web Application FirewallRizki Agung Muzaki, Obrina Candra Briliyant, Maulana Andika Hasditama, Hamzah Ritchi. 85-90 [doi]
- Secure SMS Using Pseudo-Random Bit Generator Based on Chaotic Map, and AES on Arduino UNO Board and SIM 900 ModuleMuhammad Mahavira Prawira P, Rizki Kurniandi, Amiruddin Amiruddin. 91-96 [doi]
- Improved Logistic-Sine Chaotic Map based S-box and Bit-Plane Scrambling Encryption Schemes Performance on Compressed ECG DataMuhammad Fauzi, Grafika Jati, Muhammad Febrian Rachmadi, Wisnu Jatmiko. 97-102 [doi]
- Design of Blockchain-based Electronic Health Records for Indonesian Context: Narrative ReviewPuspita Kencana Sari, Setiadi Yazid. 103-108 [doi]
- Secure Wipe Out in BYOD EnvironmentPoorva Tiwari, C. S. Skanda, U. Sanjana, S. Aruna, Prasad Honnavalli. 109-114 [doi]
- Implementation of Two Factor Authentication (2FA) and Hybrid Encryption to Reduce the Impact of Account Theft on Android-Based Instant Messaging (IM) ApplicationsMauli Bayu Segoro, Prasetyo Adi Wibowo Putro. 115-120 [doi]
- Optimization of Phishing Website Classification Based on Synthetic Minority Oversampling Technique and Feature SelectionRizal Dwi Prayogo, Siti Amatullah Karimah. 121-126 [doi]
- Development of a Cyber-Situational Awareness Model of Risk Maturity Using Fuzzy FMEANungky Awang Chandra, Anak Agung Putri Ratna, Kalamullah Ramli. 127-136 [doi]
- Intrusion Detection System based on Hybrid Classifier and User Profile Enhancement TechniquesPrabhat Pokharel, Roshan Pokhrel, Sandeep Sigdel. 137-144 [doi]
- Capture The Flag Simulation Based on STRIDE Threat ModelGhina Fitriya, Arif Rahman Hakim, Mohammed Abozied Hassan Abozied. 145-152 [doi]
- Secure Code Recommendation Based on Code Review Result Using OWASP Code Review GuideVenia Noella Nanisura Damanik, Septia Ulfa Sunaringtyas. 153-158 [doi]
- Aegis: A Framework to Detect Compromised Components in the Supply Chain of Information Technology InfrastructureSatvik Dasari, Vishal Madipadga. 159-164 [doi]