Blog

[Pengumuman] Peserta Mata Kuliah “PENULISAN KARYA ILMIAH DAN PROPOSAL”

Diumumkan kepada peserta mata kuliah PENULISAN KARYA ILMIAH DAN PROPOSAL (kode mata kuliah FEH4A2) Program Studi S1 Teknik Elektro, tidak diperkenankan untuk mengambil pembimbing I Tugas Akhir dari luar FTE atau Universitas Telkom. Pembimbing II diprioritaskan berasal dari Fakultas Teknik Elektro (FTE) Universitas Telkom. Adapun penetapan pembimbing II dari Luar FTE atau Universitas Telkom, harus […]

DETAIL

APWIMOB 2015

APWiMob 2015 APWiMob is international event in Asia Pacific designed for audience working in the wireless communications and mobile technology communities. As the Asia Pacific conference focusing on wireless and mobile technologies, APWiMob is very suitable for wireless communications and mobile researchers, industry professionals, and academics interested in the latest development and design of wireless […]

By bee | Kegiatan
DETAIL

Traffic Anomaly Detection in DDoS Flooding Attack

Researches have been conducted to overcome Distributed Denial of Service (DDoS) flooding attack. Beside the use of signature based detection, anomaly based detection is also used to detect the attack. Several methods such as statistic, information theory, data mining and forecasting have been proposed. In several researches, they just focused to detect the traffic anomaly, […]

By bee | Publikasi
DETAIL

Integration of Kleptoware as Keyboard Keylogger for Input Recorder Using Teensy USB Development Board

Operating a computer to perform everyday tasks is sure to require input devices. The common human interface devices for operating a computer are mouse and keyboard. It means that modifying input devices can be alternative way to do monitoring and logging activity from a user. A keylogger is able to do such functions, but various […]

By bee | Publikasi
DETAIL

AN IMPLEMENTATION OF DATA ENCRYPTION FOR INTERNET OF THINGS USING BLOWFISH ALGORITHM ON FPGA

Information security has become an important issue in data communications. One method to ensure the security of data is to use cryptographic method. Cryptography is a method to encode the information to keep the information from being hacked by the other party. The implementation of cryptography is used a significant amount of computer resources. Various […]

By bee | Publikasi
DETAIL