Cryptography Generator for Prevention SQL Injection Attack In Big Data
Abstract
Keywords
Full Text:
PDFReferences
Anggraini E P, 2020, et al "Implementasi Kriptografi dengan Algoritma Advanced Encryption Standard (AES) 128 Bit Dan Steganografi Menggunakan Metode End Of File (EOF) Berbasis Java Desktop Pada Dinas Pendidikan Kabupaten Tangerang " Applied Information Systems and Management (AISM), vol. 3, pp. 69-78.
A. Taryana, A. (2020) Fadli dan S. R. Nurshiami, Merancang Perangkat Lunak Sistem Penjaminan Mutu Internal (SPMI) Perguruan Tinggi yang Memiliki Daya Adaptasi Terhadap Perubahan Kebutuhan Pengguna secara Cepat dan Sering, Al-Azhar Indonesia Seri Sains dan Teknologi, 2020
Arvind, (2019). DevOps Life cycle: Everything You Need To Know About DevOps Life cycle Phases, 26 November 2019. [Online]. Available: https://www.edureka.co/blog/devops-lifecycle/. [Diakses 20 April 2020].
Fauzi, F., Al-Khowarizmi, A. K., & Muhathir, M. (2020). The e-Business Community Model is Used to Improve Communication Between Businesses by Utilizing Union Principles. Journal of Informatics and Telecommunication Engineering, 3(2), 252-257.
Martiano, M. (2021). Development of EDUDA as a Media to Build Students' Self-Resistance in Preventing Drugs. Journal of Computer Science, Information Technology and Telecommunication Engineering, 2(1), 169-173.
Martiano, M., & Maulana, H. (2021). Development of A Base Learning Project Model With Online Media In An Effort to Increase Learning Activities During the COVID-19 Pandemic. International Journal of Basic and Applied Science, 10(2), 36-41.
Marnoko, S., & Martiano, M. (2020). Improvement of Quantum Teaching Model Assisted by Comics against Student Learning Outcomes.
Lubis, A. R., & Prayudani, S. (2020, October). Optimization of MSE Accuracy Value Measurement Applying False Alarm Rate in Forecasting on Fuzzy Time Series based on Percentage Change. In 2020 8th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-5). IEEE.
Lubis, Arif Ridho, Santi Prayudani, and Muharman Lubis. "Analysis of the Markov Chain Approach to Detect Blood Sugar Level." Journal of Physics: Conference Series. Vol. 1361. No. 1. IOP Publishing, 2019.
Tohirin, (2020). Implementasi DevOps pada Pengembangan Aplikasi e-Skrining Covid-19, jurnal multinetics, vol. 6 no. 1 may 2020
Gaurav Shrivastava, 2013. Using Letters Frequency Analysis in Caesar Cipher with Double Columnar Transposition Technique, International Journal of Engineering Sciences & Research Technology. Vol. 2 Issue 6 ,Page No. 1475-1478, 01 June, ISSN: 2277-9655.
Widyati Suryani, 2021, "Kebocoran Data Pribadi dan Urgensi Pembentukan UU Pelindungan Data Pribadi," Pusat penelitian badan keahlian sekretariat jendral DPR RI,
Wiliam Stalling,(2011). Cryptography and Network Security Principles and Practice, Fifth EditionPearson Education,Inc.,publishing as Prentice Hall, USA,
DOI: https://doi.org/10.30596/jcositte.v3i2.11566
Refbacks
- There are currently no refbacks.