Ditemukan 642 dokumen yang sesuai dengan query
Artikel Jurnal Universitas Indonesia Library
Artikel Jurnal Universitas Indonesia Library
Amalia Ayu Pratiwi
"
ABSTRAKAdvanced Persistent Threat APT merupakan salah satu serangan yang sulit dideteksi pada saat ini. Tidak ada satupun perangkat yang memberi satu solusi yang dapat mendeteksi ataupun mengatasinya. Dalam hal ini diperlukannya satu solusi yang komprehensif untuk mengatasi serangan tersebut. Pada perbandingan kinerja security analytic tools kali ini, akan diketahui kinerja perangkat tersebut dalam mengatasi APT. Perangkat yang digunakan adalah beberapa perangkat security analytic yaitu Deep Discovery Inspector Trend Micro TM DDI dan Security Analytic Blue Coat SA . Parameter yang digunakan untuk percobaan dalam skenario berupa beberapa jenis malware yang disebar melalui free file sharing dalam bentuk suatu link URL, kemudian link URL tersebut akan diunduh oleh target. Setiap perangkat security analytic diharapkan mengenali ancaman tersebut, sehingga didapatkan tingkat deteksi kinerja perangkat security analytic. Semakin besar nilainya maka semakin baik kinerja perangkat tersebut. Pada tiap perangkat security analytic dapat mengetahui karakteristik serangan dan mampu mengenali tingkatan dampak serangan tersebut. Hasilnya didapatkan bahwa kinerja SA BlueCoat lebih baik dalam mendeteksi ancaman daripada Trend Micro Deep Discovery Inspector TM DDI . Trend Micro Deep Discovery Inspector TM DDI mampu mengenali karakteristik ancaman lebih detail daripada SA BlueCoat.
ABSTRACTAn Advanced Persistent Threat APT attack is an attack that is currently difficult to detect. No devices that can detect or resolve it. In this case, there is a need for a comprehensive solution to address such attacks. In this work we perform the comparison of performance of the security analytics tools, i.e Trend Micro Deep Discovery Inspector DDI and Security Analytic BlueCoat SA . Therefore we will know the performance of the devices in addressing the APT. The devices are some analytic security devices that is Trend Micro Deep Discovery Inspector DDI and the Blue Coat Security Analytic SA . The parameters used for experiment scenarios are some types of malware which is distributed using free file sharing in the form of a URL link. The URL link will be downloaded by the target. Each security analytics tools are expected to recognize the threat and to obtain the detection rate of the security performance analytic tools. The larger the value, the better the performance of these devices. Each security analytics tools will identified the characteristic of the attack and were able to recognize the level of impact of the attack. The result shows that the performance of SA BlueCoat is better than TM DDI in term of detection rate for recognizing potensial malware in the first place. TM DDI is better than SA BlueCoat to recognize the characteristic of each malware."
2016
T47012
UI - Tesis Membership Universitas Indonesia Library
Antonio Kruger, editor
"This book addresses the challenge within the context of an educational and cultural experience. This is inherently a multidisciplinary field and the contributions span the related research aspects, including system architecture and communications issues, and intelligent user interface aspects such as aesthetics and privacy. On the scientific side, the authors integrate artificial intelligence, user modeling, temporal and spatial reasoning, intelligent user interfaces, and user-centric design methodologies in their work, while on the technological side they integrate mobile and wireless networking infrastructures, interfaces, group displays, and context-driven adaptive presentations.
"
Berlin: Springer, 2012
e20406428
eBooks Universitas Indonesia Library
Ismail Khalil, editor
"The goal of this book is to provide a state the art of trustworthy ubiquitous computing to address recent research results and to present and discuss the ideas, theories, technologies, systems, tools, applications and experiences on all theoretical and practical issues."
Paris: Atlantis Press, 2012
e20406536
eBooks Universitas Indonesia Library
Adi Prakoso
"Artikel ini berisi analisis mengenai flash mob yang sebagai representasi aksi protes masyarakat Rusia. Setelah runtuhnya Uni Soviet banyak perubahan besar yang terjadi di Rusia, salah satunya adalah dengan mulai bebasnya masyarakat untuk berbicara dalam hal mengutarakan aspirasi mereka. Melalui penelitian ini, penulis ingin memaparkan bagaimana flash mob digunakan dalam bentuk aksi protes, asal-usulnya, serta berbagai hal yang melatarbelakangi hal tersebut, yang kemudian dikaitkan dengan teori representasi dan globalisasi. Berdasarkan hasil analisis, flash mob digunakan sebagai bentuk aksi protes dikarenakan oleh adanya representasi flash mob itu sendiri, serta adanya dampak dari globalisasi yang juga merupakan dampak dari kebijakan glasnost dan persestroika.
This article discusses Flash Mob as A Representation of Russian‟s Protesting Method. After the collapse of the Soviet Union, a lot of major changes occurred in Russia, one of the changes is the freedom of speech in terms of expressing their aspirations. This journal also discusses about how flash mob is used as a protesting method, the history of flash mob in Russia, and the backgrounds of the usage of flash mob as a protesting method, which is then analyzed by the theories of representation and globalization. Based on the analysis, flash mob is used as a protesting method because there was a representation of the flash mob itself, and also there was an impact of globalization as also an impact of the glasnost and perestroika policy."
Depok: Fakultas Ilmu Pengetahuan Budaya Universitas Indonesia, 2014
MK-Pdf
UI - Makalah dan Kertas Kerja Universitas Indonesia Library
"This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future."
Switzerland: Springer Cham, 2019
e20502801
eBooks Universitas Indonesia Library
Aung San Suu Kyi
Toronto : Penguin Books, 1997
923.2 AUN v
Buku Teks SO Universitas Indonesia Library
Schlesinger, Arthur Meier
Boston: Houghton Mifflin, 1962
320 SCH p
Buku Teks SO Universitas Indonesia Library
Boulder: Westview Press, 1988
363.3 THR
Buku Teks Universitas Indonesia Library