|
Issue |
Title |
|
Vol 1, No 3 (2023): INJIT : Vol 1 - Issue 3 - 2023 |
Identity Theft How to Protect Your Digital Identity in this AI era |
Abstract
PDF
|
Samantha Lee |
|
Vol 2, No 2 (2024): INJIT : Vol 2 - Issue 2 - 2024 |
Implementation of AHP and TOPSIS In Web-Based Decision Support System For Best Serie A Player 2022/2023 |
Abstract
PDF
|
Ardhan Sindu Prakoso, Muqorobin Muqorobin, Nendy Akbar Rozaq Rais |
|
Vol 1, No 2 (2023): INJIT : Vol 1 - Issue 2 - 2023 |
Implementation of Data Mining in a Model for Generating Enthusiasm for Learning in Schools |
Abstract
PDF
|
Jhon Frenky, Seyum Betey |
|
Vol 1, No 3 (2023): INJIT : Vol 1 - Issue 3 - 2023 |
Implementation of the Surf Algorithm to Detect Objects in Augmented Reality with the Android System |
Abstract
PDF
|
Saiman Choy, Filky Zeey |
|
Vol 1, No 1 (2023): INJIT : Vol 1 - Issue 1 - 2023 |
Implementation Sistem of The Bayesian Network Method In Web-Based E-Learning Application |
Abstract
PDF
|
Ali Kadhim Abdulabbas, Ferry Irawan, Salman Alfaris, Guillermo Morales-Romero, Salman Alfarisd |
|
Vol 1, No 2 (2022): INJIT : Vol 1 - Issue 2 - 2022 |
Improving Data Security in Cloud Computing Using Advanced Homomorphic Encryption Techniques |
Abstract
PDF
|
Seong Won Him, Zeng Feeng |
|
Vol 2, No 1 (2024): INJIT : Vol 2 - Issue 1 - 2024 |
Information System Planning In Small And Medium Enterprises |
Abstract
PDF
|
Muhammad Thorik Alfiyan |
|
Vol 1, No 2 (2022): INJIT : Vol 1 - Issue 2 - 2022 |
Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Comprehensive Review |
Abstract
PDF
|
Jansin Amry, Sahmi Kenju |
|
Vol 3, No 1 (2025): INJIT : Vol 3 - Issue 1 - 2025 |
Machine Learning for Anomaly Detection: A Review of Techniques and Applications in Various Domains |
Abstract
PDF
|
Ali Rezaei, Hossein Mirzaei |
|
Vol 2, No 1 (2024): INJIT : Vol 2 - Issue 1 - 2024 |
Measuring Public Interest in Online Social Media |
Abstract
PDF
|
Hamka Sihab, Fernando Hardiansyah |
|
Vol 1, No 3 (2023): INJIT : Vol 1 - Issue 3 - 2023 |
Network Segmentation: Why It Matters for Security and AI |
Abstract
PDF
|
Thomas Green |
|
Vol 1, No 1 (2022): INJIT : Vol 1 - Issue 1 - 2022 |
Optimization of Web-Based Information Systems for Enhancing Academic Service Efficiency in Higher Education |
Abstract
PDF
|
Wong Jay, Hers Texy |
|
Vol 1, No 3 (2023): INJIT : Vol 1 - Issue 3 - 2023 |
Password less Authentication the Future of Secure Access and impact on AI implementations |
Abstract
PDF
|
Emily Carter |
|
Vol 1, No 1 (2023): INJIT : Vol 1 - Issue 1 - 2023 |
Performance Comparison Analysis Between Network File System (NFS) And Primary Domain Controller (PDC) Samba |
Abstract
PDF
|
Majid Ali, Samar G. A. Nasser, Faisal Mukti, Ratna Sari |
|
Vol 1, No 3 (2023): INJIT : Vol 1 - Issue 3 - 2023 |
Privacy vs. Security: Finding the Balance using ML, DevOps and Machine learning |
Abstract
PDF
|
Richard Collins |
|
Vol 2, No 2 (2024): INJIT : Vol 2 - Issue 2 - 2024 |
Protecting Against Insider Threats Strategies and Tools with AI |
Abstract
PDF
|
Benjamin Adams |
|
Vol 3, No 1 (2025): INJIT : Vol 3 - Issue 1 - 2025 |
Security and Privacy Challenges in AI Microservices: A Review of Threats and Mitigation Strategies |
Abstract
PDF
|
Jorge Silva, Maria Gomez |
|
Vol 1, No 2 (2023): INJIT : Vol 1 - Issue 2 - 2023 |
Sentiment Analysis On Twitter Social Media Using NaŃ—ve Bayes Classifier With Swarm Particle Selection Feature Optimization And Term Frequency |
Abstract
PDF
|
Antoni Lukito, Hermawan Basuki |
|
Vol 1, No 3 (2023): INJIT : Vol 1 - Issue 3 - 2023 |
Smart System In Rice Field Implementation With Fuzzy Logic |
Abstract
PDF
|
Muhammad Thorik Alfiyan |
|
Vol 1, No 1 (2023): INJIT : Vol 1 - Issue 1 - 2023 |
System Implementation Using Certainty Factor Method For Early Diagnosing Corona Virus Disease (COVID-19) |
Abstract
PDF
|
Debani Prashad Mishra, Surender Reddy, Salkuti Faisal |
|
Vol 1, No 3 (2022): INJIT : Vol 1 - Issue 3 - 2022 |
Test Automation in Microservices Architecture with AI: Strategies, Tools, and Best Practices |
Abstract
PDF
|
William Clark |
|
Vol 2, No 3 (2024): INJIT : Vol 1 - Issue 3 - 2024 |
The Impact of Artificial Intelligence on Cybersecurity: A Review of the Current State and Future Directions |
Abstract
PDF
|
Yanjuk Won, Shen Zanjuk |
|
Vol 2, No 3 (2024): INJIT : Vol 1 - Issue 3 - 2024 |
The Role of Artificial Intelligence in Enhancing Cybersecurity Defense Mechanisms |
Abstract
PDF
|
Jaiko Seendy, Rajj Zeen |
|
Vol 2, No 2 (2024): INJIT : Vol 2 - Issue 2 - 2024 |
The Role of Firewalls in Modern Network Security |
Abstract
PDF
|
Daniel Parker |
|
Vol 2, No 2 (2024): INJIT : Vol 2 - Issue 2 - 2024 |
The Role of Smartphones in Shaping the Future of Communication and Information Access |
Abstract
PDF
|
Yoon Suue, Ghony Roffy |
|
26 - 50 of 52 Items |
<< < 1 2 3 > >> |