[1]
"Indonesia Cyber Security Monitoring Report 2019." Pusat Operasi Keamanan Siber Nasional Badan Siber dan Sandi Negara, 2020.
DOI: 10.22212/jp.v10i2.1447
Google Scholar
[2]
Direktorat Tindak Pidana Siber Badan Reserse Kriminal Kepolisian Negara Republik Indonesia, "Statistik Laporan Polisi 2019," 2019. https://patrolisiber.id/statistic (accessed Jan. 08, 2020).
DOI: 10.37159/jmih.v6i2.2105
Google Scholar
[3]
P. D. Ibnugraha, L. E. Nugroho, W. Widyawan, and P. I. Santosa, "RISK ANALYSIS OF DATABASE PRIVELEGE IMPLEMENTATION IN SQL INJECTION CASE," Jurnal Teknologi, vol. 78, no. 5–7, Art. no. 5–7, May 2016.
DOI: 10.11113/jt.v78.8724
Google Scholar
[4]
"Virus Bulletin :: Hacktivism and website defacement: motivations, capabilities and potential threats." https://www.virusbulletin.com/conference/vb2017/abstracts/hacktivism-and-website-defacement-motivations-capabilities-and-potential-threats/ (accessed Nov. 04, 2020).
Google Scholar
[5]
Badan Siber dan Sandi Negara, "Mengenali Serangan Siber Global dan Nasional Melalui Laporan Tahunan Honeynet Project BSSN-IHP Tahun 2018." 2019, Accessed: Feb. 08, 2019. [Online]. Available: https://bssn.go.id/mengenali-serangan-siber-global-dan-nasional-melalui-laporan-tahunan-honeynet-project-bssn-ihp-tahun-2018/.
DOI: 10.34010/gpsjournal.v7i1.8141
Google Scholar
[6]
D. Hariyadi, "Analisis Serangan Web Defacement pada Situs Web Pemerintah Menggunakan ELK Stack," JISKA (Jurnal Informatika Sunan Kalijaga), vol. 4, no. 1, Art. no. 1, Nov. 2019.
DOI: 10.14421/jiska.2019.41-01
Google Scholar
[7]
F. E. Nastiti, D. Hariyadi, and F. Bima, "TelegramBot: Crawling Data Serangan Malware dengan Telegram," CESS (Journal of Computer Engineering, System and Science), vol. 4, no. 1, p.51–54, Feb. 2019.
DOI: 10.24114/cess.v4i1.11436
Google Scholar
[8]
I. M.-A. P. Jakarta, "Indonesia Web Defacement Attacks Analysis for Anti Web Defacement," Jurnal TICOM, vol. 3, no. 3, p.93324, 2015.
Google Scholar
[9]
N. J. van Eck and L. Waltman, "VOS: A New Method for Visualizing Similarities Between Objects," in Advances in Data Analysis, Berlin, Heidelberg, 2007, p.299–306.
DOI: 10.1007/978-3-540-70981-7_34
Google Scholar
[10]
M. Hofmann, A. Chisholm, and A. Chisholm, Text Mining and Visualization : Case Studies Using Open-Source Tools. Chapman and Hall/CRC, 2016.
DOI: 10.1201/b19007
Google Scholar
[11]
"Open source intelligence base cyber threat inspection framework for critical infrastructures - IEEE Conference Publication." https://ieeexplore.ieee.org/document/7821730 (accessed Nov. 04, 2020).
DOI: 10.1109/ftc.2016.7821730
Google Scholar
[12]
I. Kamiya, "OSINT (Open Source Intelligence) Activities in Corporate CSIRT." NTT-CERT, 2016.
Google Scholar
[13]
F. Tabatabaei and D. Wells, "OSINT in the Context of Cyber-Security," 2016, p.213–231.
Google Scholar
[14]
N. McKelvey, K. Curran, L. Toland, N. McKelvey, K. Curran, and L. Toland, "The Challenges of Data Cleansing with Data Warehouses," http://services.igi-global.com/resolvedoi/ resolve.aspx?doi=10.4018/978-1-5225-0182-4.ch005, Jan. 01, 1AD. https://www.igi-global.com/gateway/chapter/157685 (accessed Nov. 04, 2020).
DOI: 10.4018/978-1-5225-0182-4.ch005
Google Scholar
[15]
"Low Carbon Education: A Review and Bibliometric Analysis." https://www.eu-jer.com/low-carbon-education-a-review-and-bibliometric-analysis (accessed Nov. 04, 2020).
Google Scholar
[16]
"Bareskrim Ringkus Hacker Yang Retas 1.309 Situs Milik Pemerintah Termasuk Polri - DIVISI HUMAS POLRI." https://humas.polri.go.id/2020/07/07/bareskrim-ringkus-hacker-yang-retas-1-309-situs-milik-pemerintah-termasuk-polri/ (accessed Nov. 04, 2020).
DOI: 10.46976/litbangpolri.v23i1.95
Google Scholar