APLIKASI UNTUK DETEKSI ADANYA SPOOF PADA EMAIL
Abstract
Full Text:
PDFReferences
Chhabra, G. S. (2015). Review of E-mail System , Security Protocols and Email Forensics, 5(3), 201–211.
Devendran, V. K., Shahriar, H., & Clincy, V. (2015). A Comparative Study of Email Forensic Tools. Journal of Information Security, 06(02), 111–117. doi:10.4236/jis.2015.62012.
Email Security - What Are The Issues? http://www.netsecurity.org/article.php?id=816
S.Gupta,E. S. Pilli, P. Mishra, S. Pundir, and R. C. Joshi, “Forensic Analysis of E-mail Address Spoofing,” pp. 898-904, 2014.
R. Mathew, A. A. Hajj, and K. A. Ruqeishi, "Cyber crimes: Threats and protection," in International Conference on Networking and Information Technology (ICNIT) 2010, pp. 16-18.
Banday, M. T. (2011). T ECHNIQUES AND TOOLS FOR F ORENSIC I NVESTIGATION OF E- MAIL, 3(6), 227–241. Retrieved fromairccse.org/journal/nsa/1111nsa17.pdf
Karsono, K. (2012). FORENSIK E-MAIL. Retrieved from http://ejurnal.esaunggul.ac.id/index.php/Formil/article/download/791/724
Chandraleka, H. (2009). Trik Mengantisipasi Hacking Email. (I. Rouf, Ed.) (1st ed.). Jakarta: mediakita.
DOI: https://doi.org/10.32520/stmsi.v7i3.380
Article Metrics
Abstract view : 1000 timesPDF - 196 times
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.