Open Menu
Skip to main content
Skip to main navigation menu
Skip to site footer
Current
Archives
NEWS
CALL FOR PAPER
Publication Ethics
About
About the Journal
Submissions
Peer Review Process
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 6 No. 2 (2025): Jurnal Telkommil
Vol. 6 No. 2 (2025): Jurnal Telkommil
DOI:
https://doi.org/10.54317/kom.v6i2
Published:
2025-10-25
Articles
Teknologi KONTROL AKSES ZERO TRUST BERBASIS BIOMETRIK PERILAKU UNTUK KENDARAAN OTONOM
Rekayasa Keamanan Siber
1-7
pdf
Tecnology FPV Camera Gimbal Controller Design Synchronized with the SS2 Weapons Platform on an IMU-Based Quadcopter Drone
Telkommil
Nur Rachman Supadmana Muda , Choirul Rio Prabowo
7-22
pdf
A IMPLEMENTASI SISTEM JAMMING BERBASIS FREKUENSI GUNA MENGECOH SINYAL REMOTE CONTROL ILEGAL
IMPLEMENTASI SISTEM JAMMING BERBASIS FREKUENSI GUNA MENGECOH SINYAL REMOTE CONTROL ILEGAL
tomy andri, Desy Derius Minggu
22-32
pdf
Teknologi BLOCKCHAIN IMPLEMENTATION IN MILITARY LOGISTICS AND COMMUNICATION SYSTEMS
Rekam Siber
Yovi Retmawan
22-30
pdf
Teknologi ENHANCING TRANSPARENCY AND ACCOUNTABILITY IN CORN SUPPLY CHAINS THROUGH BLOCKCHAIN AND NFT BASED TRACEABILITY A QUANTITATIVE EXPERIMENT WITH HYPERLEDGER BESU
Telekomunikasi
Ahmad Dody Setyawan; Nur, Transisma
36-48
pdf
A Official Vehicle Movement Monitoring System Using Dijkstra's Algorithm on GPS and Real-Time Notifications
Journal Poltekad, Vol, SIPAKAD vehicle movement monitoring.
mohammad yuslan, Desy Derius Minggu
59-70
pdf
Teknologi TEMPERATURE AND HUMIDITY CONTROL SYSTEM FOR A MUNITIONS WAREHOUSE: INTEGRATING IOT, MACHINE LEARNING, AND INDEPENDENT CONTROL
Telekomunikasi
faisal akbar
70-80
pdf
Teknologi PENGEMBANGAN SISTEM ENKRIPSI DATA LOG PADA GROUND CONTROL STATION DRONE MILITER
Telekomunikasi
70-79
pdf
D DEVELOPMENT OF AN INTEGRATED OFFICIAL VEHICLE DATA MANAGEMENT SYSTEM USING QR CODES AND ACTIVITY LOGS
DEVELOPMENT OF AN INTEGRATED OFFICIAL VEHICLE DATA MANAGEMENT SYSTEM USING QR CODES AND ACTIVITY LOGS
Daru Argya Yudistira, Isa Mahfudi
70-83
pdf
teknologi PEMANFAATAN ENERGI SURYA UNTUK MENDUKUNG SISTEM PERTANIAN CERDAS BERBASIS IOT
Telekomunikasi
Dede Lucky
79-85
pdf
teknologi Rancang Bangun Solar Dome sebagai Inovasi Teknik Pengeringan Garam Berbasis Energi Surya
telekomonikasi
dedi hermansyah
85-91
pdf
teknologi PENGEMBANGAN SISTEM IRIGASI ADAPTIF MENGGUNAKAN KECERDASAN BUATAN DAN SENSOR LINGKUNGAN
telkomunikasi
Aloysius aloy
92-98
PDF
Teknologi ESP32-BASED SMART OFFICE PROTOTYPE WITH WI-FI AND MQTT INTEGRATION ON TELECOMMUNICATIONS INFRASTRUCTURE
Telekomunikasi
rifqi.susendo
99-107
PDF
Teknologi DEVELOPMENT OF AN INTERACTIVE CRYPTOGRAPHING MACHINE BASED ON HIDING FILES IN FILES WITH A LIBRARY PROCESSING LIBRARY FOR JAVASCRIPT ON THE LOCALHOST PLATFORM
Telekomunikasi
Hasby Fajrus Shodiq
108-116
PDF
Teknologi IMPLEMENTASI SENSOR MPU6050 DALAM MENDETEKSI PERGERAKAN PADA SMART PATOK PERBATASAN RI-MALAYSIA
Telekomunikasi
Rendy Sulistia
117-124
PDF
Teknologi IMPLEMENTATION OF AN IOT-BASED FOR WEAPONS INVENTORY SYSTEM USING BARCODE TECHNOLOGY FOR WEAPONS INFLOW AND OUTFLOW TRACKING AT THE POLTEKAD’S WEAPONS ARMORY
Telekomunikasi
Maulana Hasan, Gatut Yulisusianto
125-134
PDF
Teknologi Automatic Spraying System for Plants based on Leaf Image Detection by Using Raspberry Pi Camera Model V2
Telekomunikasi
Ade Barokah, Choirul Rio Prabowo
134-142
PDF
Teknologi IMPLEMENTASI TEKNOLOGI MONITORING BERBASIS WEB SERVER PADA ROMPI MILES DENGAN TOMBOL MEMBRAN UNTUK LATIHAN EFEKTIF PERSONEL TNI-AD
Telekomonikasi Militer
sirajuddin juddin
135-145
PDF
Teknologi Optimization of Honeypots for Real-Time Cyberattack Mitigation Using AI and Log Analysis to Detect New Attacks
Rekayasa Keamanan Siber
Dimas Pramudya Pratama
146-152
PDF
Implementation of a One-Time Token for PDF Document Security Based on AES-128 Encryption
Rekaya Keamanan Siber
Hermansyah Syah, Desyderius Minggu, Asep Suryanta
153-165
PDF
Token One-Time Password Berbasis Waktu dengan HMAC-SHA3
Rekayasa Keamanan Siber
Gilang Nugroho Pratomo
PDF
Intelligent System for Real-Time Weapon and Combat Equipment Detection Based on Computer Vision for Military Base Security
Rekayasa Keamanan Siber
Yudhi Darmawan , Ilyas Hasmi, Robianto Herdana Sukirno
166-174
PDF
Perancangan Sistem Klasifikasi Jenis Konten QR Code Berbasis Analisis Data untuk Validasi Keamanan Tautan
Rekayasa Keamanan Siber
Nico Fahrul, Jeki Saputra, Transisma Budiarta
175-182
PDF
Qualitative Analysis of the Security of URLs Extracted from QR Codes Using Artificial Intelligence: A Review of Current Literature
Rekayasa Keamanan Siber
Gatut Yulisusianto, M. Andi Kurniawan, Yohanes Dwi Cahyono
183-193
PDF
Analisa Anomali Traffic Log Honeypot di Web Server
Rekayasa Keamanan Siber
Yuef Okky Pradana, Jeki Saputra, Robianto Herdana Sukirno
194-198
PDF
SmartDork: Design of a Modular Search Application Based on Google Dork Using Flask
Rekayasa Keamanan Siber
Try Haryadi, Nurrahman SM, Yohanes Dwi Cahyono
194-201
PDF
Tim Editor
Reviewer Teams
Author Guidelines
Journal History
Statistik
Indexing
Policies
TOOLS
QUICK MENU
EDITORIAL BOARD
REVIEWER TEAMS
AUTHOR GUIDLINES
PUBLICATION ETHICS
FOCUS AND SCOPE
PEER REVIEW PROCESS
JOURNAL HISTORY
INDEXING
POLICIES
Information
For Readers
For Authors
For Librarians
Language
Bahasa Indonesia
English