DISRUPSI INFORMASI DAN MODEL PERAN JARINGAN ULAMA DALAM PENYAMPAIAN PESAN M...Ismail Fahmi
Dokumen tersebut membahas tentang disrupsi informasi dan model peran jaringan ulama dalam penyampaian pesan moderat. Ismail Fahmi menjelaskan tentang tren digital di Indonesia seperti media sosial dan aplikasi seluler, serta pendorong utama disrupsi seperti kecepatan perubahan teknologi dan sikap generasi milenial dan Z. Dokumen ini juga mengusulkan model jaringan komunikasi ulama yang terdistribusi di berbagai platform media serta menganalisis data sosial
Mata kuliah Rekayasa Perangkat Lunak 1 membahas proses pembangunan perangkat lunak secara sistematis dan terstruktur selama 15 minggu perkuliahan, mulai dari pengantar, pengenalan alat, metode scrum, rekayasa kebutuhan, analisis, perancangan, pengujian, hingga evaluasi. Referensi utama mata kuliah ini adalah buku Software Engineering karya Pressman, Sommerville, dan Kendall.
Long Lin at AI Frontiers : AI in GamingAI Frontiers
Games have been leveraging AI since the 1950s, when people built a rules-based AI engine that played tic-tac-toe. With technological advances over the years, AI has become increasingly popular and widely used in the gaming industry. The typical characteristics of games and game development makes them an ideal playground for practicing and implementing AI techniques, especially deep learning and reinforcement learning. Most games are well scoped; it is relatively easy to generate and use the data; and states/actions/rewards are relatively clear. In this talk, I will show a couple of use cases where ML/AI helps in-game development and enhances player experience. Examples include AI agents playing game and services that provide personalized experience to players.
Aplikasi perangkat lunak klinik kecantikan Ultimate Skin Care (USC) dirancang untuk mengelola data pasien, rekam medis, obat, penyakit, dan dokter secara digital. USC dimaksudkan untuk meningkatkan efisiensi pelayanan dengan menggantikan sistem manual di klinik kecantikan skala kecil.
This document is the preface to a book on Artificial Intelligence published by Rozy Publishing House. It provides an overview of the book's contents and development process. The book contains 10 chapters that cover topics such as problem representation, structured knowledge, rule-based systems, logic, expert systems, learning techniques, search strategies, and PROLOG programming. It was created over two years by authors and academic experts to provide relevant study material for undergraduate and postgraduate AI courses. Feedback from readers is welcomed so the book can be improved in future publications.
DISRUPSI INFORMASI DAN MODEL PERAN JARINGAN ULAMA DALAM PENYAMPAIAN PESAN M...Ismail Fahmi
Dokumen tersebut membahas tentang disrupsi informasi dan model peran jaringan ulama dalam penyampaian pesan moderat. Ismail Fahmi menjelaskan tentang tren digital di Indonesia seperti media sosial dan aplikasi seluler, serta pendorong utama disrupsi seperti kecepatan perubahan teknologi dan sikap generasi milenial dan Z. Dokumen ini juga mengusulkan model jaringan komunikasi ulama yang terdistribusi di berbagai platform media serta menganalisis data sosial
Mata kuliah Rekayasa Perangkat Lunak 1 membahas proses pembangunan perangkat lunak secara sistematis dan terstruktur selama 15 minggu perkuliahan, mulai dari pengantar, pengenalan alat, metode scrum, rekayasa kebutuhan, analisis, perancangan, pengujian, hingga evaluasi. Referensi utama mata kuliah ini adalah buku Software Engineering karya Pressman, Sommerville, dan Kendall.
Long Lin at AI Frontiers : AI in GamingAI Frontiers
Games have been leveraging AI since the 1950s, when people built a rules-based AI engine that played tic-tac-toe. With technological advances over the years, AI has become increasingly popular and widely used in the gaming industry. The typical characteristics of games and game development makes them an ideal playground for practicing and implementing AI techniques, especially deep learning and reinforcement learning. Most games are well scoped; it is relatively easy to generate and use the data; and states/actions/rewards are relatively clear. In this talk, I will show a couple of use cases where ML/AI helps in-game development and enhances player experience. Examples include AI agents playing game and services that provide personalized experience to players.
Aplikasi perangkat lunak klinik kecantikan Ultimate Skin Care (USC) dirancang untuk mengelola data pasien, rekam medis, obat, penyakit, dan dokter secara digital. USC dimaksudkan untuk meningkatkan efisiensi pelayanan dengan menggantikan sistem manual di klinik kecantikan skala kecil.
This document is the preface to a book on Artificial Intelligence published by Rozy Publishing House. It provides an overview of the book's contents and development process. The book contains 10 chapters that cover topics such as problem representation, structured knowledge, rule-based systems, logic, expert systems, learning techniques, search strategies, and PROLOG programming. It was created over two years by authors and academic experts to provide relevant study material for undergraduate and postgraduate AI courses. Feedback from readers is welcomed so the book can be improved in future publications.
Dalam Development sebuah perangkat lunak/software terkadang para developer memiliki kesulitan untuk mencari satuan yang dapat mendeskripsikan ukuran dari sofware yang akan dibuat.
Salah satu cara yang populer untuk melakukan pengukuran perangkat lunak dapat mengunakan cara yang bernama FUNCTION POINT.
Artificial intelligence (AI) is the study of intelligent machines and computer systems that can exhibit human-like intelligence. Some key applications of AI include planning, pattern recognition, robotics, and artificial neural networks. While today's AI systems can perform tasks like face recognition and machine translation, they still cannot understand language as robustly as humans or interpret arbitrary visual scenes. Future advances in AI may allow greater use of expert systems, AI research assistants, and machines that can pass the Turing Test.
Dokumen tersebut membahas tentang sistem pakar khususnya forward chaining dan backward chaining. Forward chaining adalah pendekatan data-driven dimana inferensi dimulai dari fakta yang tersedia, sedangkan backward chaining adalah pendekatan goal-driven dimana inferensi dimulai dari tujuan yang diinginkan. Dokumen ini juga memberikan contoh kasus penerapan sistem pakar untuk konsultasi investasi.
Artificial intelligence has evolved from early attempts to model human brain functions to today's highly developed systems using neural networks and machine learning. Key branches of AI include artificial neural systems, computer vision, natural language processing, machine learning, and robotics. Notable achievements include IBM's Watson beating human champions on Jeopardy!, Stanford's autonomous helicopter performing aerobatic stunts, and Anthropic's Constitutional AI assisting the UN.
Digital Safety - Mengenal Fitur Proteksi Perangkat DigitalFajar Muharom
Pilar Literasi Digital Keamanan Digital - Mengenal Fitur Proteksi Perangkat Digital.
Materi ini dipresentasikan dalam kegiatan Webinar Program Gerakan Literasi Digital Nasional, Kemenkominfo dan Siberkreasi.
Dokumen tersebut membahas tentang penjadwalan proses pada sistem operasi. Ada beberapa tujuan penjadwalan yaitu keadilan, efisiensi, dan waktu tanggap yang minimal. Dibahas pula jenis-jenis penjadwalan seperti jangka pendek, menengah, dan panjang serta strategi nonpreemptif dan preemptif. Algoritma penjadwalan yang dijelaskan antara lain round robin, FIFO, prioritas, dan MFQ.
Dokumen tersebut merupakan soal dan pembahasan mengenai rekayasa perangkat lunak yang mencakup 20 soal pilihan ganda dan jawabannya. Soal-soal tersebut meliputi konsep-konsep dasar rekayasa perangkat lunak seperti analisis kebutuhan, manajemen proyek, organisasi, dan studi kelayakan.
Sistem ini bertujuan untuk mengintegrasikan proses ekspedisi dengan teknologi IoT agar pelacakan barang dan informasi lainnya dapat diakses secara digital. Proyek ini akan mengembangkan sistem ekspedisi berbasis web dan mobile untuk memenuhi kebutuhan pelanggan akan kenyamanan dan transparansi layanan.
Yasayan Bir Organizma: YAZILIM - YTU-KVK Finans ve Yazilim Gunleri - 18.11.2013Hakan ERDOGAN
Yıldız Teknik Üniversitesi Kalite ve Verimlilik Kulübü tarafından düzenlenen Finans ve Yazılım Günleri'13 (#finansveyazilimgunleri) etkinliğinde yaptığım sunum. Yaşayan Bir Organizma: Yazılım
Dalam Development sebuah perangkat lunak/software terkadang para developer memiliki kesulitan untuk mencari satuan yang dapat mendeskripsikan ukuran dari sofware yang akan dibuat.
Salah satu cara yang populer untuk melakukan pengukuran perangkat lunak dapat mengunakan cara yang bernama FUNCTION POINT.
Artificial intelligence (AI) is the study of intelligent machines and computer systems that can exhibit human-like intelligence. Some key applications of AI include planning, pattern recognition, robotics, and artificial neural networks. While today's AI systems can perform tasks like face recognition and machine translation, they still cannot understand language as robustly as humans or interpret arbitrary visual scenes. Future advances in AI may allow greater use of expert systems, AI research assistants, and machines that can pass the Turing Test.
Dokumen tersebut membahas tentang sistem pakar khususnya forward chaining dan backward chaining. Forward chaining adalah pendekatan data-driven dimana inferensi dimulai dari fakta yang tersedia, sedangkan backward chaining adalah pendekatan goal-driven dimana inferensi dimulai dari tujuan yang diinginkan. Dokumen ini juga memberikan contoh kasus penerapan sistem pakar untuk konsultasi investasi.
Artificial intelligence has evolved from early attempts to model human brain functions to today's highly developed systems using neural networks and machine learning. Key branches of AI include artificial neural systems, computer vision, natural language processing, machine learning, and robotics. Notable achievements include IBM's Watson beating human champions on Jeopardy!, Stanford's autonomous helicopter performing aerobatic stunts, and Anthropic's Constitutional AI assisting the UN.
Digital Safety - Mengenal Fitur Proteksi Perangkat DigitalFajar Muharom
Pilar Literasi Digital Keamanan Digital - Mengenal Fitur Proteksi Perangkat Digital.
Materi ini dipresentasikan dalam kegiatan Webinar Program Gerakan Literasi Digital Nasional, Kemenkominfo dan Siberkreasi.
Dokumen tersebut membahas tentang penjadwalan proses pada sistem operasi. Ada beberapa tujuan penjadwalan yaitu keadilan, efisiensi, dan waktu tanggap yang minimal. Dibahas pula jenis-jenis penjadwalan seperti jangka pendek, menengah, dan panjang serta strategi nonpreemptif dan preemptif. Algoritma penjadwalan yang dijelaskan antara lain round robin, FIFO, prioritas, dan MFQ.
Dokumen tersebut merupakan soal dan pembahasan mengenai rekayasa perangkat lunak yang mencakup 20 soal pilihan ganda dan jawabannya. Soal-soal tersebut meliputi konsep-konsep dasar rekayasa perangkat lunak seperti analisis kebutuhan, manajemen proyek, organisasi, dan studi kelayakan.
Sistem ini bertujuan untuk mengintegrasikan proses ekspedisi dengan teknologi IoT agar pelacakan barang dan informasi lainnya dapat diakses secara digital. Proyek ini akan mengembangkan sistem ekspedisi berbasis web dan mobile untuk memenuhi kebutuhan pelanggan akan kenyamanan dan transparansi layanan.
Yasayan Bir Organizma: YAZILIM - YTU-KVK Finans ve Yazilim Gunleri - 18.11.2013Hakan ERDOGAN
Yıldız Teknik Üniversitesi Kalite ve Verimlilik Kulübü tarafından düzenlenen Finans ve Yazılım Günleri'13 (#finansveyazilimgunleri) etkinliğinde yaptığım sunum. Yaşayan Bir Organizma: Yazılım
PRISMA CSI • Cyber Security and Intelligence www.prismacsi.com
Bu doküman, alıntı vererek kullanılabilir ya da paylaşılabilir ancak değiştirilemez ve ticari amaçla kullanılamaz. Detaylı bilgiye https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.tr bağlantısından erişebilirsiniz.
Bilgi Güvenliği üzerine ARGE yapmak ve müşteriye ihtiyaç duyduğu ürünleri üretebilmek amacıyla kurulmuştur. 1999 yılından beri bilgi güvenliği konusunda sahip olduğu deneyimleri ile bu konuda çalışan herkesin işini kolaylaştırma hedefindedir. Bu bağlamda ilk iş olarak SECURISKOP projesini gerçekleştirmiş ve bunu bir ürün haline getirmiştir. SECURISKOP, piyasada bulunan güvenlik açıklıkları tarama yazılımlarını yönetip, bunlara ek özellikler sağlayarak, güvenlik açıklıkları ve bunların kapatılmasını kolaylaştıran bir platformdur.
Uç nokta güvenliğinin önemi, EPP ve EDR çözümleri,
Microsoft ATA ve osquery gibi yardımcı hızlı araçlar
Hazırlayan: Fevziye Taş, Bilgi Güvenliği Mühendisi
The document discusses Android malware detection mechanisms. It outlines the major types of Android malware like backdoors and spyware. It then describes several approaches to malware detection like static analysis of APK files to examine permissions, activities, and API calls. Signature-based analysis uses a signature database to classify apps as benign or malware. Tools for static analysis like apktool, aapt, and dex2jar are also mentioned. The document concludes with comparisons of different Android malware detection systems and their abilities.
The document discusses decision trees and the ID3 algorithm. It provides an overview of decision trees, describing their structure and how they are used for classification. It then explains the ID3 algorithm, which builds decision trees based on entropy and information gain. The key steps of ID3 are outlined, including calculating entropy and information gain to select the best attributes to split the data on at each node. Pros and cons of ID3 are also summarized. An example applying ID3 to classify characters from The Simpsons is shown.
2. Ajanda
● Android Market Pazarı
● Kötücül Yazılım Çeşitleri
● Android Güvenlik Mekanizması
● Kullanıcı Profili
● Statik Analiz Yaklaşımı
● İmza Tabanlı Analiz ve Koruma
● Kriptolu Veri İletişimi ile Koruma
● Öne Sürülen Mimari
6. Neden Android?
● Açık kaynak kodlu
● Google destekli
● Ücretsiz
● Linux tabanlı
● Java
● Zengin SDK
● Güçlü üçüncü şahıs
community ve üretici destekleri
○ Sony, Motorola, HTC, Samsung
9. Kötücül Yazılımlar Çeşitleri
● Arka kapı (Backdoor)
○ Şifresiz erişim/ele geçirme
● Exploit
○ İşletim sisteminin modifiye edilmesi
○ Arayüzlerin değiştirilmesi
● Spyware
○ İzinsiz reklamlar
○ Gizli bilgi toplaması, iletimi
○ Yetkisiz işlemler (SMS, arama)
10. Android Güvenlik Mekanizması
● İzin tabanlı
○ Kabul / Red
● Herkese açık, korumasız market
○ Herkes her türlü uygulamayı
yükleyebilmekte
● Pasif koruma - geri bildirim tabanlı
○ Olumsuz geri dönüş sonrası
uygulamalar marketten
kaldırılmakta
11. Kullanıcı Profili
%42
İzinlerden habersiz
%83
İzinlere vakit ayırmıyor
Kaynak: Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User
Attention, Comprehension, and Behavior. Proceedings of the Eighth Symposium on Usable Privacy and
Security - SOUPS ’12. p. 1 (2012).
12. Statik Analiz Yaklaşımı
● APK dosyalarının ters mühendislik yöntemi
kullanarak incelenmesi
● Manifest dosyası
○ İzinler
○ Aktiviteler
○ Servisler
○ Alıcılar
● API çağrıları
● Kaynak kod taraması
17. Örnek ölü kod tespiti
Hiçbir zaman
kullanılamayacak kod
bloğu
Erişilemeyen
kod
18. İmza Tabanlı Analiz ve Koruma
● Kötücül yazılım imza veritabanı
● Akıllı telefon istemcisi
● Merkez sunucu
● Öğrenmeye dayalı bir çözüm
● Sınıflandırma
Zararsız Kötücül
20. Kriptolu Veri İletişimi ve Koruma
● Değerli tüm veriler şifreli olarak SQLite
veritabanında saklanıp, gerektiğinde çözülerek
iletilmektedir.
● SMS
● Email
● Hassas dosyalar
● Şifreler
● Kimlik bilgileri
Pocatilu, 2011
21. Sistem Karşılaştırmaları
Yetenek MADAM DroidMat Julia
Manifest İncelemesi Var Var Var
API çağrı izlemesi Var Var Var
İmza veritabanı Var Var Yok
Güvenli veri alışverişi Yok Yok Yok
Makine öğrenmesi Var Var Yok
22. Referanslar I
● Bicheno, S.: Android Captures Record 81 Percent Share of Global Smartphone Shipments in
Q3 2013, http://blogs.strategyanalytics.com/WSS/post/2013/10/31/Android-Captures-
Record-81-Percent-Share-of-Global-Smartphone-Shipments-in-Q3-2013.aspx.
● Rowinski, D.: Google Play Hits One Million Android Apps, http://readwrite.
com/2013/07/24/google-play-hits-one-million-android-apps.
● Cisco 2014 Annual Security Report, https://www.cisco.
com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf.
● Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild.
SPSM ’11 Proceedings
● Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, You, Get Off of My Market: Detecting Malicious
Apps in Official and Alternative Android Markets. Proceedings of the 19th Annual Network
and Distributed System Security Symposium (NDSS) (2012).
● Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User
Attention, Comprehension, and Behavior. Proceedings of the Eighth Symposium on Usable
Privacy and Security - SOUPS ’12. p. 1 (2012).
● Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions.
Proceeding of the WebApps’11 Proceedings of the 2nd USENIX conference on Web
application development. p. 7. USENIX Association, Berkeley, CA, USA (2011).
● Enck, W., Ongtang, M., Mcdaniel, P.: On Lightweight Mobile Phone Application Certification.
ACM conference on Computer and communications security. pp. 235–245 (2009).
23. Referanslar II
● Android Architecture, http://www.tutorialspoint.
com/android/android_architecture.htm.
● Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., Wu, K.-P.: DroidMat: Android
Malware Detection through Manifest and API Calls Tracing. 2012 Seventh
Asia Joint Conference on Information Security. pp. 62–69 (2012).
● Payet, É., Spoto, F.: Static analysis of Android programs, (2012).
● Guido, M., Ondricek, J., Grover, J., Wilburn, D., Nguyen, T., Hunt, A.:
Automated identification of installed malicious Android applications. Digital
Investigation (2013).
● Dini, G., Martinelli, F., Saracino, A., Sgandurra, D.: MADAM: A Multi-level
Anomaly Detector for Android Malware. In: Kotenko, I. and Skormin, V. (eds.)
Computer Network Security. pp. 240–253. Springer Berlin Heidelberg, Berlin,
Heidelberg (2012).
● Pocatilu, P.: Android applications security. Inform. Econ. 15, 163–171.
Retrieved from http://revistaie.ase.ro (2011).