To see the other types of publications on this topic, follow the link: Captive portal.

Journal articles on the topic 'Captive portal'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Captive portal.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mustika, Fandi Ali, Febryo Ponco Sulistyo, and Chairul Anhar Tanof. "Implementasi System Captive Portal Dengan Otentikasi RADIUS." Jurnal Ilmiah FIFO 12, no. 1 (2020): 49. http://dx.doi.org/10.22441/fifo.2020.v12i1.005.

Full text
Abstract:
Abstract The rapid development of Internet networks in offices, industries, homes, and universities, transforming the conventional system into modern, especially with the Internet. Therefore, it is very important to use a good authentication method to avoid unauthorized user access. Wireless network without authentication can harm users in their activities using Internet access. One of the most effective ways for secure wireless network authentication with Captive portals with Radius authentication method. Captive portals are web pages that control Hyper Text Transfer Protocol (HTTP) browser a
APA, Harvard, Vancouver, ISO, and other styles
2

Budiansyah, Arie, Dirja Nur Ilham, and Rudi Arif Candra. "Design of captive portal LAN with redundancy connections." Journal of Computer Networks, Architecture and High Performance Computing 3, no. 1 (2021): 115–22. http://dx.doi.org/10.47709/cnahpc.v3i1.998.

Full text
Abstract:
Captive portal networks are in great demand because users have privileged authentication in the form of usernames and passwords to enter the LAN network without having to share with other users. However, the captive portal network is difficult to implement redundant connection because it must be in the form of a ring topology and the application of a bridge network. Captive portal is a web page for the authentication process to enter the network where the authentication back end can use radius, kerberos, ldap with the AAA framework. Meanwhile, fault tolerance is a redundant connection mechanis
APA, Harvard, Vancouver, ISO, and other styles
3

Tahina, Rasolofoniaina Samoelina, and Garima Pathak. "Network Security: Captive Portal." Journal of Wireless Network Security 6, no. 1 (2020): 7–9. http://dx.doi.org/10.37628/ijowns.v6i1.570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Michael, Michael, Ikhwan Ruslianto, and Rahmi Hidayati. "Analisis Perbandingan Sistem Keamanan Jaringan Wi-Fi Protected Access 2-Pre Shared Key (WPA2-PSK) Dan Captive Portal Pada Jaringan Publik Wireless." Coding Jurnal Komputer dan Aplikasi 9, no. 01 (2021): 108. http://dx.doi.org/10.26418/coding.v9i01.45902.

Full text
Abstract:
Wi-Fi Protected Access 2-Pre Shared Key (WPA2-PSK) dan captive portal adalah tipe keamanan untuk keamanan jaringan wireless dan banyak digunakan oleh penyedia jaringan publik wireless atau sering disebut hotspot. Jaringan publik wireless adalah area dimana seorang client dapat terhubung ke jaringan internet. Sistem keamanan WPA2-PSK dan captive portal masih memiliki celah keamanan yang dapat dieksploitasi dan rentan terhadap serangan. Penelitian ini berhasil menyederhanakan penggunaan tools yang masih menggunakan commandline berbasis text dengan interface berbasis desktop yang telah dimodifika
APA, Harvard, Vancouver, ISO, and other styles
5

Ammar, Brian Damara, Arif Hidayat, and Dani Anggoro. "PERANCANGAN CAPTIVE PORTAL DAN MANAJEMEN BANDWIDTH MENGGUNAKAN ROUTER MIKROTIK PADA KANTOR KECAMATAN PUNGGUR." Jurnal Mahasiswa Ilmu Komputer 6, no. 1 (2025): 96–103. https://doi.org/10.24127/ilmukomputer.v6i1.4662.

Full text
Abstract:
Abstrak : Salah satu instansi pemerintahan kantor kecamatan Punggur yang berada di Jalan Sidomulyo Punggur, Tanggul Angin, Kecamatan Punggur, Kabupaten Lampung Tengah memiliki kendala internet Dikarenakan belum adanya captive portal dan manajemen bandwidth. Tujuan pelaksanaan penelitian ini yaitu dapat merancang captive portal dan manajemen bandwidth menggunakan router MikroTik pada Kantor Kecamatan Punggur. Metode yang digunakan dalam penelitian ini adalah NDLC (Network Development Life Cycle), topologi jaringan aplikasi Cisco Paket Tracer dan konfigurasi Captive Portal menggunakkan router Mi
APA, Harvard, Vancouver, ISO, and other styles
6

Andjarwirawan, Justinus. "Single Sign-On (SSO) Implementation Using Keycloak, RADIUS, LDAP, and PacketFence for Network Access." Teknika 14, no. 1 (2025): 41–46. https://doi.org/10.34148/teknika.v14i1.1089.

Full text
Abstract:
The increasing demand for secure, seamless authentication mechanisms in public and private networks has fueled the need for more robust network access control (NAC) systems, as well as Single Sign-On (SSO) which is critical for organizations that require seamless and secure access across different platforms. This paper explores SSO in a fully open source implementations with Keycloak, RADIUS and LDAP; extending to captive portal implementations with PacketFence for Wi-Fi authentication. Specifically, this paper highlights the integration of PacketFence with FreeRADIUS for captive portal authen
APA, Harvard, Vancouver, ISO, and other styles
7

Listartha, I. Made Edy. "AUTOMASI WEBSITE BROWSER UNTUK MELAKUKAN AUTOLOGIN KE DALAM CAPTIVE PORTAL." Jurnal Ilmiah Informatika Komputer 25, no. 2 (2020): 98–106. http://dx.doi.org/10.35760/ik.2020.v25i2.2766.

Full text
Abstract:
Penggunaan captive portal dalam sekuriti jaringan komputer menuntut pengguna untuk selalu melakukan registasi pada halaman hotspot saat diperlukan. Penelitian ini menanfaatkan website browser lynx berbasis teks sebagai sarana untuk melakukan registrasi pada captive portal yang di automasi dengan script yang berisi username dan password pengguna. Perangkat penelitiannya sendiri menggunakan software simulasi yang menjalankan RouterOS mikrotik dan linux sebagai pengguna. Mikrotik dibangun sebagai captive portal dengan menggunaan setup wizard dengan konfigurasi IP 192.168.200.1/24, menjalankan fun
APA, Harvard, Vancouver, ISO, and other styles
8

Riadi, Imam, Abdul Fadlil, and Basit Adhi Prabowo. "Optimalisasi Layanan Keamanan Captive Portal Menggunakan Klasifikasi Logistic Regression." INFORMAL: Informatics Journal 9, no. 3 (2024): 189. https://doi.org/10.19184/isj.v9i3.44189.

Full text
Abstract:
Privacy has become a major concern with the rapid adoption of various smart devices and internet connections. The randomized MAC (Media Access Control) address for each device was implemented for privacy. Problems arose when implementing randomized MAC addresses on captive portals with connection limitations per user. Random classification by VOUI of the device used to assist the device elimination decisions in the captive portal. MAC address data was obtained from devices connected to the captive portal. The data is processed to be grouped into two separate classes, whether random or not, wit
APA, Harvard, Vancouver, ISO, and other styles
9

Kimura, Keiichiro, Hiroki Kuzuno, Yoshiaki Shiraishi, and Masakatu Morii. "Man-in-the-Portal: Breaking SSL/TLS Silently Abusing Captive Portal." Journal of Information Processing 32 (2024): 1066–81. https://doi.org/10.2197/ipsjjip.32.1066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rivera-Dourado, Martiño, Marcos Gestal, Alejandro Pazos, and Jose Vázquez-Naya. "A Novel Protocol Using Captive Portals for FIDO2 Network Authentication." Applied Sciences 14, no. 9 (2024): 3610. http://dx.doi.org/10.3390/app14093610.

Full text
Abstract:
FIDO2 authentication is starting to be applied in numerous web authentication services, aiming to replace passwords and their known vulnerabilities. However, this new authentication method has not been integrated yet with network authentication systems. In this paper, we introduce FIDO2CAP: FIDO2 Captive-portal Authentication Protocol. Our proposal describes a novel protocol for captive-portal network authentication using FIDO2 Authenticators as security keys and passkeys. For validating our proposal, we have developed a prototype of FIDO2CAP authentication in a mock scenario. Using this proto
APA, Harvard, Vancouver, ISO, and other styles
11

Rivera-Dourado, Martiño, M. Gestal, A. Pazos, and José Vázquez-Naya. "A Novel Protocol Using Captive Portals for FIDO2 Network Authentication." Applied sciences 14, no. 9 (2024): 3610. https://doi.org/10.3390/app14093610.

Full text
Abstract:
FIDO2 authentication is starting to be applied in numerous web authentication services, aiming to replace passwords and their known vulnerabilities. However, this new authentication method has not been integrated yet with network authentication systems. In this paper, we introduce FIDO2CAP: FIDO2 Captive-portal Authentication Protocol. Our proposal describes a novel protocol for captive-portal network authentication using FIDO2 Authenticators as security keys and passkeys. For validating our proposal, we have developed a prototype of FIDO2CAP authentication in a mock scenario. Using this proto
APA, Harvard, Vancouver, ISO, and other styles
12

Jude Saskara, Gede Arna, I. Putu Oktap Indrawan, and Putu Maha Putra. "KEAMANAN JARINGAN KOMPUTER NIRKABEL DENGAN CAPTIVE PORTAL DAN WPA/WPA2 DI POLITEKNIK GANESHA GURU." Jurnal Pendidikan Teknologi dan Kejuruan 16, no. 2 (2019): 236. http://dx.doi.org/10.23887/jptk-undiksha.v16i2.18559.

Full text
Abstract:
Pada Revolusi Industri 4.0 saat ini perkembangan jaringan komputer sudah semakin pesat. Dilihat dari media penghubung antara komputer satu dengan komputer satunya yang sebelumnya masih menggunakan kabel, sekarang ini sudah berubah menjadi tanpa menggunakan perantara kabel atau istilahnya nirkabel atau wireless. Salah satu instansi swasta yaitu Politeknik Ganesha Guru banyak memanfaatkan teknologi jaringan komputer yang bersifat nirkabel atau wireless. Penggunaan jaringan komputer nirkabel diinstansi dibangun untuk mendukung kegiatan administrasi hingga kegiatan perkuliahan di Politeknik Ganesh
APA, Harvard, Vancouver, ISO, and other styles
13

Ramadanti, Mega, Arif Hidayat, and Mustika. "Implementasi Sistem Autentikasi dan Pengamanan Jaringan Wireless Berbasis Captive Portal Di PKBM Al Suroya." Jurnal Mahasiswa Ilmu Komputer 6, no. 1 (2025): 55–66. https://doi.org/10.24127/ilmukomputer.v6i1.6921.

Full text
Abstract:
Kebutuhan akan akses internet sudah menjadi kebutuhan penting di kalangan pemerintahan, bisnis, maupun bidang pendidikan.Teknologi internet ini sudah semakin pesat dan telah mencapai kebutuhan puncak. Begitu juga pada PKBM Al Suroya Metro Timur yang telah ikut dalam perkembangan jaringan internet. Pada PKBM Al Suroya Metro Timur sendiri sudah menggunakan teknologi wireless sebagai sarana prasarana hotspot bagi siswa/siswi dan guru. Dalam hal ini penulis akan mengembangkan suatu jaringan wireless berbasis captive portal menggunakan MikroTik Router RB-941-2ND. Didalam penyusunannya penulis mengg
APA, Harvard, Vancouver, ISO, and other styles
14

Karawita, A. C., R. C. Rajapakse, P. G. I. D. Amarasiri, et al. "Cecocolic Intussusception in an Asian Elephant (Elephas maximus) in Sri Lanka Associated with Chronic Hepato-Intestinal Schistosomiasis: A Case Report." International Journal of Applied Sciences and Biotechnology 3, no. 4 (2015): 744–46. http://dx.doi.org/10.3126/ijasbt.v3i4.13989.

Full text
Abstract:
A 25 year old female captive Asian elephant weighing approximately 3000kgs died and was subjected to a complete necropsy within 5 hours post mortem. Grossly, the elephant had sub-cutaneous edema, cecocolic intussusception and ascites. Histopathological examination revealed multifocal, granulomatous, portal phlebitis in the liver, multifocal, granulomatous, peri-portal hepatitis with marked portal and perisinusoidal fibrosis, and multifocal granulomatous colitis with intralesional Schistosoma eggs. To our knowledge, this is the first report of cecocolic intussusception in an Asian elephant asso
APA, Harvard, Vancouver, ISO, and other styles
15

Thiyagarajan, Gogulakrishnan. "Enhancing Captive Portal Authentication with Zero-Knowledge Proofs (ZKP)." International Journal of Computer Applications 186, no. 48 (2024): 43–51. http://dx.doi.org/10.5120/ijca2024924144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Siregar, Jonathan Daniel, and Ahmad Chusyairi. "Implementasi Authentication Captive Portal Pada Wireless Local Area Network di PT. St. Morita Industries." Jikom: Jurnal Informatika dan Komputer 14, no. 1 (2024): 14–24. http://dx.doi.org/10.55794/jikom.v14i1.119.

Full text
Abstract:
PT. St. Morita Industries has a Wireless Local Area Network (WLAN) which is used as a medium for exchanging data and information by utilizing wireless transmission media, WLAN currently uses WPA2-PSK as a security system to authenticate users to access the internet. However, the use of WPA2-PSK as WLAN security still has a weakness due to the use of the same 1 password for many users in order to connect to the WLAN hotspot will be an opportunity for cyber crime. This happens because it will be very easy for irresponsible users to enter the WLAN. Therefore, in this study, captive portal authent
APA, Harvard, Vancouver, ISO, and other styles
17

Suharyanto, Cosmas Eko, Miftahul Ilmi, Yoyon Arifin, and Mujahidin Mujahidin. "Implementasi Network Management Controller pada Jaringan Berbasis Unifi." Digital Transformation Technology 4, no. 1 (2024): 24–33. http://dx.doi.org/10.47709/digitech.v4i1.3678.

Full text
Abstract:
Di era digital ini, internet sudah menjadi kebutuhan penting bagi banyak orang. Jaringan internet memerlukan sistem kerja yang terintegrasi antara komponen perangkat keras dan perangkat lunak agar dapat digunakan secara bersamaan. Pentingnya pemantauan jaringan internet disadari dengan adanya Administrator Jaringan. Salah satu teknik monitoring Unifi Access Point adalah dengan menggunakan Unifi Network Management Controller. Penelitian ini merespon permasalahan pada Unifi Access Point pada BPR X Batam yang mengalami lemahnya sinyal dan keterbatasan dalam berselancar di internet. Dengan diranca
APA, Harvard, Vancouver, ISO, and other styles
18

Ari Ahmad Dhani, Raenald Syaputra, and Vito Junivan Rivaldo. "Pembuatan Web Company Profile Sebagai Captive Portal Mikrotik Hotspot PT. Bukit Baiduri Energi." Kegiatan Positif : Jurnal Hasil Karya Pengabdian Masyarakat 1, no. 4 (2023): 95–111. http://dx.doi.org/10.61132/kegiatanpositif.v1i4.478.

Full text
Abstract:
WiFi networks are very crucial in today's corporate industry. Because the WiFi network contains the internet which acts as a data transfer and communication route to support the company's operations. PT. Bukit Baiduri Energi (PT. BBE) as a company operating in the coal mining sector relies heavily on the internet to carry out company operations. Every day there is always an exchange of data and communication from employees to monitor the process of carrying out existing tasks and work, in responding to problems faced during the internship at PT. Bukit Baiduri Energi, our team takes the right s
APA, Harvard, Vancouver, ISO, and other styles
19

Muhammad Al-fajri, Muhammad Al-fajri, Arif Hidayat, and Mustika Mustika. "KONFIGURASI KEAMANAN JARINGAN WIFI DENGAN MIKROTIK DAN PERANCANGAN SHARING PRINTER JARINGAN BALAI DESA SIDODADI." JIKI (Jurnal llmu Komputer & lnformatika) 5, no. 2 (2024): 179–88. https://doi.org/10.24127/jiki.v5i2.6725.

Full text
Abstract:
Balai Desa Sidodadi merupakan salah satu dari dua belas desa yang ada pada Kecamatan Pekalongan. Balai Desa Sidodadi berjarak sekitar 7 Kilometer dari kampus 3 FIKOM Universitas Muhammadiyah Metro atau sekitar 14 menit menggunakan kendaraan roda dua. Kendala yang dialami yaitu belum adanya konfigurasi keamanan jaringan yang memadai sehingga menyebabkan jaringan di Balai Desa Sidodadi rawan untuk diketahui oleh pihak yang tidak berwenang dan keterbatasan ketersedian printer sehingga menyebabkan lambatnya pelayanan. Untuk memberikan solusi terhadap kendala yang dialami, penulis mengimplementasik
APA, Harvard, Vancouver, ISO, and other styles
20

Bahrul, Saputra, and Imam Riadi. "Captive Portal Development for Hotspot Services using Simple Queue Method." International Journal of Computer Applications 185, no. 50 (2023): 19–26. http://dx.doi.org/10.5120/ijca2023923163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Yutanto, Hariadi. "Penerapan Model Promosi Berbasis Web Captive Portal Hotspot dengan Manajemen Terpusat." JURNAL SISTEM INFORMASI BISNIS 8, no. 1 (2018): 49. http://dx.doi.org/10.21456/vol8iss1pp49-56.

Full text
Abstract:
The current technological developments so rapidly with speed and supported the ease of internet services. The Internet has also become one of the main needs of everyday human life activities. Internet advertising media innovation is one of the key media promotion in following the development of technology. Web-based portal advertising hotspot media for internet connection services is the most widely used today, as almost all agencies, offices, hotels, restaurants, schools / internet service providers (ISPs) use this technology. Hotspot network management techniques on mikrotik router captive p
APA, Harvard, Vancouver, ISO, and other styles
22

BOROȘEANU, Eduard-Ionuț. "Wi-Fi Security Dedicated Architectures." International Journal of Information Security and Cybercrime 7, no. 2 (2018): 33–40. http://dx.doi.org/10.19107/ijisc.2018.02.04.

Full text
Abstract:
This article will emphasize architectures that were designed due to the new business generated by wireless infrastructures. First, authentication issues of wireless users in “hot spot” - also called “captive portal” - architectures will be discussed. Lastly, recent architectures such as WIDS/WIPS (Wireless Intrusion Detection Systems/Wireless Intrusion Prevention Systems) aiming at detecting any malicious wireless activity will be detailed.
APA, Harvard, Vancouver, ISO, and other styles
23

Altarik, Muhammad Fachry, and Andriyan Dwi Putra. "Perancangan Keamanan Jaringan Metode Authentication Login Hotspot Menggunakan Router Mikrotik di PT. Nusindo Rekatama Semesta." Jurnal Nasional Ilmu Komputer 4, no. 4 (2023): 103–20. http://dx.doi.org/10.47747/jurnalnik.v4i4.1502.

Full text
Abstract:
Nusindo Rekatama Semesta is a company located in the Sleman Regency area, Jombor Lor, Sinduadi. PT. Nusindo Semesta is a company in the corporate management industry that has been operating since February 2011. PT. Nusindo Rekatama Semesta provides wireless hotspot facilities where employees and visitors who come can take advantage of an internet connection that can be accessed via laptops, smartphones, or other devices such as those that support wireless technology. However, the implementation of hotspots needs to be corrected; for example, per-client bandwidth still needs to be focused. It a
APA, Harvard, Vancouver, ISO, and other styles
24

Chen, Wei-Lin, and Quincy Wu. "A Proof of MITM Vulnerability in Public WLANs Guarded by Captive Portal." Proceedings of the Asia-Pacific Advanced Network 30 (December 30, 2010): 66. http://dx.doi.org/10.7125/apan.30.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Novrianda, Rahmat. "Implementasi authentication Captive Portal pada Wireless Local Area Network PT. Rikku Mitra Sriwijaya." Register: Jurnal Ilmiah Teknologi Sistem Informasi 4, no. 2 (2018): 67. http://dx.doi.org/10.26594/register.v4i2.1245.

Full text
Abstract:
PT. Rikku Mitra Sriwijaya merupakan salah satu perusahaan yang menyalurkan tenaga cleaning service. Perusahaan ini telah memiliki Wireless Local Area Network (WLAN) yang digunakan sebagai media pertukaran data serta informasi dengan memanfaatkan media transmisi wireless, WLAN PT. Rikku Mitra Sriwijaya saat ini menggunakan WPA2-PSK sebagai sistem keamanan untuk otentikasi pengguna agar dapat mengakses internet. Akan tetapi, penggunaan WPA2-PSK sebagai keamanan WLAN masih memiliki kelemahan dikarenakan penggunaan 1 password yang sama untuk banyak user agar dapat terhubung dengan hotspot WLAN PT.
APA, Harvard, Vancouver, ISO, and other styles
26

Purwanto, Jeri. "Implementation of telegram bots for user management on radius servers with captive portal." IJEEIT International Journal of Electrical Engineering and Information Technology 5, no. 1 (2022): 35–40. http://dx.doi.org/10.29138/ijeeit.v5i1.1864.

Full text
Abstract:
The use of the internet has become an important requirement in all fields. The internet is accessed in an educational environment, home, office, even in a coffee shop that has a sport hostpot. The development of technology as it is currently making an agreement for hotspot users becomes necessary to use these facilities for internet purposes, while general cable technology cannot be defeated by wireless technology. In this day and age the use of networks using hotspots we have encountered in various public places and users become quite free in internet access. Wireless technology provides comf
APA, Harvard, Vancouver, ISO, and other styles
27

Soewito, B., and Hirzi. "Building secure wireless access point based on certificate authentication and firewall captive portal." EPJ Web of Conferences 68 (2014): 00029. http://dx.doi.org/10.1051/epjconf/20146800029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Wahyudi, Erfan, and Muhammad Masjun Efendi. "Wireless Penetration Testing Method To Analyze WPA2-PSK System Security And Captive Portal." EXPLORE 9, no. 1 (2019): 1. http://dx.doi.org/10.35200/explore.v9i1.32.

Full text
Abstract:
One of the major changes in the telecommunications sector is the use of wireless technology. But many problems that must be faced when implementing this wireless network, one of which is a security problem. Many people are still questioning about wireless security, and many others believe that wireless security systems using WPA2-PSK are more secure than other wireless security systems. However, based on the results of literature studies conducted, a wireless security system that really can provide more secure security is to use the system security Remote Authentication Dial-In User Servers (R
APA, Harvard, Vancouver, ISO, and other styles
29

LIMA, Adrielli Heloise dos Anjos, Américo Meirelles NETO, Rosekelly de Jesus CARDOSO, et al. "Hemochromatosis-like disease in Brazilian tapirs (Tapirus terrestris) in Pará state, Brazil." Acta Amazonica 52, no. 4 (2022): 303–6. http://dx.doi.org/10.1590/1809-4392202103581.

Full text
Abstract:
ABSTRACT We report two cases of hemochromatosis-like disease in captive Brazilian tapirs, Tapirus terrestris in Pará state, Brazil. Both animals presented symptoms of chronic hepatopathy associated with marked accumulation of hemosiderin. The coloration of Perls demonstrated pronounced iron accumulation in macrophages in the portal space, Kupffer cells, and, to a lesser extent, in the hepatocytes of the periportal region. Marked portal fibrosis was evidenced by Masson’s trichrome. The pathological mechanisms of this disease in tapirs are not yet well established. It has been suggested that the
APA, Harvard, Vancouver, ISO, and other styles
30

Kale, Swingli Setiawan Ratu, and Yohanes Suban Belutowe. "IMPLEMENTASI JARINGAN INTRANET PADA SISTEM HALAMAN WEBSITE INTERNAL KAMPUS." HOAQ (High Education of Organization Archive Quality) : Jurnal Teknologi Informasi 15, no. 1 (2024): 51–59. https://doi.org/10.52972/hoaq.vol15no1.p51-59.

Full text
Abstract:
Membangun jaringan wireless berbasis hotspot menggunakan router outdoor, perangkat lunak dan perangkat keras yang digunakan untuk menyusun sistem tersebut dan cara mengontrol jaringan jarak jauh. membuat landing page yang interaktif dengan menggunakan jaringan nirkabel. mempermudah akses Internet di area hotspot dengan aman sepenuhnya juga untuk informasi di kampus, secara cepat dan efisien dalam pertukaran informasi, pertukaran data dan komunikasi. Prosedur verifikasi yang digunakan juga unik, dimulai dengan kata sandi WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), dan WPA2 (Wi
APA, Harvard, Vancouver, ISO, and other styles
31

Murdani, Muhammad Harist, Surya Priyambudi, and Suzana Dewi. "Rancang Bangun Jaringan Wireless Menggunakan Mikrotik Captive Portal Di Smp Al Falah Assalam Sidoarjo." Prosiding Konferensi Nasional Pengabdian Kepada Masyarakat dan Corporate Social Responsibility (PKM-CSR) 2 (December 15, 2019): 43–48. http://dx.doi.org/10.37695/pkmcsr.v2i0.351.

Full text
Abstract:
As per customary in Indonesia, most of Middle School doesn't have special personel for Information Technology, especially on Internet using Wireless Network Management. Even though Indonesian Govenrments policy clearly inclined to using Internet for supporting teaching and learning activities in school. UNBK (Ujian Nasional Berbasis Komputer) indirectly forcing school to provide a fullset computer laboratory which connected to World Wide Web using Internet connection. Thus, the Internet connection can only be used by student and teacher inside computer laboratory only, there are no wireless in
APA, Harvard, Vancouver, ISO, and other styles
32

Hartman, Marthinus J., Eric Monnet, Robert M. Kirberger, and Johan P. Schoeman. "LAPAROSCOPIC SALPINGECTOMY IN TWO CAPTIVE LEOPARDS (PANTHERA PARDUS) USING A SINGLE PORTAL ACCESS SYSTEM." Journal of Zoo and Wildlife Medicine 46, no. 4 (2015): 945–48. http://dx.doi.org/10.1638/2015-0109.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Sukendar, Toni, Mohammad Ikhsan Saputro, Ahmad Ishaq, and Achmad Sumbaryadi. "Authentication Wireless Area Network Menggunakan Captive Portal Berbasis Mikrotik pada Madrasah Ibtidaiyah Misbahul Athfal Bogor." Jurnal Teknologi Informatika dan Komputer 9, no. 1 (2023): 243–54. http://dx.doi.org/10.37012/jtik.v9i1.1465.

Full text
Abstract:
Madrasah Ibtidaiyah Misbahul Athfal merupakan sekolah dengan jenjang dasar pada pendidikan formal di Indonesia yang setara dengan sekolah dasar. Madrasah Misbahul Athfal ini memiki jaringan wireless (WLAN) yang digunakan sebagai media pertukaran data serta informasi dengan memanfaatkan media transmisi wireless. Sistem keamanan yang di terapkan di madrasah tersebut adalah WPA2-PSK (Wi-Fi Protected Access 2 Pre Shared Key). Sistem keamanan WPA2-PSK untuk saat ini dirasa memiliki kelemahan dikarenaan hanya menggunakan satu password untuk seluruh user yang akan terhubung ke internet dan ini merupa
APA, Harvard, Vancouver, ISO, and other styles
34

Putri, Aurellia Maharani, Muhlis Tahir, Bustomi, Nor Halimah, and Rara Natasya Fitriani. "Penerapan Keamanan Berlapis pada Jaringan WLAN dengan WPA/WPA2-PSK dan Captive Portal menggunakan MikroTik." Jurnal RESTIKOM : Riset Teknik Informatika dan Komputer 7, no. 1 (2025): 38–50. https://doi.org/10.52005/restikom.v7i1.409.

Full text
Abstract:
Pesatnya perkembangan teknologi informasi menuntut tersedianya jaringan WLAN yang andal dan aman, terutama di lingkungan pendidikan dan perkantoran. Penelitian ini bertujuan untuk merancang dan mengimplementasikan sistem keamanan jaringan nirkabel berbasis MikroTik dengan kombinasi metode WPA/WPA2-PSK dan Captive Portal. Metode penelitian yang digunakan adalah Research and Development (R&D) dengan model NDLC (Network Development Life Cycle) yang meliputi tahapan analisis, desain, simulasi prototipe, implementasi, monitoring, dan manajemen. Hasil dari penelitian menunjukkan bahwa kombinasi
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Lianting, and Marcelo Ponce. "Integrating Captive Portal Technology into Computer Science Education: A Modular, Hands-On Approach to Infrastructure." Journal of Computational Science Education 16, no. 1 (2025): 35–42. https://doi.org/10.22369/issn.2153-4136/16/1/8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

S., Sakara, Alhassan A., and Alhassan S. "A Novel Captive Portal System for Reduction of Wireless Networks Security Threats in the Tamale Metropolis." International Journal of Computer Applications 176, no. 5 (2017): 23–27. http://dx.doi.org/10.5120/ijca2017915550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Meiyanti, Ruci, Muhammad Yusuf Bagus Rasyiidin, Fachroni Arbi Murad, and Riri Fajriah. "Smart Wifi Design for Integrated Tourist Destinations in Smart Tourism." Tech-E 5, no. 2 (2022): 103–14. http://dx.doi.org/10.31253/te.v5i1.766.

Full text
Abstract:
The use of public wireless networks and not integrated between tourist destinations is an obstacle for visitors when moving to other tourist destinations. This is an obstacle to internet access in the tourism era 4.0. To overcome this, smart wifi is needed. Smart wifi is an integrated internet network access among other tourist destinations so as to expand the connectivity and interaction of tourist visitors. This study used the NDLC method. The result of this research was the design of smart wifi which was built on a wireless network with captive portal technology and barcode scanning. Smart
APA, Harvard, Vancouver, ISO, and other styles
38

Hoenerhoff, M., and K. Williams. "Copper-associated hepatopathy in a Mexican fruit bat (Artibeus jamaicensis) and establishment of a reference range for hepatic copper in bats." Journal of Veterinary Diagnostic Investigation 16, no. 6 (2004): 590–93. https://doi.org/10.5281/zenodo.13449930.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Copper toxicity has been described in numerous domestic species. The characteristic lesions include hemoglobinuric nephrosis and piecemeal hepatic necrosis with bile ductular hyperplasia and portal fibrosis. Certain species, such as sheep, are prone to toxicity when exposed to copper in feed, whereas an inherent genetic defect of copper storage is present in some breeds of dogs (Bedlington Terriers, West Highland White Terriers, Doberman Pinschers). In nondomestic species, reference ranges have not been established for copper in internal organ
APA, Harvard, Vancouver, ISO, and other styles
39

Hoenerhoff, M., and K. Williams. "Copper-associated hepatopathy in a Mexican fruit bat (Artibeus jamaicensis) and establishment of a reference range for hepatic copper in bats." Journal of Veterinary Diagnostic Investigation 16, no. 6 (2004): 590–93. https://doi.org/10.5281/zenodo.13449930.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Copper toxicity has been described in numerous domestic species. The characteristic lesions include hemoglobinuric nephrosis and piecemeal hepatic necrosis with bile ductular hyperplasia and portal fibrosis. Certain species, such as sheep, are prone to toxicity when exposed to copper in feed, whereas an inherent genetic defect of copper storage is present in some breeds of dogs (Bedlington Terriers, West Highland White Terriers, Doberman Pinschers). In nondomestic species, reference ranges have not been established for copper in internal organ
APA, Harvard, Vancouver, ISO, and other styles
40

Hoenerhoff, M., and K. Williams. "Copper-associated hepatopathy in a Mexican fruit bat (Artibeus jamaicensis) and establishment of a reference range for hepatic copper in bats." Journal of Veterinary Diagnostic Investigation 16, no. 6 (2004): 590–93. https://doi.org/10.5281/zenodo.13449930.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Copper toxicity has been described in numerous domestic species. The characteristic lesions include hemoglobinuric nephrosis and piecemeal hepatic necrosis with bile ductular hyperplasia and portal fibrosis. Certain species, such as sheep, are prone to toxicity when exposed to copper in feed, whereas an inherent genetic defect of copper storage is present in some breeds of dogs (Bedlington Terriers, West Highland White Terriers, Doberman Pinschers). In nondomestic species, reference ranges have not been established for copper in internal organ
APA, Harvard, Vancouver, ISO, and other styles
41

Hoenerhoff, M., and K. Williams. "Copper-associated hepatopathy in a Mexican fruit bat (Artibeus jamaicensis) and establishment of a reference range for hepatic copper in bats." Journal of Veterinary Diagnostic Investigation 16, no. 6 (2004): 590–93. https://doi.org/10.5281/zenodo.13449930.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Copper toxicity has been described in numerous domestic species. The characteristic lesions include hemoglobinuric nephrosis and piecemeal hepatic necrosis with bile ductular hyperplasia and portal fibrosis. Certain species, such as sheep, are prone to toxicity when exposed to copper in feed, whereas an inherent genetic defect of copper storage is present in some breeds of dogs (Bedlington Terriers, West Highland White Terriers, Doberman Pinschers). In nondomestic species, reference ranges have not been established for copper in internal organ
APA, Harvard, Vancouver, ISO, and other styles
42

Hoenerhoff, M., and K. Williams. "Copper-associated hepatopathy in a Mexican fruit bat (Artibeus jamaicensis) and establishment of a reference range for hepatic copper in bats." Journal of Veterinary Diagnostic Investigation 16, no. 6 (2004): 590–93. https://doi.org/10.5281/zenodo.13449930.

Full text
Abstract:
(Uploaded by Plazi for the Bat Literature Project) Copper toxicity has been described in numerous domestic species. The characteristic lesions include hemoglobinuric nephrosis and piecemeal hepatic necrosis with bile ductular hyperplasia and portal fibrosis. Certain species, such as sheep, are prone to toxicity when exposed to copper in feed, whereas an inherent genetic defect of copper storage is present in some breeds of dogs (Bedlington Terriers, West Highland White Terriers, Doberman Pinschers). In nondomestic species, reference ranges have not been established for copper in internal organ
APA, Harvard, Vancouver, ISO, and other styles
43

Mananggel, Arther Valentino, Djami Olii, Mario Tulenan Parinsi, and Parabelem Tinno Dolf Rompas. "Development of Computer Network Security Management at North Tabukan 1 State Vocational School." International Journal of Information Technology and Education 3, no. 1 (2022): 17–27. http://dx.doi.org/10.62711/ijite.v3i1.137.

Full text
Abstract:
The development of the internet at this time makes all companies, especially SMKN 1 Tabukan Utara, able to utilize internet technology in supporting computer-based information systems. For this place to run its business properly, it must be supported by an information system and supported by a good computer network infrastructure. Computer network infrastructure in the SMKN 1 Tabukan Utara still has several disadvantages such as the absence of website blocking, login authentication, and regular bandwidth distribution. To overcome these problems, it is necessary to design the network properly,
APA, Harvard, Vancouver, ISO, and other styles
44

Wadly, Fachrid, Rio Septian, and Zuhri Ramadhan. "Strategi Penanggulangan Kelemahan Terhadap Ancaman Keamanan Pada Jaringan Wireless." Jurnal Nasional Teknologi Komputer 3, no. 2 (2023): 59–67. http://dx.doi.org/10.61306/jnastek.v3i2.89.

Full text
Abstract:
The use of wireless-based technology devices at this time is so much, good used for voice and data communications. Because wireless technology utilizes frequency high to deliver a communication, then the vulnerability to security is also higher compared to other communication technologies. Various security measures can be taken through communication devices used by users and by operators who provide services communication. Weaknesses of wireless networks in general can be divided into 2 types, namely weaknesses on the configuration and weakness on the type of encryption used. Broadly speaking,
APA, Harvard, Vancouver, ISO, and other styles
45

Hartawan, I. Nyoman Buda, and Alfin Zidny Mandela. "SISTEM KEAMANAN OTENTIKASI USER DENGAN NOTIFIKASI REALTIME MELALUI TELEGRAM BERBASIS DALORADIUS." Jurnal Krisnadana 1, no. 2 (2022): 33–44. http://dx.doi.org/10.58982/krisnadana.v1i2.115.

Full text
Abstract:
The use of wireless network technology is rapidly increasing at this time causing problems in the security system. Ease of internet access through a wireless network, is also a security hole in the user authentication process. Various smart devices can be used to connect with only one account via the captive portal. In this research, a security system is designed to authenticate hotspot users with daloRADIUS-based telegram notifications. This system integrates hotspot routers, daloRADIUS servers and telegrams to improve the security system during the authentication process. Users are able to m
APA, Harvard, Vancouver, ISO, and other styles
46

Mohd Salleh, Mohd Hairul, and Yuzine Esa. "The First Next-Generation Sequencing Metabarcoding Dataset on Faecal Bacterial Diversity from the Southern River Terrapin, Batagur affinis ssp." Malaysian Journal of Fundamental and Applied Sciences 19, no. 1 (2023): 1–5. http://dx.doi.org/10.11113/mjfas.v19n1.2802.

Full text
Abstract:
The Southern River terrapin, Batagur affinis ssp., has the first data on faecal bacterial diversity from next-generation sequencing (NGS). This dataset describes the bacterial diversity of the Southern River terrapin, locally known as Tuntung. Batagur affinis spp. are freshwater turtles listed as critically endangered on the International Union for Conservation of Nature (IUCN) Red List since 2000. This is the first dataset on the faecal bacterial diversity of Batagur affinis ssp., and the data provided here can be used to comprehensively understand the microbiome's community composition. Seve
APA, Harvard, Vancouver, ISO, and other styles
47

Herawan, Rifky Mina, and Cahyo Prihantoro. "IMPLEMENTASI PENGEMBANGAN SISTEM JARINGAN INTERNET PT. INKA MULTI SOLUSI SERVICE BERBASIS ROUTER MIKROTIK." JURNAL TEKNOLOGI INFORMASI DAN KOMUNIKASI 15, no. 1 (2024): 53–60. http://dx.doi.org/10.51903/jtikp.v15i1.799.

Full text
Abstract:
The high usage of internet networks, coupled with various direct and indirect attacks, will affect the activities on the internet network. The office of PT. INKA Multi Solusi Service, located in Madiun City, has each employee working with their own computers, and the office's internet speed is 150 Mbps. However, the internet network at PT. INKA Multi Solusi Service faces several optimization issues. Three of these issues are related to internet security login, bandwidth conflicts, and unrestricted website access, leading to virus-related problems. The proposed solution involves implementing th
APA, Harvard, Vancouver, ISO, and other styles
48

Dimitris Koutras, Panos Dimitrellos, Panayiotis Kotzanikolaou, and Christos Douligeris. "Automated Wi-Fi intrusion detection tool on 802.11 networks." ITU Journal on Future and Evolving Technologies 5, no. 1 (2024): 88–103. http://dx.doi.org/10.52953/lhxo3338.

Full text
Abstract:
Wi-Fi networks enable user-friendly network connectivity in various environments, ranging from home to enterprise networks. However, vulnerabilities in Wi-Fi implementations may allow nearby adversaries to gain an initial foothold into a network, e.g., in order to attempt further network penetration. In this paper we propose a methodology for the detection of attacks originating from Wi-Fi networks, along with a Wi-Fi Network Intrusion Detection (Wi-Fi-NID) tool, developed to automate the detection of such attacks at 802.11 networks. In particular, Wi-Fi-NID has the ability to detect and trace
APA, Harvard, Vancouver, ISO, and other styles
49

Phoju, Rabindra, and Krishna Prasad Bhandari. "Management of Internet Bandwidth Implementing CoovaChilli and Free Radius." Journal of Science and Engineering 8 (November 12, 2020): 56–60. http://dx.doi.org/10.3126/jsce.v8i0.32864.

Full text
Abstract:
With rapid growth in popularity and use of Internet in academic institutions, the institutions are struggling to keep up with the demand. They need capability to effectively control, monitor and optimize the available bandwidth to ensure good service at optimum cost. This paper has described implementation of Coovachilli and free radius for management of internet bandwidth in academic institutions. During this research, freeware tools such as Freeradius and CoovaChilli have been used to manage Internet bandwidth on a per-user basis based on user credentials. The mechanisms have been used to co
APA, Harvard, Vancouver, ISO, and other styles
50

Khamdani, Wahyu, IGL Putra Eka Prismana, Aditya Prapanca, and Dodik Arwin Dermawan. "Penerapan Sistem Absensi Kehadiran Pegawai Berbasis Jaringan Wireless WPA2 Enterprise." Journal of Informatics and Computer Science (JINACS) 2, no. 01 (2020): 27–37. http://dx.doi.org/10.26740/jinacs.v2n01.p27-37.

Full text
Abstract:
Abstrak—Sistem absensi kehadiran dan jaringan internet merupakan dua hal yang berkaitan dengan teknologi yang umumnya pasti dibutuhkan pada tiap perusahan ataupun instansi. Umumnya pegawai setiap datang dan pulang diharuskan untuk melakukan absensi dengan datang ke mesin absensi dan melakukan absensi baik melalui fingerprint atau deteksi wajah, dimana proses itu terkadang memakan waktu untuk dapat masuk ke ruang kerja karena ruang kerja dan lokasi mesin absensi yang cukup jauh. Untuk membantu pegawai dalam melakukan 2 hal sekaligus yakni autentikasi wifi dan melakukan absensi kehadiran diperlu
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!