News & Updates

News & Insight

Blogs

Counteract internal and external hacking threats

This article emphasizes the importance of protecting data privacy in the digital age. We highlight the potential damage that hackers can cause,...

DC motor optimization using Aquila optimizer algorithm

The Aquila optimizer (AO) algorithm is a nature-inspired optimization algorithm that can be used to determine the optimal parameters of a proportional...

Random forest (RF) algorithm for heart disease prediction

Assegie et al. (2022) explored a dataset of heart disease images using machine learning models to predict heart disease. They used recursive...

Digital technology competencies in vocational education

The maturity level of digital technology competence (DTC) in vocational education was analyzed by Astuti et al. (2022) to measure the difference...
1 2 3 18

Announcements

Explore CSIT journal’s new online homepage

Dive into the world of cutting-edge research and innovation with our revamped journal homepage at csit.iaesprime.org! As a hub for scholars, researchers,...

Multiple submissions (simultaneous submissions) and prior publication

Authors should only submit original work that has not previously been published or is currently under review for another refereed publication. The...

Top 3 topics in IJ-ICT April 2024

The International Journal of Informatics and Communication Technology (IJ-ICT) is a platform for the publication of research articles and other scholarly works...

Top 3 topics in IJEECS April 2024

Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) is an international journal published by the Institute of Advanced Engineering and Science...
1 2 3 14

News

The pervasive integration of AI into academic journals is on the rise, presenting a difficulty in detecting such instances

The use of AI in academic journals is becoming more prevalent, and it is proving difficult to detect. Some authors are using...

The MavenGate attack could let hackers to take control of Java and Android systems by exploiting abandoned libraries

attack is a supply chain attack method that allows hackers to hijack popular abandoned libraries in Java and Android applications, potentially injecting...

Enhance the Security of Your Software Supply Chain with These Strategies

Software Supply Chain Security (SSCS) is the practice of implementing security measures and best practices throughout the entire software development and distribution...

GitHub warns users to enable 2FA before upcoming deadline

Two-factor authentication (2FA) is an extra layer of security used when logging into websites or apps. With 2FA, users have to log...
1 2 3 21