Sei sulla pagina 1di 7

PROPOSAL PENELITIAN

JUDUL PROPOSAL

NAMA MAHASISWA
NIM

JURUSAN
SISTEM KOMPUTER

PROGRAM STUDI STRATA SATU (S1)


SEKOLAH TINGGI MANAJEMEN INFORMATIKA DAN KOMPUTER
CATUR SAKTI KENDARI
2018
Dengan ini saya menyatakan bahwa proposal penelitian dengan judul

JUDUL PROPOSAL

NAMA
NIM

JURUSAN
SISTEM KOMPUTER

Dosen pembimbing yang diusulkan:

1.................................................................................

2.................................................................................

Kendari,.... Desember 2018

Yang menyatakan,

Nama mahasiswa
BAB. 1
PENDAHULUAN

1.1. Latar Belakang


1.2. Perumusan Masalah
1.3. Tujuan Penelitian

1.4. Manfaat Penelitian


BAB.II
TINJAUAN PUSTAKA DAN LANDASAN TEORI

2.1. Tinjauan Pustaka


2.2. Landasan Teori
BAB.III
METODE PENELITIAN

Metode penelitian yang dilakukan meliputi materi serta alat yang digunakan,
dan tahapan penelitian :
3.1. Alat dan Bahan Penelitian

3.2. Metode Penelitian


Jadwal Penelitian:
Penelitian dilaksanakan mulai .................dengan tabel waktu sebagai
berikut.
Jadwal Rencana Kegiatan Penelitian

Daftar Pustaka

[1] Z. Wang, “Design and realization of computer network security perception


control system,” in Communication Software and Networks (ICCSN), 2011
IEEE 3rd International Conference on, 2011, pp. 163–166.
[2] R. Patil and M. P. Tahiliani, “Detecting packet modification attack by
misbehaving router,” in Networks & Soft Computing (ICNSC), 2014 First
International Conference on, 2014, pp. 113–118.
[3] V. Pournaghshband, A. Afanasyev, and P. Reiher, “End-to-End Detection of
Compression of Traffic Flows by Intermediaries.”
[4] K. R. Srivathsan, S. B. Daigavane, N. R. Gogate, G. Barua, S. K. Base, and A.
Roy, “Implementation of OSI-IP router for LAN-LAN interconnection,” in
TENCON’91.1991 IEEE Region 10 International Conference on EC3-Energy,
Computer, Communication and Control Systems, 1991, vol. 3, pp. 46–50.
[5] Z. Wang, “Design and realization of computer network security perception
control system,” in Communication Software and Networks (ICCSN), 2011
IEEE 3rd International Conference on, 2011, pp. 163–166.
[6] S. Lu, X. Wang, and L. Mao, “Network security situation awareness based on
network simulation,” in Electronics, Computer and Applications, 2014 IEEE
Workshop on, 2014, pp. 512–517.
[7] H. C. Chan, H. M. Alnuweiri, and V. C. Leung, “A framework for optimizing
the cost and performance of next-generation IP routers,” Sel. Areas Commun.
IEEE J. On, vol. 17, no. 6, pp. 1013–1029, 1999.
[8] Y. Wu, J. Wu, K. Xu, and M. Xu, “The design and implementation of router
security subsystem based on IPSEC,” in TENCON’02. Proceedings. 2002
IEEE Region 10 Conference on Computers, Communications, Control and
Power Engineering, 2002, vol. 1, pp. 160–165.
[9] Y. Xiang, W. Zhou, Z. Li, and Q. Zeng, “On the effectiveness of flexible
deterministic packet marking for DDoS defense,” in Network and Parallel
Computing Workshops, 2007. NPC Workshops. IFIP International Conference
on, 2007, pp. 183–190.
[10] F. Razzak, “Spamming the Internet of Things: A Possibility and its
probable Solution,” Procedia Comput. Sci., vol. 10, pp. 658–665, 2012.
[11] A. A. Cardenas, T. Roosta, and S. Sastry, “Rethinking security properties,
threat models, and the design space in sensor networks: A case study in
SCADA systems,” Ad Hoc Netw., vol. 7, no. 8, pp. 1434–1447, Nov. 2009.
[12] I. Marsa-Maestre, E. de la Hoz, J. M. Gimenez-Guzman, and M. A. Lopez-
Carmona, “Design and evaluation of a learning environment to effectively
provide network security skills,” Comput. Educ., vol. 69, pp. 225–236, Nov.
2013.

Potrebbero piacerti anche