Articles

Information Security Risk Measurement Using Information Security Index (KAMI) at the Information Technology and Database Center
Abstract views: 81 PDF downloads: 44

90-95 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.23
Designing a Website for the Alumni Association using Software Development Life Cycle
Abstract views: 218 PDF downloads: 131

96-108 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.24
Augmented Reality (AR) Solar System Objects Based on Marker-Based 3D
Abstract views: 173 PDF downloads: 118

109-115 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.17
Attendance System Face Recognition Using Convolutional Neural Network (CNN)
Abstract views: 347 PDF downloads: 130

116-121 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.16
Strategic Information System Planning at UMKM in Padalarang Village using Ward and Peppard Methods
Abstract views: 195 PDF downloads: 93

122-129 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.15