Articles

Information Security Risk Measurement Using Information Security Index (KAMI) at the Information Technology and Database Center
Abstract views: 209 PDF downloads: 162

90-95 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.23
Designing a Website for the Alumni Association using Software Development Life Cycle
Abstract views: 349 PDF downloads: 392

96-108 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.24
Augmented Reality (AR) Solar System Objects Based on Marker-Based 3D
Abstract views: 389 PDF downloads: 304

109-115 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.17
Attendance System Face Recognition Using Convolutional Neural Network (CNN)
Abstract views: 673 PDF downloads: 317

116-121 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.16
Strategic Information System Planning at UMKM in Padalarang Village using Ward and Peppard Methods
Abstract views: 349 PDF downloads: 263

122-129 Pages

DOI: https://doi.org/10.60005/coreid.v1i3.15