Mobile and Forensics
http://journal2.uad.ac.id/index.php/mf
<div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div> <p><strong>Mobile and Forensics (MF)</strong>, ISSN: <a href="https://portal.issn.org/resource/ISSN/2656-6257" target="_blank" rel="noopener">2656-6257</a> E-ISSN:<a href="https://portal.issn.org/resource/ISSN/2714-6685" target="_blank" rel="noopener">2714-6685</a> ,is a international peer-reviewed open access journal organized by the Department of Magister Informatika, Universitas Ahmad Dahlan. It is a <strong>semi-annual journal</strong> published in <strong>March and September.</strong> The main objective of the publication is to create a platform to publish original articles, researches results, case studies, and book reviews related to the field of Mobile Technology and Digital Forensics. The editorial board welcomes original contributions of the author in English which never been published or under consideration for publication in any other publication. All publications are available in full text and are free to download.</p> </div> </div> </div> <table class="m_1585562839703316051image_block" style="width: 100%;" border="0" cellspacing="0" cellpadding="10"> <tbody> <tr> <td> <div style="line-height: 10px;" align="center"><img style="height: auto; display: block; border: 0; max-width: 225px; width: 50%;" src="http://journal2.uad.ac.id/public/site/images/aazhari/cover-mf.jpg" alt="" width="225" /></div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="text-align: center; width: 100%; padding: 0 10px 5px 10px;"> <h2 style="margin: 0; color: #555; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 21px; font-weight: bold; letter-spacing: normal; line-height: 120%; text-align: left; margin-top: 0; margin-bottom: 0;">Mobile and Forensics</h2> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 5px 10px;"> <div style="color: #101112; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 120%; text-align: left;"> <p style="margin: 0;"><em>Open Access <img src="https://cfp.iaesprime.com/BEEI/open.png" alt="" /> </em></p> </div> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 0 10px;"> <div style="color: #101112; direction: ltr; font-family: Georgia,Times,'Times New Roman',serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 140%; text-align: left;"> <p style="margin: 0;">Publisher:Universitas Ahmad Dahlan (UAD)<br />ISSN: 2656-6257 E-ISSN:2714-6685<br />Subject area:</p> </div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="5"> <tbody> <tr> <td> <div align="left"> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Computer Science: Cybersecurity and Computer forensics</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Networks and Communications</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Artificial intelligence</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 11px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word; line-height: 0p;">Computer Science: Image Processing & computer vision</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Internet of Things</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Science (miscellaneous)</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Engineering: Software Engineering</span> </span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Engineering: Electronics Engineering</span></span></div> </div> </td> </tr> </tbody> </table> <table style="border-collapse: collapse; width: 100%;" border="0"> <tbody> <tr> <td style="width: 24%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="http://journal2.uad.ac.id/index.php/mf/submission/wizard" target="_blank" rel="noopener" data-saferedirecturl="http://journal2.uad.ac.id/index.php/mf/submission/wizard"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/submit.png" alt="" width="135" /> </a></td> <td style="width: 76%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="https://docs.google.com/document/d/1Fz_SHzAGe4RrB1wFwSawENCSFCwGSU73/edit?usp=sharing&ouid=104327450475612404767&rtpof=true&sd=true" target="_blank" rel="noopener" data-saferedirecturl="https://iaescore.com/gfa/beei.docx"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/docx.png" alt="" width="135" /> </a></td> </tr> </tbody> </table> <div id="additionalHomeContent"> <p> </p> </div> <div id="additionalHomeContent"> <p><strong>Mobile Forensics has been cited by <a href="https://www.scopus.com/results/results.uri?src=dm&sort=plf-f&st1=%22Mobile+and+Forensics%22&st2=%22Mob.+Forensics%22&sid=0bc95bcb81b6dd3473c4963df21dafee&sot=b&sdt=b&sl=54&s=%28REF%28%22Mobile+and+Forensics%22%29+OR+REF%28%22Mob.+Forensics%22%29%29&cl=t&ss=plf-f&ws=r-f&ps=r-f&cs=r-f&origin=resultslist&zone=queryBar&sessionSearchId=0bc95bcb81b6dd3473c4963df21dafee&limit=10" target="_blank" rel="noopener">SCOPUS Journal (Need Login)</a>: </strong></p> <ul> <li><strong>Emerging Science Journal (Q1)</strong></li> <li><strong>Clinical Practice and Epidemiology in Mental Health (Q2)</strong></li> <li><strong>Journal of Robotics and Control (Q3)</strong></li> <li><strong>Applied Computer Science (Q3)</strong></li> <li><strong>European Journal of Pure and Applied Mathematics (Q3)</strong></li> <li><strong>International Journal on Smart Sensing and Intelligent Systems (Q3)</strong></li> <li><strong>International Journal of Sustainable Development and Planning (Q3)</strong></li> <li><strong>International Journal of Safety and Security Engineering (Q3)</strong></li> <li><strong>Advances in Intelligent Systems and Computing (Q4)</strong></li> <li><strong>Journal of Applied Data Sciences</strong></li> <li><strong>AIP Conference Proceedings</strong></li> <li><strong>ACM International Conference Proceeding Series</strong></li> <li><strong>International Conference on Engineering, Science and Advanced Technology, ICESAT </strong></li> <li><strong>International Conference on Artificial Intelligence in Information and Communication, ICAIIC </strong></li> <li><strong>International Conference on Cybernetics and Intelligent Systems, ICORIS</strong></li> <li><strong>International Conference on Science in Information Technology, ICSITech</strong></li> <li><strong>International Jordanian Cybersecurity Conference, IJCC</strong></li> </ul> <p><iframe style="border: 0px #ffffff none;" src="https://author.my.id/widget/statistik.php?sinta=8108&gs=NDzfOxEAAAAJ&sc=15" name="statistik" width="800px" height="115px" frameborder="0" marginwidth="0px" marginheight="0px" scrolling="no"></iframe></p> <p><iframe id="datawrapper-chart-XCjD9" style="width: 0; min-width: 100% !important; border: none;" title="Mobile and Forensics Author's Diversity" src="https://datawrapper.dwcdn.net/XCjD9/1/" height="367" frameborder="0" scrolling="no" aria-label="Map" data-external="1"></iframe></p> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div>Universitas Ahmad Dahlanen-USMobile and Forensics2656-6257<p><strong>Start from 2019 issues, authors who publish with JURNAL MOBILE AND FORENSICS agree to the following terms:</strong></p> <ol start="1"> <li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" target="_blank" rel="noopener">Creative Commons Attribution License (CC BY-SA 4.0)</a> that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.</li> <li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.</li> <li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</li> </ol> <p> </p> <p><a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license"><img src="https://i.creativecommons.org/l/by-sa/4.0/88x31.png" alt="Creative Commons License" /></a><br />This work is licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license">Creative Commons Attribution-ShareAlike 4.0 International License</a>.</p>Analysis of Instagram Messages in Drug Cases using Nist Methods
http://journal2.uad.ac.id/index.php/mf/article/view/11307
<p><em>The advancement of communication technology has had a significant impact on all levels of society, particularly through the use of social media platforms such as Instagram. However, this application also has negative impacts, including its misuse by criminals to facilitate the distribution of drugs, leading to transactions where anti-forensics measures are employed by sellers during conversations. This research utilizes the National Institute of Standards and Technology (NIST) method, which consists of the steps of collection, examination, analysis, and reporting. This method is applied to identify and uncover evidence in drug transaction cases on Instagram. The researchers focus on messages between buyers and sellers, whether they have been deleted or not. The results of the study indicate that digital forensic steps using the NIST method can be applied in the process of retrieving digital evidence from the Instagram application on the smartphones of buyers and sellers. The digital forensic tools used successfully revealed relevant digital evidence on the Instagram application.</em></p>Muhammad Raihandaffa DzikrianasaEko Aribowo
Copyright (c) 2025 Muhammad Raihandaffa Dzikrianasa, Eko Aribowo
https://creativecommons.org/licenses/by-sa/4.0
2025-01-202025-01-2071111Embedded System for Automatic Mask Detection using YOLOv4 Deep Learning and PyQt5 Interface
http://journal2.uad.ac.id/index.php/mf/article/view/11951
<p><em>The use of masks remains crucial, especially in high-risk areas for disease transmission, such as airports, schools, hospitals, and crowded places. However, some individuals continue to neglect wearing masks in these locations, leaving the area vulnerable to disease spread, including COVID-19. Therefore, this study proposes the development of an embedded system based on Raspberry Pi 4 for automatic mask detection using YOLOv4 deep learning and a PyQt5 interface. The system is designed to be simple and compact, featuring a user-friendly GUI to effectively detect mask usage on multiple faces in a single detection. Experimental results on 40 samples captured in real-time, with 4 samples taken per image capture and various mask colors and three mask-wearing angles, demonstrated that the average precision, recall, and F1_score rates were each 100%. This outcome proves that the proposed embedded system successfully detects masks on multiple faces with different colors and angles in a single detection with excellent accuracy.</em></p>Arif FadllullahNelson Mandela Rande LangiIkhsan MaulanaLaura Nur MeilindyMuhammad Adhiya Yudhistira AkbarMukti Dika Rahman
Copyright (c) 2025 Arif Fadllullah, Nelson Mandela Rande Langi, Ikhsan Maulana, Laura Nur Meilindy, Muhammad Adhiya Yudhistira Akbar, Mukti Dika Rahman
https://creativecommons.org/licenses/by-sa/4.0
2025-03-052025-03-0571122310.12928/mf.v7i1.11951K-Nearest Neighbors for Fast and Accurate Qibla Direction Determination
http://journal2.uad.ac.id/index.php/mf/article/view/12781
<p>Determining the correct direction of the Qibla is essential for the validity of prayer, but in areas far from the Kaaba, this can be a challenge. While calculating the Qibla azimuth using latitude and longitude is relatively straightforward, traditional methods for obtaining the Qibla direction, such as those provided by the Muhammadiyah Central Leadership’s Tarjih Center, are time-consuming and require specialized teams. This paper proposes a recommendation system that uses the K-Nearest Neighbors (K-NN) algorithm to provide an efficient and automated solution for determining the Qibla direction. The system leverages the Google Maps API to obtain geographic coordinates and calculates the Qibla azimuth by applying the Euclidean distance formula between latitude and longitude points. The K-NN method is employed to recommend the nearest mosque or prayer room that is aligned with the correct Qibla direction, based on proximity and geographic data. This approach eliminates the need for a dedicated team and significantly reduces the time required for users to find the correct direction. The system's performance was tested through Black Box testing to ensure all features functioned as expected. User acceptance was measured using the System Usability Scale (SUS), resulting in an average score of 76.33, indicating good usability. Additionally, accuracy testing compared the recommended Qibla direction from 28 mosques and prayer rooms with another established system, yielding an accuracy of 78.57%. These results demonstrate that the proposed K-NN-based recommendation system is both effective and efficient for determining the Qibla direction.</p>Girindra Sulistiyo WardoyoAhmad Azhari
Copyright (c) 2025 Girindra Sulistiyo Wardoyo, Ahmad Azhari
https://creativecommons.org/licenses/by-sa/4.0
2025-03-172025-03-1771244110.12928/mf.v7i1.12781Forensic Analysis of Mobile Application Security Using the IDFIF v2 Framework
http://journal2.uad.ac.id/index.php/mf/article/view/12660
<p><em>Mobile application security has become an important issue in the midst of increasing cyber attacks, especially on the Android platform. This research aims to analyse the vulnerability of mobile applications using the Integrated Digital Forensics Investigation Framework (IDFIF) version 2 framework with a focus on the Laboratory Process stage. The tool used is Mobile Security Framework (MobSF) for static and dynamic analysis, supported by Genymotion emulator.The results show that the tested application has several vulnerabilities, such as malicious permissions (READ_EXTERNAL_STORAGE and WRITE_EXTERNAL_STORAGE), the use of v1 signature schemes that are vulnerable to Janus attacks, as well as the ability to manipulate the application through bypass debugging. However, no vulnerabilities were found in the SSL Pinning process. These findings provide important insights into security mitigation measures, such as removing malicious permissions, updating certificate mechanisms, and encrypting sensitive data.The application of IDFIF v2 in this investigation demonstrates its effectiveness in systematically detecting and analysing mobile application vulnerabilities, contributing to the development of better security protocols in the future.</em></p>Abdul Aziz SetiawanImam Sutanto
Copyright (c) 2025 Abdul Aziz Setiawan, Imam Sutanto
https://creativecommons.org/licenses/by-sa/4.0
2025-03-202025-03-2071425410.12928/mf.v7i1.12660A Security Development Life Cycle (SDLC)-Based Approach for Designing Intrusion Detection and Prevention Systems to Counter SQL Injection Attacks at MAN 2 Magetan
http://journal2.uad.ac.id/index.php/mf/article/view/9365
<p data-start="1006" data-end="1631">Information security is a critical aspect of ensuring the validity, integrity, and availability of data while protecting users’ access to services. Inadequate security measures can expose systems to various threats, potentially compromising their functionality. One such threat is SQL Injection, a common attack vector targeting web applications. MAN 2 Magetan, an Islamic high school located in Purwosari, Magetan Regency, East Java, Indonesia, operates an online admission system on its website. However, this website contains input fields that are not properly validated, creating a vulnerability to SQL Injection attacks. This study aims to design and implement an Intrusion Detection and Prevention System (IDPS) to mitigate SQL Injection attacks using the Security Development Life Cycle (SDLC) methodology. The SDLC process for the system development consists of five stages: Analysis, Design, Implementation, Enforcement, and Enhancement. A hybrid system combining Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) was utilized to create an effective solution. The results of the research demonstrate that the developed IDPS successfully detects and prevents SQL Injection attacks, ensuring the security and integrity of the online admission system. The integration of IDS and IPS within the SDLC framework has proven to be an effective approach to enhancing web application security at MAN 2 Magetan.</p>Muhammad Naufal HafizhNuril AnwarAhmad Azhari
Copyright (c) 2025 Muhammad Naufal Hafizh, Nuril Anwar, Ahmad Azhari
https://creativecommons.org/licenses/by-sa/4.0
2025-03-202025-03-2071556810.12928/mf.v7i1.9365