{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T17:58:16Z","timestamp":1770832696446,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T00:00:00Z","timestamp":1679616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,24]]},"DOI":"10.1145\/3592307.3592329","type":"proceedings-article","created":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T13:30:46Z","timestamp":1692019846000},"page":"139-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Security Vulnerability Analysis using Penetration Testing Execution Standard (PTES): Case Study of Government's Website"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9555-2321","authenticated-orcid":false,"given":"Muhammad Fakhrul","family":"Safitra","sequence":"first","affiliation":[{"name":"Information System Department, School of Industrial and System Engineering, Telkom University, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2973-9215","authenticated-orcid":false,"given":"Muharman","family":"Lubis","sequence":"additional","affiliation":[{"name":"Information System Department, School of Industrial and System Engineering, Telkom University, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8115-9805","authenticated-orcid":false,"given":"Adityas","family":"Widjajarto","sequence":"additional","affiliation":[{"name":"Information System Department, School of Industrial and System Engineering, Telkom University, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2023,8,14]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Analisis dan Perancangan Website Sebagai Sarana Informasi Pada Lembaga Bahasa Kewirausahaan dan Komputer Akmi Baturaja","volume":"19","author":"Trimarsiah Y.","year":"2017","unstructured":"Y. Trimarsiah and M. Arafat, \u201cAnalisis dan Perancangan Website Sebagai Sarana Informasi Pada Lembaga Bahasa Kewirausahaan dan Komputer Akmi Baturaja,\u201d Jurnal Ilmiah Matrik, vol. 19, no. 1, pp. 1\u201310, 2017.","journal-title":"Jurnal Ilmiah Matrik"},{"key":"e_1_3_2_1_2_1","volume-title":"Prevent Web Site Defacement","author":"Hollander Y.","year":"2000","unstructured":"Y. Hollander, \u201cPrevent Web Site Defacement,\u201d 2000. [Online]. Available: http:\/\/www.entercept.com."},{"key":"e_1_3_2_1_3_1","volume-title":"Media Informasi Ditjen Pothan Menhan. Media Informasi Ditjen Pothan Kemhan","author":"Soewardi B. A.","year":"2013","unstructured":"B. A. Soewardi, \u201cPerlunya Pembangunan Sistem Pertahanan Siber (Cyber Defense) yang tangguh bagi indonesia,\u201d Media Informasi Ditjen Pothan Menhan. Media Informasi Ditjen Pothan Kemhan, Mar. 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.18517\/ijaseit.10.5.8862"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.07.039"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(03)00018-9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIACT50329.2020.9332116"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.21456\/vol6iss2pp97-104"},{"key":"e_1_3_2_1_10_1","volume-title":"Politica","author":"Ardiyanti H.","unstructured":"H. Ardiyanti, \u201cCyber-Security dan Tantangan Pengembangannya di Indonesia,\u201d Politica, vol. 5, no. 1, 2014, [Online]. Available: http:\/\/kominfo.go.id\/index.php\/content\/detail\/3980\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2012.111"},{"key":"e_1_3_2_1_12_1","first-page":"386","volume-title":"Seminar Nasional Informatika","year":"2008","unstructured":"Paryati, \u201cKeamanan Sistem Informasi,\u201d Seminar Nasional Informatika, pp. 379\u2013386, 2008, [Online]. Available: www.upnyk.ac.id"},{"key":"e_1_3_2_1_13_1","volume-title":"AUTOMATA","volume":"3","author":"Kuncoro A. W.","year":"2022","unstructured":"A. W. Kuncoro and F. Rahma, \u201cAnalisis Metode Open Web Application Security Project (OWASP) pada Pengujian Keamanan Website: Literature Review,\u201d AUTOMATA, vol. 3, no. 1, 2022, [Online]. Available: https:\/\/www.sciencedirect.com"},{"key":"e_1_3_2_1_14_1","volume-title":"The Penetration Testing Execution Standard Documentation","author":"Team PTES","year":"2022","unstructured":"The PTES Team, The Penetration Testing Execution Standard Documentation. 2022."},{"issue":"1","key":"e_1_3_2_1_15_1","first-page":"75","article-title":"DESIGN SCIENCE IN INFORMATION SYSTEMS RESEARCH 1","volume":"28","author":"Hevner A. R.","year":"2004","unstructured":"A. R. Hevner, S. T. March, J. Park, and S. Ram, \u201cDESIGN SCIENCE IN INFORMATION SYSTEMS RESEARCH 1,\u201d Design Science in Information Systems Research, vol. 28, no. 1, pp. 75\u2013105, 2004.","journal-title":"Design Science in Information Systems Research"}],"event":{"name":"ICECC 2023: 2023 The 6th International Conference on Electronics, Communications and Control Engineering","location":"Fukuoka Japan","acronym":"ICECC 2023"},"container-title":["Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592307.3592329","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3592307.3592329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T09:33:28Z","timestamp":1755855208000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592307.3592329"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,24]]},"references-count":15,"alternative-id":["10.1145\/3592307.3592329","10.1145\/3592307"],"URL":"https:\/\/doi.org\/10.1145\/3592307.3592329","relation":{},"subject":[],"published":{"date-parts":[[2023,3,24]]},"assertion":[{"value":"2023-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}