Analisis investigasi forensik whatsapp messanger smartphone terhadap whatsapp berbasis web N Anwar, I Riadi J. Ilm. Tek. Elektro Komput. dan Inform 3 (1), 1, 2017 | 113 | 2017 |
Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik I Riadi Jurnal Sistem Informasi Indonesia 1 (1), 71-80, 2011 | 96 | 2011 |
Mobile forensic tools evaluation for digital crime investigation R Umar, I Riadi, GM Zamroni Int. J. Adv. Sci. Eng. Inf. Technol 8 (3), 949-955, 2018 | 93 | 2018 |
Implementation of Malware Analysis using Static and Dynamic Analysis Method Y Prayudi, I Riadi International Journal of Computer Applications 117 (6), 11-15, 2015 | 87 | 2015 |
A fuzzy TOPSIS multiple-attribute decision making for scholarship selection S Uyun, I Riadi arXiv preprint arXiv:1306.6489, 2013 | 87 | 2013 |
Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method I Riadi, R Umar, A Firdonsyah International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 80 | 2017 |
Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist A Yudhana, I Riadi, I Anshori IT Journal Research and Development 3 (1), 13-21, 2018 | 72 | 2018 |
Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij) I Riadi, R Umar, IM Nasrulloh Elinvo (Electronics, Informatics, and Vocational Education) 3 (1), 70-82, 2018 | 68 | 2018 |
A comparative study of forensic tools for WhatsApp analysis using NIST measurements R Umar, I Riadi, GM Zamroni International Journal of Advanced Computer Science and Applications 8 (12), 2017 | 64 | 2017 |
Forensic tool comparison on instagram digital evidence based on android with the nist method I Riadi, A Yudhana, MCF Putra Scientific Journal of Informatics 5 (2), 235-247, 2018 | 57 | 2018 |
DDoS classification using neural network and naïve bayes methods for network forensics A Yudhana, I Riadi, F Ridho International Journal of Advanced Computer Science and Applications 9 (11), 2018 | 56 | 2018 |
Analysis of secure hash algorithm (SHA) 512 for encryption process on web based application M Sumagita, I Riadi, J Sh, U Warungboto International Journal of Cyber-Security and Digital Forensics (IJCSDF) 7 (4 …, 2018 | 55 | 2018 |
Network forensics for detecting flooding attack on internet of things (IoT) device R Rizal, I Riadi, Y Prayudi Int. J. Cyber-Security Digit. Forensics 7 (4), 382-390, 2018 | 52 | 2018 |
Analisis keamanan sistem informasi berdasarkan framework COBIT 5 menggunakan Capability Maturity Model Integration (CMMI) R Umar, I Riadi, E Handoyo J. Sist. Inf. Bisnis 9 (1), 47, 2019 | 49 | 2019 |
Security level analysis of academic information systems based on standard ISO 27002: 2003 using SSE-CMM E Kurniawan, I Riadi arXiv preprint arXiv:1802.03613, 2018 | 48 | 2018 |
Forensic SIM Card Cloning Using Authentication Algorithm AL Nuril Anwar, Imam Riadi International Journal of Electronics and Information Engineering 4 (2), 71-81, 2016 | 48 | 2016 |
Analisis dan Optimalisasi Jaringan Menggunakan Teknik Load Balancing (Studi Kasus Jaringan UAD Kampus 3) MD Haryanto, I Riadi Jurnal Sarjana Teknik Informatika 2 (3), 172-180, 2014 | 48 | 2014 |
Analisis Perbandingan Detection Traffic Anomaly Dengan Metode Naive Bayes Dan Support Vector Machine (Svm) I Riadi, R Umar, FD Aini ILKOM Jurnal Ilmiah 11 (1), 17-24, 2019 | 46 | 2019 |
Network forensics for detecting flooding attack on web server D Mualfah, I Riadi International Journal of Computer Science and Information Security 15 (2), 326, 2017 | 45 | 2017 |
Forensic tools performance analysis on android-based blackberry messenger using NIST measurements I Riadi, R Umar, A Firdonsyah Int. J. Electr. Comput. Eng 8 (5), 3991-4003, 2018 | 44 | 2018 |