Digital chain of custody: State of the art Y Prayudi, A Sn International Journal of Computer Applications 114 (5), 2015 | 115 | 2015 |
Informatika kesehatan S Kusumadewi, A Fauzijah, AA Khoiruddin, F Wahid, MA Setiawan, ... Yogyakarta: Graha Ilmu, 27-4, 2009 | 101 | 2009 |
Implementation of malware analysis using static and dynamic analysis method I Riadi International Journal of Computer Applications 975, 8887, 2015 | 89 | 2015 |
Rancang Bangun Sistem Untuk Manajemen Barang Bukti Fisik dan Chain of Custody (CoC) pada Penyimpananan Laboratorium Forensika Digital TF Efendi, R Rahmadi, Y Prayudi Jurnal Teknologi dan Manajemen Informatika 6 (2), 53-63, 2020 | 55 | 2020 |
Digital evidence cabinets: A proposed framework for handling digital chain of custody Y Prayudi, A Ashari, TK Priyambodo International Journal of Computer Applications 107 (9), 2014 | 53 | 2014 |
Network forensics for detecting flooding attack on internet of things (IoT) device R Rizal, I Riadi, Y Prayudi Int. J. Cyber-Security Digit. Forensics 7 (4), 382-390, 2018 | 52 | 2018 |
Penerapan System Development Life Cycle (Sdlc) Dalam Mengembangkan Framework Audio Forensik R Inggi, Y Prayudi, B Sugiantoro Jurnal SemanTIK 4 (2), 193-200, 2018 | 43 | 2018 |
Studi dan Analisis Algoritma Rivest Code 6 (RC6) dalam Enkripsi/Dekripsi Data Y Prayudi, I Halik Seminar Nasional Aplikasi Teknologi Informasi (SNATI), 2005 | 43 | 2005 |
A maturity level framework for measurement of information security performance I Riadi, Y Prayudi International Journal of Computer Applications 141 (8), 975-8887, 2016 | 39 | 2016 |
A proposed digital forensics business model to support cybercrime investigation in Indonesia Y Prayudi, A Ashari, TK Priyambodo International Journal of Computer Network and Information Security 7 (11), 1-8, 2015 | 38 | 2015 |
Cyber profiling using log analysis and k-means clustering M Zulfadhilah, Y Prayudi, I Riadi International Journal of Advanced Computer Science and Applications 7 (7 …, 2016 | 35 | 2016 |
Live forensics for anti-forensics analysis on private portable web browser T Rochmadi, I Riadi, Y Prayudi Int. J. Comput. Appl 164 (8), 31-37, 2017 | 34 | 2017 |
Implementasi Visi Komputer Dan Segmentasi Citra Untuk Klasifikasi Bobot Telur Ayam Ras AA Wijaya, Y Prayudi Seminar Nasional Aplikasi Teknologi Informasi (SNATI), 2010 | 32 | 2010 |
Kajian awal: e-learning readiness index (ELRI) sebagai model bagi evaluasi e-Learning pada sebuah institusi Y Prayudi Seminar Nasional Aplikasi Teknologi Informasi (SNATI), 2009 | 31 | 2009 |
Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard MA Zulkifli, I Riadi, Y Prayudi Int. J. Comput. Appl 180 (35), 23-30, 2018 | 28 | 2018 |
Penggunaan metode templete matching Untuk identifikasi kecacatan pada pcb AW Wardhana, Y Prayudi Seminar Nasional Aplikasi Teknologi Informasi (SNATI), 2008 | 28 | 2008 |
Virtual machine forensic analysis and recovery method for recovery and analysis digital evidence E Wahyudi, I Riadi, Y Prayudi International Journal of Computer Science and Information Security 16, 2018 | 27 | 2018 |
Penerapan Metode ISSAF dan OWASP versi 4 Untuk Uji Kerentanan Web Server RT Dirgahayu, Y Prayudi, A Fajaryanto Networking Engineering Research Operation 1 (3), 2015 | 27 | 2015 |
Image encryption using combination of chaotic system and rivers shamir adleman (RSA) P Irfan, Y Prayudi, I Riadi International Journal of Computer Applications 123 (6), 2015 | 26 | 2015 |
Problema dan Solusi Digital Chain of Custody Dalam Proses Investigasi Cybercrime Y Prayudi Senasti-Seminar Nasional Sains dan Teknologi Informasi, 8, 2014 | 25 | 2014 |