Analisis investigasi forensik whatsapp messanger smartphone terhadap whatsapp berbasis web N Anwar, I Riadi J. Ilm. Tek. Elektro Komput. dan Inform 3 (1), 1, 2017 | 123 | 2017 |
Mobile forensic tools evaluation for digital crime investigation R Umar, I Riadi, GM Zamroni Int. J. Adv. Sci. Eng. Inf. Technol 8 (3), 949-955, 2018 | 100 | 2018 |
Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik I Riadi Jurnal Sistem Informasi Indonesia 1 (1), 71-80, 2011 | 95 | 2011 |
Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method I Riadi, R Umar, A Firdonsyah International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 86 | 2017 |
Implementation of Malware Analysis using Static and Dynamic Analysis Method Y Prayudi, I Riadi International Journal of Computer Applications 117 (6), 11-15, 2015 | 86 | 2015 |
A fuzzy TOPSIS multiple-attribute decision making for scholarship selection S Uyun, I Riadi arXiv preprint arXiv:1306.6489, 2013 | 85 | 2013 |
Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij) I Riadi, R Umar, IM Nasrulloh Elinvo (Electronics, Informatics, and Vocational Education) 3 (1), 70-82, 2018 | 73 | 2018 |
Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist A Yudhana, I Riadi, I Anshori IT Journal Research and Development 3 (1), 13-21, 2018 | 71 | 2018 |
A comparative study of forensic tools for WhatsApp analysis using NIST measurements R Umar, I Riadi, GM Zamroni International Journal of Advanced Computer Science and Applications 8 (12), 2017 | 62 | 2017 |
Analysis of secure hash algorithm (SHA) 512 for encryption process on web based application M Sumagita, I Riadi, J Sh, U Warungboto International Journal of Cyber-Security and Digital Forensics (IJCSDF) 7 (4 …, 2018 | 60 | 2018 |
Network forensics for detecting flooding attack on internet of things (IoT) device R Rizal, I Riadi, Y Prayudi Int. J. Cyber-Security Digit. Forensics 7 (4), 382-390, 2018 | 57 | 2018 |
Analisis keamanan sistem informasi berdasarkan framework COBIT 5 menggunakan Capability Maturity Model Integration (CMMI) R Umar, I Riadi, E Handoyo Jurnal Sistem Informasi Bisnis 1, 47-53, 2019 | 56 | 2019 |
Forensic tool comparison on instagram digital evidence based on android with the nist method I Riadi, A Yudhana, MCF Putra Scientific Journal of Informatics 5 (2), 235-247, 2018 | 56 | 2018 |
DDoS classification using neural network and naïve bayes methods for network forensics A Yudhana, I Riadi, F Ridho International Journal of Advanced Computer Science and Applications 9 (11), 2018 | 56 | 2018 |
Analysis of security virtual private network (VPN) using openVPN M Iqbal, I Riadi International Journal of Cyber-Security and Digital Forensics 8 (1), 58-65, 2019 | 51 | 2019 |
Review of detection DDOS attack detection using naive bayes classifier for network forensics A Fadlil, I Riadi, S Aji Bulletin of Electrical Engineering and Informatics 6 (2), 140-148, 2017 | 51 | 2017 |
Analisis Keamanan Webserver menggunakan Penetration Test F Fachri, A Fadlil, I Riadi, A Dahlan, Y Jln Soepomo, I Artikel J. Inform 8 (2), 183-190, 2021 | 50 | 2021 |
Analisis Keamanan Website Open Journal System Menggunakan Metode Vulnerability Assessment I Riadi, A Yudhana, W Yunanri Jurnal Teknologi Informasi Dan Ilmu Komputer 7 (4), 853-860, 2020 | 50 | 2020 |
Security level analysis of academic information systems based on standard ISO 27002: 2003 using SSE-CMM E Kurniawan, I Riadi arXiv preprint arXiv:1802.03613, 2018 | 49 | 2018 |
Forensic SIM Card Cloning Using Authentication Algorithm AL Nuril Anwar, Imam Riadi International Journal of Electronics and Information Engineering 4 (2), 71-81, 2016 | 49 | 2016 |