PERANCANGAN APLIKASI PENGUJIAN CELAH KEAMANAN PADA APLIKASI BERBASIS WEB F Yudha, AM Panji Cyber Security dan Forensik Digital 1 (1), 2018 | 34 | 2018 |
A proposed model for investigating on web WhatsApp application F Yudha, A Luthfi, Y Prayudi Advanced Science Letters 23 (5), 4050-4054, 2017 | 9 | 2017 |
A Prototype of Portable Digital Forensics Imaging Tools using Raspberry Device F Yudha, E Ramadhani, RM Komaryan IOP Conference Series: Materials Science and Engineering 1077 (1), 012064, 2021 | 8 | 2021 |
Teknik Audio Forensik dengan Metode Minkowski untuk Pengenalan Rekaman Suara Pelaku Kejahatan M Azwar, S Hidayat, F Yudha Cyber Security dan Forensik Digital 4 (1), 1-12, 2021 | 7 | 2021 |
Pendekatan dd sebagai salah satu teknik akuisisi perangkat android F Yudha, E Ramadhani, F Rahma, WN Hamzah Cyber Security dan Forensik Digital 3 (1), 33-38, 2020 | 5 | 2020 |
Teknik Eksplorasi Bukti Digital Pada File Sharing Protokol SMB Untuk Mendukung Forensika Digital Pada Jaringan Komputer F Yudha, Y Prayudi Conference Paper Retrieved from KNIF, Konferensi Nasional Informatika ITB …, 2013 | 4 | 2013 |
A custom recovery approach for physical forensic imaging of android device F Yudha, E Ramadhani, D Sudyana, WN Hamzah AIP Conference Proceedings 2508 (1), 2023 | 2 | 2023 |
Usb Analysis Tool Untuk Investigasi Forensika Digital Y Fietyata Jurnal, telah diterbitkan. Yogyakarta: Fakultas Teknologi Industri …, 2013 | 2 | 2013 |
Two-stage multi-datasource machine learning for attack technique and lifecycle detection YD Lin, SY Yang, D Sudyana, F Yudha, YC Lai, RH Hwang Computers & Security 142, 103859, 2024 | 1 | 2024 |
Analisis Investigasi Forensik Digital pada Layanan Private Cloud Computing Menggunakan SNI 27037: 2014 D Sudyana, I Hadi, F Yudha Buletin Profesi Insinyur 6 (1), 14-19, 2023 | 1 | 2023 |
Block and Inode Based Analysis on EXT4 File System F Yudha, Y Prayudi Advanced Science Letters 24 (1), 652-655, 2018 | 1 | 2018 |
Quality Analysis in IDS Dataset: Impact on Model Generalization D Sudyana, M Verkerken, L D’Hooge, YD Lin, RH Hwang, YC Lai, ... 2024 IEEE Conference on Communications and Network Security (CNS), 1-6, 2024 | | 2024 |
OPTIMALISASI PERFORMA AKSES HALAMAN WEB DENGAN MEMANFAATKAN TEKNIK LOAD BALANCING PADA GOOGLE CLOUD I Firmansyah, F Yudha Journal of Education Informatic Technology and Science 3 (1), 49-58, 2021 | | 2021 |
Penerapan CFTT untuk Pengujian Aplikasi Web-Based Android Analysis Tools (WAAT) Dengan Federated Testing Y Muin, Y Prayudi, F Yudha JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 8 (2), 870-879, 2021 | | 2021 |
Study on implementing tor communication in connection to storage service provider E Ramadhani, F Yudha IOP Conference Series: Materials Science and Engineering 508 (1), 012141, 2019 | | 2019 |
Web Crawling Technique for Vulnerability Assessment on Web F Yudha, AM Panji, L Adiputro AR, E Ramadhani Lecture Notes in Electrical, Electronic and Computer Engineering, 48-54, 2019 | | 2019 |
Perancangan Nenggala Disk Duplicator (Ndd) untuk Mendukung Proses Investigasi Forensik Digital F Yudha Teknoin 24 (1), 29-40, 2018 | | 2018 |
Model Analisis Berbasis Blok Pada Sistem File EXT4 F Yudha, A Luthfi Hacking and Digital Forensic Exposed 2016, 2016 | | 2016 |
Analysis of Wireless Network Security Level in FTI Building of Islamic University of Indonesia Hamid, F Yudha 1st International Symposium on Digital Forensics and Security, 2012 | | 2012 |