Yudi Prayudi
Yudi Prayudi
Teknik Informatika UII Yogyakarta
Email yang diverifikasi di uii.ac.id - Beranda
Judul
Dikutip oleh
Dikutip oleh
Tahun
Implementation of malware analysis using static and dynamic analysis method
S YusirwanS, Y Prayudi, I Riadi
IJCA 117 (6), 11-15, 2015
362015
Digital Chain of Custody : State Of The Art
Y Prayudi, A SN
International Journal of Computer Applications 114 (5), 1-6, 2015
332015
Informatika kesehatan
S Kusumadewi, A Fauzijah, AA Khoiruddin, F Wahid, MA Setiawan, ...
Yogyakarta: Graha Ilmu, 2009
302009
Digital Evidence Cabinets: A Proposed Framework for Handling Digital Chain of Custody
Y Prayudi, A Ashari, TK Priyambodo
International Journal Of Computer Applications 109 (9), 30-36, 2014
272014
Kajian awal: e-learning readiness index (ELRI) sebagai model bagi evaluasi e-Learning pada sebuah institusi
Y Prayudi
Seminar Nasional Aplikasi Teknologi Informasi (SNATI), 2009
222009
Penggunaan metode templete matching Untuk identifikasi kecacatan pada pcb
AW Wardhana, Y Prayudi
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 1 (1), 2008
202008
A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia
Y Prayudi, A Ashari, TK Priyambodo
International Journal of Computer Network and Information Security 7 (11), 1, 2015
192015
Implementasi Visi Komputer Dan Segmentasi Citra Untuk Klasifikasi Bobot Telur Ayam Ras
AA Wijaya, Y Prayudi
Seminar Nasional Aplikasi Teknologi Informasi (SNATI), 2010
192010
A maturity level framework for measurement of information security performance
I Riadi, Y Prayudi
International Journal of Computer Applications 141 (8), 2016
162016
Studi dan Analisis Algoritma RIVEST CODE 6 (RC6) Dalam Enkripsi/Dekripsi Data
Y Prayudi, I Halik
Seminar Nasional Aplikasi Teknologi Informasi (SNATI), 2005
162005
Evaluation of integrated digital forensics investigation framework for the investigation of smartphones using soft system methodology
R Ruuhwan, I Riadi, Y Prayudi
International Journal of Electrical and Computer Engineering 7 (5), 2806, 2017
142017
Information Security Strategy on Mobile Device Based eGovernment
TK Priyambodo, Y Prayudi
Journal of Engineering and Applied Sciences 10 (2), 652-660, 2015
142015
Network Forensics for Detecting Flooding Attack on Internet of Things (IoT) Device
R Rizal, I Riadi, Y Prayudi
Int. J. Cyber-Security Digit. Forensics 7 (4), 382-390, 2018
132018
Live forensics for anti-forensics analysis on private portable web browser
T Rochmadi, I Riadi, Y Prayudi
International Journal of Computer Applications 164 (8), 31-37, 2017
132017
Encryption EXIF metadata for protection photographic image of copyright piracy
H Wijayanto, I Riadi, Y Prayudi
International Journal of Research in Computer and Communication Technology 5 …, 2016
132016
Image encryption using combination of chaotic system and rivers shamir adleman (RSA)
P Irfan, Y Prayudi, I Riadi
International Journal of Computer Applications 123 (6), 2015
132015
Cyber profiling using log analysis and k-means clustering
M Zulfadhilah, Y Prayudi, I Riadi
International Journal of Advanced Computer Science and Applications 7 (7 …, 2016
122016
Implementasi Steganografi Menggunakan Teknik Adaptive Minimum Error Least Significant Bit Replacement (AMELSBR)
Y Prayudi, S Kuncoro
Program Studi Teknik Informatika, Fakultas Teknologi Industri Universitas …, 2005
122005
Konsep hidden message menggunakan teknik steganografi dynamic cell spreading
ES Wijaya, Y Prayudi
Media Informatika 2 (1), 2004
122004
Virtual Machine Forensic Analysis And Recovery Method For Recovery And Analysis Digital Evidence
E Wahyudi, I Riadi, Y Prayudi
International Journal of Computer Science and Information Security 16, 2018
112018
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20