Comparison of data acquisition technique using logical extraction method on Unrooted Android Device NYP Lukito, FA Yulianto, E Jadied 2016 4th International Conference on Information and Communication …, 2016 | 18 | 2016 |
The prototype of hand gesture recognition for elderly people to control connected home devices S Al Ayubi, DW Sudiharto, EM Jadied, E Aryanto Journal of Physics: Conference Series 1201 (1), 012042, 2019 | 14 | 2019 |
An SSH honeypot architecture using port knocking and intrusion detection system RM Arifianto, P Sukarno, EM Jadied 2018 6th International Conference on Information and Communication …, 2018 | 14 | 2018 |
Design and implementation of encrypted SMS on Android smartphone combining ECDSA-ECDH and AES MH Azaim, DW Sudiharto, EM Jadied 2016 Asia Pacific Conference on Multimedia and Broadcasting (APMediaCast), 18-23, 2016 | 14 | 2016 |
Analysis and classification of danger level in android applications using naive Bayes algorithm RA Utama, P Sukarno, EM Jadied 2018 6th International Conference on Information and Communication …, 2018 | 9 | 2018 |
Digital forensic analysis on iDevice: Jailbreak iOS 12.1. 1 as a case study AA Ali, N Cahyani, E Jadied Indonesian Journal on Computing (Indo-JC) 4 (2), 205-218, 2019 | 8 | 2019 |
Peningkatan Akurasi Pendeteksian Serangan DDoS Menggunakan Multiclassifier Ensemble Learning dan Chi-Square DB Satmoko, P Sukarno, EM Jadied vol 5, 7977-7985, 2018 | 7 | 2018 |
Swap files anti-forensics on linux E Jadied 2016 Asia Pacific Conference on Multimedia and Broadcasting (APMediaCast), 73-79, 2016 | 5 | 2016 |
Increasing feature selection accuracy through recursive method in intrusion detection system AJ Silaban, S Mandala, EM Jadied International Journal on Information and Communication Technology (IJoICT) 4 …, 2018 | 4 | 2018 |
Analisis Performansi Aplikasi Sandbox pada Sistem Operasi Windows KAR Indradevi, P Sukarno, EM Jadied eProceedings of Engineering 5 (3), 7536-7543, 2018 | 4 | 2018 |
Pemilihan Desain Landing Page dari limpapehhandmade. net Menggunakan A/B Testing DW Sudiharto, HVD Astari, HH Nuha, E Ariyanto, EM Jadied Jurnal Pemanfaatan Teknologi untuk Masyarakat: Jurnal Pengabdian Masyarakat …, 2022 | 3 | 2022 |
Analysis of IPSec implementation on dynamic multipoint VPN protocol using routing border gateway protocol MA Said, S Setyorini, EM Jadied Building of Informatics, Technology and Science (BITS) 4 (2), 595-605, 2022 | 3 | 2022 |
Internet of Things (IoT) Based Free Fall Motion Instructions in Physics Subjects for Class X Students MN Fauzan, NA Suwastika, EM Jadied Jurnal Media Informatika Budidarma 6 (2), 876, 2022 | 3 | 2022 |
Analysis and Implementation of Signature Based Method and Structure File Based Method for File Carving A Afrizal, NDW Cahyani, EM Jadied Indonesian Journal on Computing (Indo-JC) 6 (1), 13-22, 2021 | 3 | 2021 |
Analisis Perbandingan Performansi Load Balancing Menggunakan Algoritma Weighted Round Robin dengan Weighted Least Connection pada Software Defined Network SLP Panjaitan, M Abdurohman, EM Jadied Fakultas Informatika, Universitas Telkom, 2019 | 3 | 2019 |
Hardening the virtual password authentication scheme MZF Rahiemy, P Sukarno, EM Jadied 2018 6th International Conference on Information and Communication …, 2018 | 3 | 2018 |
Analisis Perbandingan UDP dan DCCP Pada Jaringan SD-WAN AT Sabiq, SA Karimah, EM Jadied eProceedings of Engineering 10 (3), 2023 | 2 | 2023 |
The Influence of virtual secure mode (VSM) on memory acquisition NDW Cahyani, EM Jadied, NH Ab Rahman, E Ariyanto International Journal of Advanced Computer Science and Applications 13 (11), 2022 | 2 | 2022 |
Implementasi dan Analisis Sistem Operasi Waktu-Nyata CHIBI Pada Mikrokontroler ARM EA Manapa, E Ariyanto, EM Jadied eProceedings of Engineering 3 (2), 2016 | 2 | 2016 |
An Impact Analysis of Damage Level caused by Malware with Dynamic Analysis Approach CA Anugerah, EM Jadied, N Cahyani International Journal on Information and Communication Technology (IJoICT …, 2024 | 1 | 2024 |