Analisis investigasi forensik whatsapp messanger smartphone terhadap whatsapp berbasis web N Anwar, I Riadi J. Ilm. Tek. Elektro Komput. dan Inform 3 (1), 1, 2017 | 92 | 2017 |
Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik I Riadi Jurnal Sistem Informasi Indonesia 1 (1), 71-80, 2011 | 89 | 2011 |
A fuzzy TOPSIS multiple-attribute decision making for scholarship selection S Uyun, I Riadi arXiv preprint arXiv:1306.6489, 2013 | 87 | 2013 |
Mobile forensic tools evaluation for digital crime investigation R Umar, I Riadi, GM Zamroni Int. J. Adv. Sci. Eng. Inf. Technol 8 (3), 949-955, 2018 | 81 | 2018 |
Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method I Riadi, R Umar, A Firdonsyah International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 75 | 2017 |
Implementation of Malware Analysis using Static and Dynamic Analysis Method Y Prayudi, I Riadi International Journal of Computer Applications 117 (6), 11-15, 2015 | 69 | 2015 |
Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist A Yudhana, I Riadi, I Anshori IT Journal Research and Development 3 (1), 13-21, 2018 | 59 | 2018 |
A comparative study of forensic tools for WhatsApp analysis using NIST measurements R Umar, I Riadi, GM Zamroni International Journal of Advanced Computer Science and Applications 8 (12), 2017 | 55 | 2017 |
Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij) I Riadi, R Umar, IM Nasrulloh Elinvo (Electronics, Informatics, and Vocational Education) 3 (1), 70-82, 2018 | 53 | 2018 |
Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method I Riadi, A Yudhana, MCF Putra Scientific Journal of informatics 5 (2), 235-247, 2018 | 48 | 2018 |
Analysis of secure hash algorithm (SHA) 512 for encryption process on web based application M Sumagita, I Riadi, J Sh, U Warungboto International Journal of Cyber-Security and Digital Forensics (IJCSDF) 7 (4 …, 2018 | 45 | 2018 |
Forensic SIM Card Cloning Using Authentication Algorithm AL Nuril Anwar, Imam Riadi International Journal of Electronics and Information Engineering 4 (2), 71-81, 2016 | 44 | 2016 |
Network forensics for detecting flooding attack on internet of things (IoT) device R Rizal, I Riadi, Y Prayudi Int. J. Cyber-Security Digit. Forensics 7 (4), 382-390, 2018 | 43 | 2018 |
Investigating Cyberbullying On Whatsapp Using Digital Forensics Research Workshop I Riadi, P Widiandana Jurnal Resti (Rekayasa Sistem Dan Teknologi Informasi) 4 (4), 730-735, 2020 | 40 | 2020 |
Security level analysis of academic information systems based on standard ISO 27002: 2003 using SSE-CMM E Kurniawan, I Riadi arXiv preprint arXiv:1802.03613, 2018 | 40 | 2018 |
Forensic investigation technique on android's blackberry messenger using nist framework I Riadi International Journal of Cyber-Security and Digital Forensics 6 (4), 198-206, 2017 | 39 | 2017 |
Network forensics for detecting flooding attack on web server D Mualfah, I Riadi International Journal of Computer Science and Information Security 15 (2), 326, 2017 | 38 | 2017 |
Analisis dan Optimalisasi Jaringan Menggunakan Teknik Load Balancing (Studi Kasus Jaringan UAD Kampus 3) MD Haryanto, I Riadi Jurnal Sarjana Teknik Informatika 2 (2), 574-583, 2014 | 38 | 2014 |
DDoS classification using neural network and naďve bayes methods for network forensics A Yudhana, I Riadi, F Ridho International Journal of Advanced Computer Science and Applications 9 (11), 2018 | 37 | 2018 |
Denial of Service Log Analysis Using Density K-Means Method AII Riadi Journal of Theoretical and Applied Information Technology 83 (2), 299-302, 2016 | 37 | 2016 |