A fuzzy TOPSIS multiple-attribute decision making for scholarship selection S Uyun, I Riadi arXiv preprint arXiv:1306.6489, 2013 | 79 | 2013 |
Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik I Riadi Jurnal Sistem Informasi Indonesia 1 (1), 71-80, 2011 | 70 | 2011 |
Analisis investigasi forensik WhatsApp Messenger smartphone terhadap WhatsApp berbasis Web N Anwar, I Riadi Jurnal Ilmu Teknik Elektro Komputer dan Informatika (JITEKI) 3 (1), 1-10, 2017 | 63 | 2017 |
Mobile forensic tools evaluation for digital crime investigation R Umar, I Riadi, GM Zamroni Int. J. Adv. Sci. Eng. Inf. Technol 8 (3), 949, 2018 | 62 | 2018 |
Identification of digital evidence on Android’s Blackberry Messenger using NIST mobile forensic method I Riadi, R Umar, A Firdonsyah International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 58 | 2017 |
A comparative study of forensic tools for WhatsApp analysis using NIST measurements R Umar, I Riadi, GM Zamroni Int. J. Adv. Comput. Sci. Appl 8 (12), 69-75, 2017 | 43 | 2017 |
Forensic SIM Card Cloning Using Authentication Algorithm AL Nuril Anwar, Imam Riadi International Journal of Electronics and Information Engineering 4 (2), 71-81, 2016 | 42 | 2016 |
Implementation of malware analysis using static and dynamic analysis method S YusirwanS, Y Prayudi, I Riadi International Journal of Computer Applications 117 (6), 11-15, 2015 | 40 | 2015 |
Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij) I Riadi, R Umar, IM Nasrulloh Elinvo (Electronics, Informatics, and Vocational Education) 3 (1), 70-82, 2018 | 39 | 2018 |
Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist A Yudhana, I Riadi, I Anshori IT Journal Research and Development 3 (1), 13-21, 2018 | 36 | 2018 |
Forensic investigation technique on android's blackberry messenger using nist framework I Riadi International Journal of Cyber-Security and Digital Forensics 6 (4), 198-206, 2017 | 33 | 2017 |
Security level analysis of academic information systems based on standard ISO 27002: 2003 using SSE-CMM E Kurniawan, I Riadi arXiv preprint arXiv:1802.03613, 2018 | 31 | 2018 |
Denial of Service Log Analysis Using Density K-Means Method AII Riadi Journal of Theoretical and Applied Information Technology 83 (2), 299-302, 2016 | 31 | 2016 |
Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method I Riadi, A Yudhana, MCF Putra Scientific Journal of informatics 5 (2), 235-247, 2018 | 29 | 2018 |
FORENSIC ANALYSIS AND PREVENT OF CROSS SITE SCRIPTING IN SINGLE VICTIM ATTACK USING OPEN WEB APPLICATION SECURITY PROJECT (OWASP) FRAMEWORK. A Kurniawan, I Riadi, A LUTHFI Journal of Theoretical & Applied Information Technology 95 (6), 2017 | 28 | 2017 |
Network forensics for detecting flooding attack on web server D Mualfah, I Riadi International Journal of Computer Science and Information Security 15 (2), 326, 2017 | 28 | 2017 |
Network forensics for detecting flooding attack on internet of things (IoT) device R Rizal, I Riadi, Y Prayudi Int. J. Cyber-Security Digit. Forensics 7 (4), 382-390, 2018 | 27 | 2018 |
Live forensics on routeros using api services to investigate network attacks MI Mazdadi, I Riadi, A Luthfi International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 27 | 2017 |
Implementasi Proxy Server dan Load Balancing Menggunakan Metode Per Connection Classifier (PCC) Berbasis Mikrotik (Studi kasus: Shmily. net) FJ Bhayangkara, I Riadi Jurnal Sarjana Teknik Informatika 2 (2), 409-420, 2014 | 27 | 2014 |
Log analysis techniques using clustering in network forensics I Riadi, JE Istiyanto, A Ashari arXiv preprint arXiv:1307.0072, 2013 | 27 | 2013 |