A fuzzy TOPSIS multiple-attribute decision making for scholarship selection S Uyun, I Riadi arXiv preprint arXiv:1306.6489, 2013 | 85 | 2013 |
Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik I Riadi Jurnal Sistem Informasi Indonesia 1 (1), 71-80, 2011 | 75 | 2011 |
Analisis investigasi forensik whatsapp messanger smartphone terhadap whatsapp berbasis web N Anwar, I Riadi Jurnal Ilmiah Teknik Elektro Komputer Dan Informatika 3 (1), 1, 2017 | 69 | 2017 |
Mobile forensic tools evaluation for digital crime investigation R Umar, I Riadi, GM Zamroni Int. J. Adv. Sci. Eng. Inf. Technol 8 (3), 949-955, 2018 | 63 | 2018 |
Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method I Riadi, R Umar, A Firdonsyah International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 59 | 2017 |
A comparative study of forensic tools for WhatsApp analysis using NIST measurements R Umar, I Riadi, GM Zamroni International Journal of Advanced Computer Science and Applications 8 (12), 2017 | 46 | 2017 |
Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij) I Riadi, R Umar, IM Nasrulloh Elinvo (Electronics, Informatics, and Vocational Education) 3 (1), 70-82, 2018 | 42 | 2018 |
Forensic SIM Card Cloning Using Authentication Algorithm AL Nuril Anwar, Imam Riadi International Journal of Electronics and Information Engineering 4 (2), 71-81, 2016 | 42 | 2016 |
Implementation of malware analysis using static and dynamic analysis method S YusirwanS, Y Prayudi, I Riadi International Journal of Computer Applications 117 (6), 11-15, 2015 | 41 | 2015 |
Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist A Yudhana, I Riadi, I Anshori IT Journal Research and Development 3 (1), 13-21, 2018 | 39 | 2018 |
Forensic investigation technique on android's blackberry messenger using nist framework I Riadi International Journal of Cyber-Security and Digital Forensics 6 (4), 198-206, 2017 | 34 | 2017 |
Security level analysis of academic information systems based on standard ISO 27002: 2003 using SSE-CMM E Kurniawan, I Riadi arXiv preprint arXiv:1802.03613, 2018 | 33 | 2018 |
Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method I Riadi, A Yudhana, MCF Putra Scientific Journal of informatics 5 (2), 235-247, 2018 | 32 | 2018 |
Network forensics for detecting flooding attack on web server D Mualfah, I Riadi International Journal of Computer Science and Information Security 15 (2), 326, 2017 | 31 | 2017 |
Denial of Service Log Analysis Using Density K-Means Method AII Riadi Journal of Theoretical and Applied Information Technology 83 (2), 299-302, 2016 | 31 | 2016 |
Pengembangan sistem pengaman jaringan komputer berdasarkan analisis forensik jaringan A Fadlil, I Riadi, S Aji Jurnal Ilmu Teknik Elektro Komputer dan Informatika (JITEKI) 3 (1), 11-19, 2017 | 29 | 2017 |
FORENSIC ANALYSIS AND PREVENT OF CROSS SITE SCRIPTING IN SINGLE VICTIM ATTACK USING OPEN WEB APPLICATION SECURITY PROJECT (OWASP) FRAMEWORK. A Kurniawan, I Riadi, A LUTHFI Journal of Theoretical & Applied Information Technology 95 (6), 2017 | 29 | 2017 |
Forensic Analysis of Frozen Hard Drive Using Static Forensics Method F Albanna, I Riadi International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 29 | 2017 |
Analisis dan Optimalisasi Jaringan Menggunakan Teknik Load Balancing (Studi Kasus Jaringan UAD Kampus 3) MD Haryanto, I Riadi None 2 (2), 574-583, 2014 | 29 | 2014 |
Network forensics for detecting flooding attack on internet of things (IoT) device R Rizal, I Riadi, Y Prayudi Int. J. Cyber-Security Digit. Forensics 7 (4), 382-390, 2018 | 28 | 2018 |