Dr. Imam Riadi M.Kom

Diahirkan di Kudus Jawa Tengah

imamriadi.com

  • Sistem Informasi
  • Sistem Informasi
  • S3-UGM-ILMU KOMPUTER
Pencapaian Karier
  • Total Publikasi 15
Google Scholar
  • Total Citations 347

Tahun Nama Penghargaan
Tanggal Nama Pengabdian
Tahun Judul
2011 A Fuzzy Topsis Multiple-Attribute Decision Making for Scholarship Selection
2011 Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik
2011 Pengembangan Clustering DBMS Untuk Meningkatkan Kinerja SIA di UAD (Sistem Informasi Akademik di Universitas Ahmad Dahlan
2010 Optimasi Bandwith Menggunakan Traffic Shapping
2010 Pengembangan Framework untuk Meningkatkan Efisiensi Proses Pembangunan Aplikasi Sistem Informasi di Universitas Ahmad Dahlan
2010 Pengembangan Infrastruktur TIK pada Muktamar Muhammadiyah ke -46
2010 Tim Pemantau Independent UNAS 2009/2010 se-kab Kulon Progo
2009 Rule Based Configuration Management using SNMP
2009 Optimal Security for Scada Control Systems
2009 Pelatihan Komputer Guru-guru SMA N 1 Pundong Bantul (Batch 2)
2009 Tim Pemantau Independent UNAS 2008/2009 se-kab Kulon Progo
2008 Optimalisasi Keamanan Website Menggunakan Captcha
2008 Visualisasi Monitoring Port Menggunakan Sharewall
2008 Analisa Perancangan WarDriving Sistem Keamanan WLAN Menggunakan Metode ESSMI
2008 Analisa Keamanan Website dari Serangan SQL Injection
2008 Pelatihan Komputer Guru-guru SMA N 1 Pundong Bantul (Batch 1)
Tahun Judul
2017 A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements
2017 Forensic Investigation Technique on Android's Blackberry Messenger using NIST Framework
2017 The Digital Forensic Analysis of Snapchat Application Using XML Records
2017 Evaluation of Integrated Digital Forensics Investigation Framework for the Investigation of Smartphones Using Soft System Methodology
2017 Development and Evaluation of Android Based Notification System to Determine Patient's Medicine for Pharmaceutical Clinic
2016 Denial of Service Log Analysis Using Density K-Means Method
2016 An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload
2016 A Maturity Level Framework For Measurement of Information Security Performance
2016 Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy
2016 Forensics Analysis From Cloud Storage on Proprietary Operating System
2016 Forensic SIM Card Cloning Using Authentication Algorithm
2016 Cyber Profiling Using Log Analysis and K-Means Clustering
2016 Investigation on the Services of Private Cloud Computing by Using ADAM Method
2016 Log Classification Using K-Means Clustering For Identify Internet User Behaviors
2016 Automation Framework for Rogue Access Point Mitigation in IEEE 802.1X- Based WLAN

UGM

ILMU KOMPUTER

Jenjang S3
Tahun Lulus 2014

UGM

ILMU KOMPUTER

Jenjang S2
Tahun Lulus 2004

UNY

PENDIDIKAN TEKNIK ELEKTRO

Jenjang S1
Tahun Lulus 2001
Tahun Judul
2013 A fuzzy TOPSIS multiple-attribute decision making for scholarship selection
S Uyun, I Riadi
arXiv preprint arXiv:1306.6489, 2013
2011 Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik
I Riadi
Jurnal Sistem Informasi Universitas Ahmad Dahlan, Yogyakarta. http://is. uad …, 2011
2016 Forensic SIM Card Cloning Using Authentication Algorithm
AL Nuril Anwar, Imam Riadi
International Journal of Electronics and Information Engineering 4 (2), 71-81, 2016
2015 Implementation of Malware Analysis using Static and Dynamic Analysis Method
Y Prayudi, I Riadi
International Journal of Computer Applications 117 (6), 11-15, 2015
2016 Denial of Service Log Analysis Using Density K-Means Method
AII Riadi
Journal of Theoretical and Applied Information Technology 83 (2), 299-302, 2016
2013 Log analysis techniques using clustering in network forensics
I Riadi, JE Istiyanto, A Ashari
arXiv preprint arXiv:1307.0072, 2013
2011 Implementasi Quality of Service Menggunakan Metode Hierarchical Token Bucket
I Riadi, WP Wicaksono
Mei 16, 2014, 2011
2013 Internet Forensics Framework Based-on Clustering
I Riadi, JE Istiyanto, A Ashari
Int. J. Adv. Comput. Sci. Appl 4 (12), 115-123, 2013
2017 Network Forensics For Detecting Flooding Attack On Web Server
D Mualfah, I Riadi
International Journal of Computer Science and Information Security 15 (2), 326, 2017
2017 Sunardi;, Firdonsyah A. Forensic Investigation Technique on Android’s Blackberry Messenger using NIST Framework
I Riadi
Int. J. Cyber-Security Digit. Forensics 16 (4), 198-205, 2017
0 Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method
I Riadi, R Umar
2017 FORENSIC ANALYSIS AND PREVENT OF CROSS SITE SCRIPTING IN SINGLE VICTIM ATTACK USING OPEN WEB APPLICATION SECURITY PROJECT (OWASP) FRAMEWORK.
ADE KURNIAWAN, I RIADI, A LUTHFI
Journal of Theoretical & Applied Information Technology 95 (6), 2017
2017 A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements
R Umar, I Riadi, GM Zamroni
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 8 (12 …, 2017
2017 Live Forensics on RouterOS using API Services to Investigate Network Attacks
MI Mazdadi, I Riadi, A Luthfi
International Journal of Computer Science and Information Security 15 (2), 406, 2017
2013 Rancang Bangun Sistem Hotspot Menggunakan Captive Portal
A Supriyono, I Riadi
Jurnal Sarjana Teknik Informatika 1 (1), 2013
2012 Optimasi Bandwith Menggunakan Traffic Shapping
I Riadi
Jurnal Informatika 4 (1), 374-381, 2012
2017 THE DIGITAL FORENSIC ANALYSIS OF SNAPCHAT APPLICATION USING XML RECORDS.
MP AJI, I RIADI, A LUTFHI
Journal of Theoretical & Applied Information Technology 95 (19), 2017
2016 Investigation on the Services of Private Cloud Computing by Using ADAM Method
N Widiyasono, I Riadi, A Luthfie
International Journal of Electrical and Computer Engineering (IJECE) 6 (5 …, 2016
2017 Forensic Analysis of Frozen Hard Drive Using Static Forensics Method
F Albanna, I Riadi
International Journal of Computer Science and Information Security 15 (1), 173, 2017
2017 Mobile Forensics Development of Mobile Banking Application using Static Forensic
AP Kuncoro, I Riadi, A Luthfi
International Journal of Computer Applications 160 (1), 2017