Dr. Imam Riadi M.Kom.

Diahirkan di Kudus Jawa Tengah

imamriadi.com

  • Sistem Informasi
  • Sistem Informasi
  • S3-UGM-ILMU KOMPUTER
Pencapaian Karier
  • Total Publikasi 25
Google Scholar
  • Total Citations 1188

Tahun Nama Penghargaan
Tanggal Nama Pengabdian
Tahun Judul
2011 A Fuzzy Topsis Multiple-Attribute Decision Making for Scholarship Selection
2011 Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik
2011 Pengembangan Clustering DBMS Untuk Meningkatkan Kinerja SIA di UAD (Sistem Informasi Akademik di Universitas Ahmad Dahlan
2010 Optimasi Bandwith Menggunakan Traffic Shapping
2010 Pengembangan Framework untuk Meningkatkan Efisiensi Proses Pembangunan Aplikasi Sistem Informasi di Universitas Ahmad Dahlan
2010 Pengembangan Infrastruktur TIK pada Muktamar Muhammadiyah ke -46
2010 Tim Pemantau Independent UNAS 2009/2010 se-kab Kulon Progo
2009 Rule Based Configuration Management using SNMP
2009 Optimal Security for Scada Control Systems
2009 Pelatihan Komputer Guru-guru SMA N 1 Pundong Bantul (Batch 2)
2009 Tim Pemantau Independent UNAS 2008/2009 se-kab Kulon Progo
2008 Optimalisasi Keamanan Website Menggunakan Captcha
2008 Visualisasi Monitoring Port Menggunakan Sharewall
2008 Analisa Perancangan WarDriving Sistem Keamanan WLAN Menggunakan Metode ESSMI
2008 Analisa Keamanan Website dari Serangan SQL Injection
2008 Pelatihan Komputer Guru-guru SMA N 1 Pundong Bantul (Batch 1)
Tahun Judul
2019 Vulnerability Analysis of E-voting Application using Open Web Application Security Project (OWASP) Framework
2019 Live forensics analysis of line app on proprietary operating system
2019 Forensic WhatsApp based Android using National Institute of Standard Technology (NIST) Method
2019 Identification of Speaker Recognition For Audio Forensic Using K-Nearest Neighbor
2019 Analysis Mobile Forensics on Twitter Application using the National Institute of Justice (NIJ) Method
2018 DDOS Classification Using Neural Network And Naive Bayes Method For Network Forensics
2018 Analysis On Predicting Cyberterrorism Using AHP (Analytical Hierarchy Process) Method
2018 A Study Of Mobile Forensic Tool Evaluation On Android-Based Line Messenger
2018 Mobile Forensic Tools Evaluation for Digital Crime Investigation
2018 Detection And Analysis Cerber Ransomeware Based on Network Forensics Behavior
2017 A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements
2017 Forensic Investigation Technique on Android's Blackberry Messenger using NIST Framework
2017 The Digital Forensic Analysis of Snapchat Application Using XML Records
2017 Evaluation of Integrated Digital Forensics Investigation Framework for the Investigation of Smartphones Using Soft System Methodology
2017 Development and Evaluation of Android Based Notification System to Determine Patient's Medicine for Pharmaceutical Clinic
2016 Denial of Service Log Analysis Using Density K-Means Method
2016 An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload
2016 A Maturity Level Framework For Measurement of Information Security Performance
2016 Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy
2016 Forensics Analysis From Cloud Storage on Proprietary Operating System
2016 Forensic SIM Card Cloning Using Authentication Algorithm
2016 Cyber Profiling Using Log Analysis and K-Means Clustering
2016 Investigation on the Services of Private Cloud Computing by Using ADAM Method
2016 Log Classification Using K-Means Clustering For Identify Internet User Behaviors
2016 Automation Framework for Rogue Access Point Mitigation in IEEE 802.1X- Based WLAN

UGM

ILMU KOMPUTER

Jenjang S3
Tahun Lulus 2014

UGM

ILMU KOMPUTER

Jenjang S2
Tahun Lulus 2004

UNY

PENDIDIKAN TEKNIK ELEKTRO

Jenjang S1
Tahun Lulus 2001
Tahun Judul
2013 A fuzzy TOPSIS multiple-attribute decision making for scholarship selection
S Uyun, I Riadi
arXiv preprint arXiv:1306.6489, 2013
2011 Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik
I Riadi
Jurnal Sistem Informasi Indonesia 1 (1), 71-80, 2011
2017 Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method
I Riadi, R Umar, A Firdonsyah
International Journal of Computer Science and Information Security (IJCSIS …, 2017
2015 Implementation of malware analysis using static and dynamic analysis method
S YusirwanS, Y Prayudi, I Riadi
IJCA 117 (6), 11-15, 2015
2018 Mobile forensic tools evaluation for digital crime investigation
R Umar, I Riadi, GM Zamroni
Int. J. Adv. Sci. Eng. Inf. Technol 8 (3), 949, 2018
2016 Forensic SIM Card Cloning Using Authentication Algorithm
AL Nuril Anwar, Imam Riadi
International Journal of Electronics and Information Engineering 4 (2), 71-81, 2016
2017 Forensic investigation technique on android's blackberry messenger using nist framework
I Riadi
International Journal of Cyber-Security and Digital Forensics 6 (4), 198-206, 2017
2017 Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web
N Anwar, I Riadi
Jurnal Ilmu Teknik Elektro Komputer dan Informatika (JITEKI) 3 (1), 1-10, 2017
2017 A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements
R Umar, I Riadi, GM Zamroni
Int. J. Adv. Comput. Sci. Appl 8 (12), 69-75, 2017
2013 Log analysis techniques using clustering in network forensics
I Riadi, JE Istiyanto, A Ashari
arXiv preprint arXiv:1307.0072, 2013
2017 Live Forensics on RouterOS using API Services to Investigate Network Attacks
MI Mazdadi, I Riadi, A Luthfi
International Journal of Computer Science and Information Security (IJCSIS …, 2017
2016 Denial of Service Log Analysis Using Density K-Means Method
AII Riadi
Journal of Theoretical and Applied Information Technology 83 (2), 299-302, 2016
2013 Internet Forensics Framework Based-on Clustering
I Riadi, JE Istiyanto, A Ashari
Int. J. Adv. Comput. Sci. Appl 4 (12), 115-123, 2013
2018 Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (NIJ)
I Riadi, R Umar, IM Nasrulloh
Elinvo (Electronics, Informatics, and Vocational Education) 3 (1), 70-82, 2018
2017 Network Forensics For Detecting Flooding Attack On Web Server
D Mualfah, I Riadi
International Journal of Computer Science and Information Security 15 (2), 326, 2017
2011 Implementasi Quality of Service Menggunakan Metode Hierarchical Token Bucket
I Riadi, WP Wicaksono
Universitas Ahmad dahlan, 2011
2017 Forensic Analysis of Frozen Hard Drive Using Static Forensics Method
F Albanna, I Riadi
International Journal of Computer Science and Information Security (IJCSIS …, 2017
2018 Network Forensics for Detecting Flooding Attack on Internet of Things (IoT) Device
R Rizal, I Riadi, Y Prayudi
Int. J. Cyber-Security Digit. Forensics 7 (4), 382-390, 2018
2016 A Maturity Level Framework for Measurement of Information Security Performance
YP Rosmiati, Imam Riadi
International Journal of Computer Applications 141 (8), 1-6, 2016
2014 Implementasi Proxy Server dan Load Balancing Menggunakan Metode Per Connection Classifier (PCC) Berbasis Mikrotik (Studi kasus: Shmily. net)
FJ Bhayangkara, I Riadi
Jurnal Sarjana Teknik Informatika 2 (2), 409-420, 2014