Prof. Dr. Ir. Imam Riadi M.Kom.
Dilahirkan di Kudus Jawa Tengah
- S3 Informatika
- Profesor
- S3-UGM-ILMU KOMPUTER
Tahun | Nama Penghargaan | Pemberi |
---|
Tanggal | Nama Pengabdian | Tempat |
---|
Tahun | Judul |
---|---|
2011 | A Fuzzy Topsis Multiple-Attribute Decision Making for Scholarship Selection |
2011 | Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik |
2011 | Pengembangan Clustering DBMS Untuk Meningkatkan Kinerja SIA di UAD (Sistem Informasi Akademik di Universitas Ahmad Dahlan |
2010 | Optimasi Bandwith Menggunakan Traffic Shapping |
2010 | Pengembangan Framework untuk Meningkatkan Efisiensi Proses Pembangunan Aplikasi Sistem Informasi di Universitas Ahmad Dahlan |
2010 | Pengembangan Infrastruktur TIK pada Muktamar Muhammadiyah ke -46 |
2010 | Tim Pemantau Independent UNAS 2009/2010 se-kab Kulon Progo |
2009 | Rule Based Configuration Management using SNMP |
2009 | Optimal Security for Scada Control Systems |
2009 | Pelatihan Komputer Guru-guru SMA N 1 Pundong Bantul (Batch 2) |
2009 | Tim Pemantau Independent UNAS 2008/2009 se-kab Kulon Progo |
2008 | Optimalisasi Keamanan Website Menggunakan Captcha |
2008 | Visualisasi Monitoring Port Menggunakan Sharewall |
2008 | Analisa Perancangan WarDriving Sistem Keamanan WLAN Menggunakan Metode ESSMI |
2008 | Analisa Keamanan Website dari Serangan SQL Injection |
2008 | Pelatihan Komputer Guru-guru SMA N 1 Pundong Bantul (Batch 1) |
Tahun | Judul | Sebagai | Jenis |
---|---|---|---|
2021 | Header investigation for spam email forensics using framework of national institute of standards and technology | Peneliti/Penulis Utama | Jurnal Nasional Terakreditasi |
2021 | Optimization of system authentication services using blockchain technology | Peneliti/Penulis Utama | Jurnal Nasional Terakreditasi |
2021 | Smart Payment Application Security Optimization from Cross-Site Scripting (XSS) Attacks Based on Blockchain Technology | Peneliti/Penulis Utama | Jurnal Nasional Terakreditasi |
2021 | Network forensics against ryuk ransomware using trigger, acquire, analysis, report, and action (TAARA) method | Peneliti/Penulis Pendamping | Jurnal Nasional Terakreditasi |
2021 | Mitigating Sodinokibi Ransomware Attack on Cloud Network Using Software-Defined Networking (SDN) | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2020 | Mobile Forensic Tools Validation and Evaluation for Instant Messaging | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2020 | Validation Analysis of Scalable Vector Graphics (SVG) File Upload using Magic Number and Document Object Model (DOM) | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2020 | Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2020 | Analysis of academic service cybersecurity in university based on framework COBIT 5 using CMMI | Peneliti/Penulis Utama | Jurnal Ilmiah International Bereputasi |
2020 | Traceability system using IoT and forecasting model for food supply chain | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2019 | Live forensics analysis of line app on proprietary operating system | Peneliti/Penulis Utama | Jurnal Nasional Terakreditasi |
2019 | Analysis Mobile Forensics on Twitter Application using the National Institute of Justice (NIJ) Method | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Tak Bereput |
2019 | Identification of Speaker Recognition For Audio Forensic Using K-Nearest Neighbor | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2019 | Forensic WhatsApp based Android using National Institute of Standard Technology (NIST) Method | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Tak Bereput |
2019 | Vulnerability Analysis of E-voting Application using Open Web Application Security Project (OWASP) Framework | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2018 | Detection And Analysis Cerber Ransomeware Based on Network Forensics Behavior | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2018 | A Study Of Mobile Forensic Tool Evaluation On Android-Based Line Messenger | Peneliti/Penulis Utama | Jurnal Ilmiah International Bereputasi |
2018 | Mobile Forensic Tools Evaluation for Digital Crime Investigation | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2018 | Analysis On Predicting Cyberterrorism Using AHP (Analytical Hierarchy Process) Method | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2018 | DDOS Classification Using Neural Network And Naive Bayes Method For Network Forensics | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2017 | Evaluation of Integrated Digital Forensics Investigation Framework for the Investigation of Smartphones Using Soft System Methodology | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2017 | The Digital Forensic Analysis of Snapchat Application Using XML Records | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2017 | Development and Evaluation of Android Based Notification System to Determine Patient's Medicine for Pharmaceutical Clinic | Peneliti/Penulis Utama | Proceding Internasional Bereputasi |
2017 | A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2017 | Forensic Investigation Technique on Android's Blackberry Messenger using NIST Framework | Peneliti/Penulis Utama | Jurnal Ilmiah International Tak Bereput |
2016 | An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload | Peneliti/Penulis Utama | Jurnal Ilmiah International Tak Bereput |
2016 | Forensics Analysis From Cloud Storage on Proprietary Operating System | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Tak Bereput |
2016 | Log Classification Using K-Means Clustering For Identify Internet User Behaviors | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Tak Bereput |
2016 | Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Tak Bereput |
2016 | Investigation on the Services of Private Cloud Computing by Using ADAM Method | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2016 | A Maturity Level Framework For Measurement of Information Security Performance | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Tak Bereput |
2016 | Cyber Profiling Using Log Analysis and K-Means Clustering | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2016 | Denial of Service Log Analysis Using Density K-Means Method | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
2016 | Forensic SIM Card Cloning Using Authentication Algorithm | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Tak Bereput |
2016 | Automation Framework for Rogue Access Point Mitigation in IEEE 802.1X- Based WLAN | Peneliti/Penulis Pendamping | Jurnal Ilmiah International Bereputasi |
UGM
ILMU KOMPUTER
Jenjang
S3
Tahun Lulus
2014
UGM
ILMU KOMPUTER
Jenjang
S2
Tahun Lulus
2004
UNY
PENDIDIKAN TEKNIK ELEKTRO
Jenjang
S1
Tahun Lulus
2001
Tahun | Judul |
---|---|
2025 |
Accredited Ristekdikti Sinta 2 B Kholifah, I Syarif, T Badriyah, GP Mahardhika, AH Masitha, M Kamada, ... Universitas 10 (3), 2025 |
2025 |
Implementasi CNN berbasis Autoencoder pada Klasifikasi Pola Batik MF Dzulqarnain, A Fadlil, I Riadi Proceeding of Informatics Collaborations and Dessimenation Meeting 1 (1 …, 2025 |
2025 |
Optimasi Protokol Routing Dinamis EIGRP pada Switch Multilayer I Riadi, A Yudhana, H Wintolo, S Sudaryanto, RS Nursanti Proceeding of Informatics Collaborations and Dessimenation Meeting 1 (1 …, 2025 |
2025 |
Analisis Forensik Keamanan Data Pribadi pada Mode Privasi Browser Menggunakan Metode National Institute of Standards and Technology (NIST) M Syukri, I Riadi, T Sutikno Jurnal PROCESSOR 20 (1), 2025 |
2025 |
Analisis Polifarmasi Terhadap Interaksi Obat Di Rumah Sakit Umum Kota Pekalongan YW Permadi, A Akrom, I Riadi, S Rahmatullah Lamda: Jurnal Ilmiah Pendidikan MIPA dan Aplikasinya 5 (1), 69-82, 2025 |
2025 |
Mobile Forensics in Human Trafficking Investigation Services Using Mobile Laboratory M Muammar, I Riadi, R Umar JUITA: Jurnal Informatika, 1-10, 2025 |
2025 |
PENGEMBANGAN ALAT FORENSIK WHATSAPP MENGGUNAKAN ANDROID DEBUG BRIDGE SEBAGAI METODE AKUISISI DATA M Muammar, I Riadi, R Umar JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 10 (2), 1099-1110, 2025 |
2025 |
K-means clustering as an imputation strategy for missing values in scholarship candidate data. T Sutikno, I Riadi Jurnal Mantik 8 (4), 2025 |
2025 |
Analisis Deteksi Penyusup pada Layanan Open Journal System Menggunakan Metode Network Forensic Development Life Cycle H Wintolo, I Riadi, A Yudhana SKANIKA: Sistem Komputer dan Teknik Informatika 8 (1), 133-144, 2025 |
2024 |
Peningkatan Cyber Security Awareness Melalui Pelatihan Edukatif Kepada Siswa Sekolah Menengah Kejuruan KF Habie, AP Putro, H Yuliansyah, I Riadi Mohuyula: Jurnal Pengabdian Kepada Masyarakat 3 (2), 46-43, 2024 |
2024 |
Optimalisasi Layanan Keamanan Captive Portal Menggunakan Klasifikasi Logistic Regression I Riadi, A Fadlil, BA Prabowo INFORMAL: Informatics Journal 9 (3), 189-195, 2024 |
2024 |
Mobile forensic on MiChat messenger services using IDFIF V2 framework I Riadi, A Yudhana, GPI Fanani AIP Conference Proceedings 3093 (1), 2024 |
2024 |
Improving the Accuracy of Batik Classification using Deep Convolutional Auto Encoder MF Dzulqarnain, A Fadlil, I Riadi Compiler 13 (2), 123-130, 2024 |
2024 |
Comparison of Digital Forensic Tools for Drug Trafficking Cases on Instagram Messenger using NIST Method MFM Nahdli, I Riadi, MK Biddinika Scientific Journal of Informatics 11 (4), 891-902, 2024 |
2024 |
APPLICATION OF OWASP ZAP FRAMEWORK FOR SECURITY ANALYSIS OF LMS USING PENTEST METHOD R Umar, I Riadi, SA Wicaksono JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 10 (2), 224-230, 2024 |
2024 |
Higher Education Institution Clustering Based on Key Performance Indicators using Quartile Binning Method VS Fatmawaty, I Riadi, H Herman MATRIK: Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 24 (1 …, 2024 |
2024 |
MAC Address Classification in Privacy Issue Using Gaussian Naïve Bayes I Riadi, A Fadlil, BA Prabowo JUITA: Jurnal Informatika 12 (2), 235-242, 2024 |
2024 |
ScreenMy: a Lightweight Architecture of Tuberculosis-Diabetes Mellitus Screening System Integrating with EMRs F Suryanto, M Arini, I Riadi JUITA: Jurnal Informatika 12 (2), 197-206, 2024 |
2024 |
Security Analysis of Web-Based Academic Information System using OWASP Framework R Umar, I Riadi, MIA Elfatiha Kinetik: Game Technology, Information System, Computer Network, Computing …, 2024 |
2024 |
Behavioral Intention to Adopt Islamic Financial Technology: Theory of Planned Behaviour with Gender Moderation BBK Utami, S Wardiwiyono, W Hawariyuni, M Abduh, I Riadi Jurnal REKSA: Rekayasa Keuangan, Syariah dan Audit 11 (2), 139-154, 2024 |
2024 |
Prediksi kelulusan tepat waktu berdasarkan riwayat akademik menggunakan metode K-Nearest Neighbor I Riadi, R Umar, R Anggara Jurnal Teknologi Informasi dan Ilmu Komputer 11 (2), 249-256, 2024 |
2024 |
Perancangan Alat Monitoring Karbon Monoksida (CO) dan Partikel Debu PM 2.5 dalam Ruangan Berbasis ESP32 Devkit C V4 dan LCD OLED MDD Putra, A Pujiyanta, I Riadi JTEV (Jurnal Teknik Elektro dan Vokasional) 10 (2), 77-84, 2024 |
2024 |
The evolution of image processing-powered hot-stage microscopy in pharmaceutical characterization T Sutikno, A Yudhana, S Sunardi, A Fadlil, I Riadi Journal on Intelligent Systems Engineering and Applied Data Science 1 (1), 1-7, 2024 |
2024 |
A review of Naive Bayes and decision tree methods for predicting particle size distribution in pharmaceutical manufacturing T Sutikno, A Fadlil, S Sunardi, I Riadi, A Yudhana Journal on Intelligent Systems Engineering and Applied Data Science 1 (1), 8-14, 2024 |
2024 |
A Classification Data Packets Using the Threshold Method for Detection of DDoS S Aji, DRR Putra, I Riadi, A Fadlil, MN Faiz, AW Muhammad, ... Journal of Innovation Information Technology and Application (JINITA) 6 (1 …, 2024 |
2024 |
Quick Random MAC Address Detection Based on Organizationally Unique Identifier in Captive Portal I Riadi, A Fadlil, B Adhi Prabowo International Journal of Computing and Digital Systems 16 (1), 1-11, 2024 |
2024 |
Non-linear Kernel Optimisation of Support Vector Machine Algorithm for Online Marketplace Sentiment Analysis A Fadlil, I Riadi, F Andrianto JUITA: Jurnal Informatika 12 (1), 29-38, 2024 |
2024 |
Prediction of presidential election results using sentiment analysis with pre and post candidate registration data AA Firdaus, A Yudhana, I Riadi Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika 10 (1), 36-46, 2024 |
2024 |
Comparative Analysis of Naive Bayes and K-NN Approaches to Predict Timely Graduation using Academic History I Riadi, R Umar, R Anggara International Journal of Computing and Digital Systems 16 (1), 1163-1174, 2024 |
2024 |
Mitigation from SQL Injection Attacks on Web Server using Open Web Application Security Project Framework A Fadlil, I Riadi, MA Mu’Min International Journal of Engineering 37 (4), 635-645, 2024 |
2024 |
Security Analysis of Learning Management System Using Penetration Testing with ISSAF Framework: LMS Security Analysis Using the Pentest Method with the ISSAF Framework R Umar, I Riadi, SA Wicaksono PIKSEL: Penelitian Ilmu Komputer Sistem Embedded and Logic 12 (1), 59-68, 2024 |
2024 |
BGP dynamic routing protocol: a QoS Analysis for TCP and UDP N Miswar, I Riadi Kinetik: Game Technology, Information System, Computer Network, Computing …, 2024 |
2024 |
Analysis Impact of Rapid Application Development Method on Development Cycle and User Satisfaction: A Case Study on Web-Based Registration Service I Riadi, A Yudhana, A Elvina Scientific Journal of Informatics 11 (1), 81-94, 2024 |
2024 |
Indonesian presidential election sentiment: Dataset of response public before 2024 AA Firdaus, A Yudhana, I Riadi Data in Brief 52, 109993, 2024 |
2024 |
Linear Kernel Optimization of Support Vector Machine Algorithm on Online Marketplace Sentiment Analysis F Andrianto, A Fadlil, I Riadi Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika 21 (1), 68-82, 2024 |
2024 |
Prediksi Kelulusan Tepat Waktu Berdasarkan Riwayat Akademik Menggunakan Metode Naïve Bayes I Riadi, R Umar, R Anggara Decode: Jurnal Pendidikan Teknologi Informasi 4 (1), 191-203, 2024 |
2024 |
Peningkatan kompetensi kewirausahaan siswa SMK Kesehatan Bantul melalui pelatihan pembuatan permen jelly dan digital marketing S Mulyaningsih, I Wahyuningsih, I Riadi Abdimas Dewantara 7 (1), 42-50, 2024 |
2024 |
PENDAMPINGAN MASYARAKAT UNTUK MENINGKATKAN KESADARAN DAN PENGETAHUAN SIBER PEKERJA MIGRAN INDONESIA DI HONG KONG I Riadi, I Sumarlan, I Maryani PROSIDING SEMINAR NASIONAL PENELITIAN DAN PENGABDIAN KEPADA MASYARAKAT (SNPP …, 2024 |
2024 |
Improving Sentiment Analysis in Digital Marketplaces through SVM Kernel Fine-Tuning A Fadlil, I Riadi, F Andrianto International Journal of Computing and Digital Systems 16 (1), 159-171, 2024 |
2024 |
Supervision-Based Digital Forensics Framework to Respect Ethics using Participatory Action Research Method P Purwanto, I Riadi Journal of International Crisis and Risk Communication Research 7 (3), 124, 2024 |
2024 |
Klasifikasi Citra Spesies Bunga di Indonesia Berbasis Convolutional Neural Network Menggunakan Teknik Transfer Learning A Rahman, M Salim, I Riadi Jurnal Software Engineering and Computational Intelligence 2 (02), 92-100, 2024 |
2024 |
Herman,“Klasterisasi Perguruan Tinggi LLDIKTI V Berdasarkan Indikator Kinerja Utama dan PDDIKTI Menggunakan K-Means Clustering,” VS Fatmawaty, I Riadi Jurnal Media Informatika Budidarma 8 (2), 878-888, 2024 |
2024 |
Prediction of Indonesian presidential election results using sentiment analysis with Naïve Bayes method AA Firdaus, A Yudhana, I Riadi, M Mahsun Jurnal Media Informatika Budidarma 8 (1), 41-50, 2024 |
2024 |
Optimization of Population Document Services in Villages using Naive Bayes and k-NN Method I Riadi, A Yudhana, MR Djou International Journal of Computing and Digital Systems 15 (1), 127-138, 2024 |
2023 |
Penetration Testing with OWASP Mobile for Android Security Optimization D Aprilliansyah, I Riadi Journal of Cyber Health and Computer 1 (1), 10-14, 2023 |
2023 |
Implementation of association rule using apriori algorithm and frequent pattern growth for inventory control I Riadi, H Herman, F Fitriah, S Suprihatin, A Muis, M Yunus Jurnal Infotel 15 (4), 369-378, 2023 |
2023 |
Forensic Tools Comparison on File Carving using Digital Forensics Research Workshop Framework I Riadi, A Yudhana Scientific Journal of Informatics 10 (4), 571-582, 2023 |
2023 |
Optimizing Inventory with Frequent Pattern Growth Algorithm for Small and Medium Enterprises I Riadi, H Herman, F Fitriah, S Suprihatin MATRIK: Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 23 (1 …, 2023 |
2023 |
PENINGKATAN PENGETAHUAN SISWA SMK KESEHATAN BANTUL TENTANG PEMBUATAN PERMEN JELLY DARI TANAMAN HERBAL IIS WAHYUNINGSIH, SRI MULYANINGSIH, I RIADI TECHNOPEX 2023, 2023 |
2023 |
Comparing the Performance of Ospf and Ospf-Mpls Routing Protocol in Forwarding Tcp and Udp Packet N Miswar, H Herman, I Riadi Jurnal Teknik Informatika (Jutif) 4 (5), 1237-1247, 2023 |
2023 |
Perancangan Klasifikasi Pasien Stroke Dengan Metode K-Nearest Neighbor RAD Yulianto, I Riadi, R Umar Rabit: Jurnal Teknologi Dan Sistem Informasi Univrab 8 (2), 262-268, 2023 |
2023 |
Performance Analysis of Real Time Streaming Protocol (Rtsp) and Real Time Transport Protocol (Rtp) Using Vlc Application on Live Video Streaming K Kariyamin, I Riadi, H Herman Jurnal Teknik Informatika (Jutif) 4 (4), 769-778, 2023 |
2023 |
Utilizing K-means Clustering for the Detection of Cyberbullying Within Instagram Comments A Muhariya, I Riadi, Y Prayudi, IA Saputro Ingenierie des Systemes d'Information 28 (4), 939, 2023 |
2023 |
Analisis Forensik Digital Pada Whatsapp Dan Facebook Menggunakan Metode NIST I Riadi, T Ruslan Jurnal Teknologi Informasi dan Ilmu Komputer 13 (2), 286-292, 2023 |
2023 |
Mobile Forensic for Body Shaming Investigation Using Association of Chief Police Officers Framework Y Safitri, I Riadi, S Sunardi MATRIK: Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 22 (3 …, 2023 |
2023 |
OWASP Framework-based Network Forensics to Analyze the SQLi Attacks on Web Servers I Riadi, A Fadlil, MA Mu'min MATRIK: Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 22 (3 …, 2023 |
2023 |
Mobile Forensics on social media Using Digital Forensics Research Workshop Methods H Herman, I Riadi, IA Rafiq Engineering and Applied Technology 1 (2), 136-142, 2023 |
2023 |
Analisis Forensik Cyberbullying pada Aplikasi IMO Messenger Menggunakan Metode Association of Chief Police Officers I Riadi, S Sunardi, Y Safitri Jurnal Bumigora Information Technology (BITe) 5 (1), 1-8, 2023 |
2023 |
Vulnerability detection with K-nearest neighbor and naive Bayes method using machine learning H Herman, I Riadi, Y Kurniawan International Journal of Artificial Intelligence Research 7 (1), 10-18, 2023 |
2023 |
Analisis Sentimen Pada Proyeksi Pemilihan Presiden 2024 Menggunakan Metode Support Vector Machine AA Firdaus, A Yudhana, I Riadi Decode: Jurnal Pendidikan Teknologi Informasi 3 (2), 236-245, 2023 |
2023 |
Public opinion analysis of presidential candidate using Naïve Bayes method AA Firdaus, A Yudhana, I Riadi Kinetik: Game Technology, Information System, Computer Network, Computing …, 2023 |
2023 |
Integration of fuzzy C-Means and SAW methods on education fee assistance recipients A Fadlil, I Riadi, Y Mulyana Kinetik: Game Technology, Information System, Computer Network, Computing …, 2023 |
2023 |
Analisis Keamanan Sistem Informasi Akademik Berbasis Web Menggunakan Framework ISSAF R Umar, I Riadi, MIA Elfatiha Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi 12 (1), 2023 |
2023 |
Comparison of Forensic Tools on Social Media Services Using the Digital Forensic Research Workshop Method (DFRWS) GZ Muflih, S Sunardi, I Riadi, A Yudhana, HI Azmi JIKO (Jurnal Informatika dan Komputer) 6 (1), 2023 |
2023 |
Determining eligible villages for mobile services using k-NN algorithm A Yudhana, I Riadi, MR Djou ILKOM Jurnal Ilmiah 15 (1), 11-20, 2023 |
2023 |
Comparison of Machine Learning Performance Using Naive Bayes and Random Forest Methods to Classify Batik Fabric Patterns A Fadlil, I Riadi, IJDEP Putra Revue d'Intelligence Artificielle 37 (2), 379, 2023 |
2023 |
Analisis Sentimen HateSpeech pada Pengguna Layanan Twitter dengan Metode Naïve Bayes Classifier (NBC) M Murni, I Riadi, A Fadlil JURIKOM (Jurnal Ris. Komputer) 10 (2), 566, 2023 |
2023 |
Improved Breadth First Search For Public Transit Line Search Optimization S Kartoirono, I Riadi, F Furizal, A Azhari |
2023 |
Analisis Keamanan Website Menggunakan Information System Security Asessment Framework (ISSAF) H Herman, I Riadi, Y Kurniawan, IA Rafiq Jurnal Teknologi Informatika dan Komputer 9 (1), 126-136, 2023 |
2023 |
Comparative analysis of forensic software on android-based michat using acpo and dfrws framework I Riadi, A Yudhana, GPI Fanani Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7 (2), 286-292, 2023 |
2023 |
Forensic analysis of faces on low-quality images using detection and recognition methods VN Kristanto, I Riadi, Y Prayudi Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7 (2), 218-225, 2023 |
2023 |
TAARA Method for Processing on the Network Forensics in the Event of an ARP Spoofing Attack A Wijayanto, I Riadi, Y Prayudi Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7 (2), 208-217, 2023 |
2023 |
Analisis Data Mining Sistem Inventory Menggunakan Algoritma Apriori: Analysis Data Mining of Inventory System Using Apriori Algorithm I Riadi Decode: Jurnal Pendidikan Teknologi Informasi 3 (1), 118-129, 2023 |
2023 |
Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing F Fachri Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK) 10 (1), 51-58, 2023 |
2023 |
Mobile Forensic Tools for Digital Crime Investigation: Comparison and Evaluation. I Riadi, A Yudhana, GPI Fanani International Journal of Safety & Security Engineering 13 (1), 2023 |
2023 |
Analysis of Anubis Trojan Attack on Android Banking Application Using Mobile Security Labware. I Riadi, D Aprilliansyah International Journal of Safety & Security Engineering 13 (1), 2023 |
2023 |
Perancangan Sistem Informasi Pendaftaran Peserta Didik Baru (Ppdb) Berbasis Web Menggunakan Metode Rapid Apllication Development (Rad) A Yudahana, I Riadi, A Elvina Rabit: Jurnal Teknologi dan Sistem Informasi Univrab 8 (1), 47-58, 2023 |
2023 |
Comparative Analysis of Naïve Bayes and K-NN in Determining Location of Mobile Population Services I Riadi, A Yudhana, MR Djou Jurnal CoSciTech (Computer Science and Information Technology) 4 (3), 733-742, 2023 |
2023 |
Framework for Digital Forensic Ethical Violations: A Systematic Literature Review P Purwanto, I Riadi E3S Web of Conferences 448, 01003, 2023 |
2023 |
Identifying Hate Speech in Tweets with Sentiment Analysis on Indonesian Twitter Utilizing Support Vector Machine Algorithm I Riadi, A Fadlil, M Murni Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika 9 (2), 179-191, 2023 |
2023 |
Forensik Video Pada CCTV Menggunakan Framework Generic Computer Forensics Investigation Model (GCFIM) I Riadi, A Yudhana, RVA Saputra JURIKOM (Jurnal Ris. Komputer) 10 (2), 540, 2023 |
2023 |
Batik pattern classification using naïve bayes method based on texture feature extraction I Riadi, A Fadlil, IJDEP Putra Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika 9 (1), 2023 |
2023 |
Analisa Deteksi dan Pengenalan Wajah pada Citra dengan Permasalahan Visual VN Kristanto, I Riadi, Y Prayudi JISKA (Jurnal Informatika Sunan Kalijaga) 8 (1), 78-89, 2023 |
2022 |
Digital Forensic on Secure Digital High Capacity using DFRWS Method A Yudhana, I Riadi, B Putra Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 6 (6), 1021-1027, 2022 |
2022 |
Forensic Mobile Analysis on Social Media Using National Institute Standard of Technology Method. I Riadi, IA Rafiq International Journal of Safety & Security Engineering 12 (6), 2022 |
2022 |
Mobile Forensic Analysis of Signal Messenger Application on Android using Digital Forensic Research Workshop (DFRWS) Framework I Riadi, NH Siregar Ingenierie des Systemes d'Information 27 (6), 903, 2022 |
2022 |
Mobile forensic investigation of fake news cases on instagram applications with digital forensics research workshop framework I Riadi, H Herman, IA Rafiq International Journal of Artificial Intelligence Research 6 (2), 2022 |
2022 |
Cyberbullying Analysis on Instagram Using K-Means Clustering A Muhariya, I Riadi, Y Prayudi JUITA: Jurnal Informatika 10 (2), 261-271, 2022 |
2022 |
MASK DETECTION ANALYSIS USING HAAR CASCADE AND NAÏVE BAYES I Riadi, A Fadlil, IJDEP Putra Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 7 (2), 105-114, 2022 |
2022 |
Analisis Kinerja Perangkat Lunak Forensic Imaging Pada Sistem Operasi Linux Menggunakan Metode Static Forensic A Yudhana, I Riadi Insect (Informatics and Security): Jurnal Teknik Informatika 8 (1), 38-47, 2022 |
2022 |
Training on how to use Social Media Wisely and Ethically H Herman, I Riadi, FI Abdurrachman, S Lonang ABDIMAS: Jurnal Pengabdian Masyarakat 5 (2), 2653-2662, 2022 |
2022 |
Introduction of the Internet of Things as a Debriefing for Students with Cross Interests in Information Technology and Computers I Riadi, D Prayogi, RP Yudha ABDIMAS: Jurnal Pengabdian Masyarakat 5 (2), 2594-2602, 2022 |
2022 |
Network Forensics Against Volumetric-Based Distributed Denial of Service Attacks on Cloud and the Edge Computing. A Yudhana, I Riadi, S Suharti International Journal of Safety & Security Engineering 12 (5), 2022 |
2022 |
Penerapan Algoritma K-Means pada Pengelompokan Data Pendaftar Bantuan Biaya Pendidikan A Fadlil, I Riadi, Y Mulyana Jurnal Teknologi Informatika dan Komputer 8 (2), 352-366, 2022 |
2022 |
Mobile Device Security Evaluation Using Reverse Tcp Method I Riadi, D Aprilliansyah Kinetik: Game Technology, Information System, Computer Network, Computing …, 2022 |
2022 |
Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada Forensik WhatsApp RY Prasongko, A Yudhana, I Riadi J-SAKTI (Jurnal Sains Komputer dan Informatika) 6 (2), 1112-1120, 2022 |
2022 |
Analisis Validasi File Upload Menggunakan Metadata PNG Pada Aplikasi Berbasis Web F Anwar, A Fadlil, I Riadi JIKO (Jurnal Informatika Dan Komputer) 6 (2), 185-193, 2022 |
2022 |
Measuring The Success of E-Learning In Universities Using The Technology Acceptance Model A Yudhana, I Riadi, T Abe INTENSIF: Jurnal Ilmiah Penelitian Dan Penerapan Teknologi Sistem Informasi …, 2022 |
2022 |
Peran Strategis Scrum Master Pada Pengembangan Perangkat Lunak Perpustakaan Sekolah Berbasis Android A Wahyudi, S Sunardi, I Riadi JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 7 (3), 711-717, 2022 |
2022 |
Security on Charity Crowdfunding Services using KAMI Index 4.1 I Riadi, AA Siregar, AG Pratiwi Engineering Science Letter 1 (01), 15-19, 2022 |