Search

Your search keyword '"Imam Riadi"' showing total 84 results

Search Constraints

Start Over You searched for: Author "Imam Riadi" Remove constraint Author: "Imam Riadi" Topic business.industry Remove constraint Topic: business.industry
84 results on '"Imam Riadi"'

Search Results

3. Optimasi Keamanan Web Server terhadap Serangan Broken Authentication Menggunakan Teknologi Blockchain

4. Distributed Denial of Service (DDoS) Analysis on Virtual Network and Real Network Traffic

5. Mitigating Sodinokibi Ransomware Attack on Cloud Network Using Software-Defined Networking (SDN)

6. Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method

7. Deteksi Bukti Digital Game Online pada Platform Skyegrid Menggunakan Framework FRED

9. Integration of Zachman Framework and TOGAF ADM on Academic Information Systems Modeling

10. Acquisition of Digital evidence Android-Based Viber Messenger App

12. Steganografi Video Digital dengan Algoritma LSB (Least Significant Bit) dan Rijndael

14. Cyber Security Analysis of Academic Services based on Domain Delivery Services and Support using Indonesian E-Government Ratings (PEGI)

15. Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method

16. Komparatif Analisis Keamanan Aplikasi Instant Messaging Berbasis Web

17. Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm

18. Steganalysis Bukti Digital pada Media Storage Menggunakan Metode GCFIM

19. Investigasi Cyberbullying pada WhatsApp Menggunakan Digital Forensics Research Workshop

20. Detection of Metasploit Attacks Using RAM Forensic on Proprietary Operating Systems

21. Steganalysis Using Yedrodj-net net's Convolutional Neural Networks (CNN) Method on Steganography Tools

22. Comparative Analysis of Image Quality Values on Edge Detection Methods

24. Live Forensics Analysis of Line App on Proprietary Operating System

25. ANALISIS PERBANDINGAN DETECTION TRAFFIC ANOMALY DENGAN METODE NAIVE BAYES DAN SUPPORT VECTOR MACHINE (SVM)

31. Measurement of Copy-Move Forensic Image Similarity Using Distance Function

32. DDoS Detection Using Artificial Neural Network Regarding Variation of Training Function

33. Network Forensics Against Ryuk Ransomware Using Trigger, Acquire, Analysis, Report, and Action (TAARA) Method

34. Implementasi Metode Jaccard pada Analisis Investigasi Cyberbullying WhatsApp Messenger Menggunakan Kerangka Kerja National Institute of Standards and Technology

35. Live forensics method for acquisition on the Solid State Drive (SSD) NVMe TRIM function

36. Comparison of SVM, RF and SGD Methods for Determination of Programmer's Performance Classification Model in Social Media Activities

37. Validation Analysis of Scalable Vector Graphics (SVG) File Upload using Magic Number and Document Object Model (DOM)

38. DETEKSI BUKTI DIGITAL ONLINE GAMBLING MENGGUNAKAN LIVE FORENSIK PADA SMARTPHONE BERBASIS ANDROID

41. Analysis of Forensic Video in Storage Data Using Tampering Method

42. Digital Forensics Workflow as A Mapping Model for People, Evidence, and Process in Digital Investigation

43. Review Article : Investigasi Forensik Email dengan Berbagai Pendekatan dan Tools

44. Image Forensic for detecting Splicing Image with Distance Function

45. Wi-Fi Security Level Analysis for Minimizing Cybercrime

46. Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser

48. Forensic Analysis of Docker Swarm Cluster using Grr Rapid Response Framework

49. Vulnerability Analysis of E-voting Application using Open Web Application Security Project (OWASP) Framework

50. Experimental Investigation of Frozen Solid State Drive on Digital Evidence with Static Forensic Methods

Catalog

Books, media, physical & digital resources