Skip to content
Toggle navigation
Tentang IOS
Join Us
Hubungi Kami
Organisasi Mitra
Akun Anda
Keluar
Masuk
Bahasa Indonesia
Bahasa Indonesia
English
Semua Kolom
Judul
Pengarang
Subject
Call Number
ISBN/ISSN
Tag
Cari
Lanjutan
Pengarang
Riadi, Imam
Koleksi Nasional
Menampilkan
1
-
20
of
245
untuk pencarian:
'Riadi, Imam'
, lama mencari: 0.18s
Daftar
Grid
Visual
Sortir
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Hasil cek similarity "Vulnerability Analysis of E-voting Application using Open Web Application Security Project (OWASP) Framework"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Validation Policy Statement on the Digital Evidence Storage using First Applicable Algorithm"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Live Forensics Of Tools On Android Devices For Email Forensics"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
Universitas Ahmad Dahlan, 2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Forensic Analysis Of Docker Swarm Cluster Using Grr Rapid Response Framework"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Mobile Forensic Tools Validation and Evaluation for Instant Messaging"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2020
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Validation Analysis of Scalable Vector Graphics (SVG) File Upload using Magic Number and Document Object Model (DOM)"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2020
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Analysis of Steganographic on Digital Evidence using General Computer Forensic Investigation Model Framework"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2020
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Analysis of Security Virtual Private Network (VPN) Using OpenVPN"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
The Society of Digital Information and Wireless Communications (SDIWC), 2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Network Forensics Analysis of Man in the Middle Attack Using Live Forensics Method"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
The Society of Digital Information and Wireless Communications (SDIWC), 2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Forensics Analysis of Router On Computer Networks Using Live Forensics Method"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
The Society of Digital Information and Wireless Communications (SDIWC), 2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Forensic Analysis of Android-based WhatsApp Messenger Against Fraud Crime Using The National Institute of Standard and Technology Framework"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
The Society of Digital Information and Wireless Communications (SDIWC), 2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Framework Analysis of IDFIF V2 in WhatsApp Investigation Process on Android Smartphones"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
The Society of Digital Information and Wireless Communications (SDIWC), 2020
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Forensic Analysis WhatsApp Mobile Application On Android-Based Smartphones Using National Institute of Standard and Technology (NIST) Framework"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
The Society of Digital Information and Wireless Communications (SDIWC), 2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Forensic WhatsApp based Android using National Institute of Standard Technology (NIST) Method"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Analysis Mobile Forensics on Twitter Application using the National Institute of Justice (NIJ) Method"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Forensic Browser of Twitter based on Web Services"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2020
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Risk Management Assessment on Human Resource Information Technology Services using COBIT 5"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2020
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Colorectal Polyp Detection Using Feedforward Neural Network with Image Feature Selection"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2018
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Analysis of academic service cybersecurity in university based on framework COBIT 5 using CMMI"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2020
Available online:
Get online
Get online
Favorit
Tersimpan di:
Hasil cek similarity "Analisis Forensik Database Menggunakan Metode Forensik Statis"
Article
NonPeerReviewed
Book
oleh
Riadi
,
Imam
Terbitan:
2019
Available online:
Get online
Get online
Favorit
Tersimpan di:
1
2
3
4
5
6
7
8
9
10
11
Next »
[13]
Search Tools:
Get RSS Feed
—
Email this Search
—
Related Subjects
TK Electrical engineering. Electronics Nuclear engineering
QA75 Electronic computers. Computer science
T Technology (General)
Digital Evidence
NIST
WhatsApp
Forensics
Live Forensics
Security
Smartphone
android
cybercrime
AC Collections. Series. Collected works
Analysis
COBIT 5
DDoS
Digital Forensics
Forensik
Intrusion Detection System (IDS)
IoT
Metasploit
Pattern
Spoofing
TAARA
Teknik Elektro
Wireshark
authentication
digital evidence
kinerja
klasifikasi
mobile forensics
networkminer
programmer
-
ABAC
AES
AES Mode CBC
ActionScript
Address Resolution Protocol
Analisis
Android
Android Application
Aplikasi Web
Arp
Audio Forensics
Bandwidth
Barcode Password
Beetalk
Blockchain
CBC
×
Loading...