A survey on forensic investigation of operating system logs H Studiawan, F Sohel, C Payne Digital Investigation 29, 1-20, 2019 | 57 | 2019 |
Anomaly Detection in Operating System Logs with Deep Learning-based Sentiment Analysis H Studiawan, F Sohel, C Payne IEEE Transactions on Dependable and Secure Computing 18 (5), 2136 - 2148, 2020 | 44 | 2020 |
Layanan Informasi Kereta Api Menggunakan GPS, Google Maps, dan Android A Elian, A Mazharuddin, H Studiawan Jurnal Teknik Pomits Surabaya 1 (1), 1-6, 2012 | 42 | 2012 |
Graph clustering and anomaly detection of access control log for forensic purposes H Studiawan, C Payne, F Sohel Digital Investigation 21, 76-87, 2017 | 39 | 2017 |
Implementasi klien sip berbasis web menggunakan Html5 dan Node. Js M Iqbal, M Husni, H Studiawan Jurnal Teknik ITS 1 (1), A242-A245, 2012 | 38 | 2012 |
Aggressive web application honeypot for exposing attacker's identity S Djanali, FX Arunanto, BA Pratomo, A Baihaqi, H Studiawan, ... 2014 the 1st international conference on information technology, computer …, 2014 | 37 | 2014 |
Sentiment Analysis in a Forensic Timeline with Deep Learning H Studiawan, F Sohel, C Payne IEEE Access 8, 60664 - 60675, 2020 | 36 | 2020 |
Liquid volume monitoring based on ultrasonic sensor and Arduino microcontroller M Husni, DO Siahaan, HT Ciptaningtyas, H Studiawan, YP Aliarham IOP Conference Series: Materials Science and Engineering 128 (1), 012026, 2016 | 27 | 2016 |
SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker S Djanali, FX Arunanto, BA Pratomo, H Studiawan, SG Nugraha 2014 International Symposium on Technology Management and Emerging …, 2014 | 23 | 2014 |
Automatic log parser to support forensic analysis H Studiawan, F Sohel, C Payne 16th Australian Digital Forensics Conference, 1-10, 2018 | 22 | 2018 |
Automatic event log abstraction to support forensic investigation H Studiawan, F Sohel, C Payne Proceedings of the Australasian computer science week multiconference, 1-9, 2020 | 19 | 2020 |
Shared secret-based steganography for protecting medical data T Ahmad, H Studiawan, HS Ahmad, RM Ijtihadie, W Wibisono 2014 International Conference on Computer, Control, Informatics and Its …, 2014 | 19 | 2014 |
Unmanned aerial vehicle (UAV) forensics: the good, the bad, and the unaddressed H Studiawan, G Grispos, KKR Choo Computers & Security 132, 103340, 2023 | 17 | 2023 |
Distribution route optimization of gallon water using genetic algorithm and tabu search A Utamima, KR Pradina, NS Dini, H Studiawan Procedia Computer Science 72, 503-510, 2015 | 17 | 2015 |
Anomaly detection in a forensic timeline with deep autoencoders H Studiawan, F Sohel Journal of Information Security and Applications 63, 103002, 2021 | 16 | 2021 |
Named entity recognition for drone forensic using BERT and distilbert S Silalahi, T Ahmad, H Studiawan 2022 International Conference on Data Science and Its Applications (ICoDSA …, 2022 | 14 | 2022 |
Performance evaluation of anomaly detection in imbalanced system log data H Studiawan, F Sohel 2020 Fourth World Conference on Smart Trends in Systems, Security and …, 2020 | 14 | 2020 |
Sistem Pendeteksi Dini Banjir Menggunakan Sensor Kecepatan Air dan Sensor Ketinggian Air pada Mikrokontroler Arduino GP Nugroho, AM Shiddiqi, H Studiawan Jurnal Teknik Pomits 2 (1), 1-5, 2013 | 14 | 2013 |
1. Computer-aided diagnosis for osteoporosis based on trabecular bone analysis using panoramic radiographs E Machmud Dental Journal 43 (3), 2010 | 12 | 2010 |
Transformer-based named entity recognition on drone flight logs to support forensic investigation S Silalahi, T Ahmad, H Studiawan IEEE Access 11, 3257-3274, 2023 | 11 | 2023 |