关注
Hudan Studiawan
Hudan Studiawan
Department of Informatics, Institut Teknologi Sepuluh Nopember
在 if.its.ac.id 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey on forensic investigation of operating system logs
H Studiawan, F Sohel, C Payne
Digital Investigation 29, 1-20, 2019
572019
Anomaly Detection in Operating System Logs with Deep Learning-based Sentiment Analysis
H Studiawan, F Sohel, C Payne
IEEE Transactions on Dependable and Secure Computing 18 (5), 2136 - 2148, 2020
442020
Layanan Informasi Kereta Api Menggunakan GPS, Google Maps, dan Android
A Elian, A Mazharuddin, H Studiawan
Jurnal Teknik Pomits Surabaya 1 (1), 1-6, 2012
422012
Graph clustering and anomaly detection of access control log for forensic purposes
H Studiawan, C Payne, F Sohel
Digital Investigation 21, 76-87, 2017
392017
Implementasi klien sip berbasis web menggunakan Html5 dan Node. Js
M Iqbal, M Husni, H Studiawan
Jurnal Teknik ITS 1 (1), A242-A245, 2012
382012
Aggressive web application honeypot for exposing attacker's identity
S Djanali, FX Arunanto, BA Pratomo, A Baihaqi, H Studiawan, ...
2014 the 1st international conference on information technology, computer …, 2014
372014
Sentiment Analysis in a Forensic Timeline with Deep Learning
H Studiawan, F Sohel, C Payne
IEEE Access 8, 60664 - 60675, 2020
362020
Liquid volume monitoring based on ultrasonic sensor and Arduino microcontroller
M Husni, DO Siahaan, HT Ciptaningtyas, H Studiawan, YP Aliarham
IOP Conference Series: Materials Science and Engineering 128 (1), 012026, 2016
272016
SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker
S Djanali, FX Arunanto, BA Pratomo, H Studiawan, SG Nugraha
2014 International Symposium on Technology Management and Emerging …, 2014
232014
Automatic log parser to support forensic analysis
H Studiawan, F Sohel, C Payne
16th Australian Digital Forensics Conference, 1-10, 2018
222018
Automatic event log abstraction to support forensic investigation
H Studiawan, F Sohel, C Payne
Proceedings of the Australasian computer science week multiconference, 1-9, 2020
192020
Shared secret-based steganography for protecting medical data
T Ahmad, H Studiawan, HS Ahmad, RM Ijtihadie, W Wibisono
2014 International Conference on Computer, Control, Informatics and Its …, 2014
192014
Unmanned aerial vehicle (UAV) forensics: the good, the bad, and the unaddressed
H Studiawan, G Grispos, KKR Choo
Computers & Security 132, 103340, 2023
172023
Distribution route optimization of gallon water using genetic algorithm and tabu search
A Utamima, KR Pradina, NS Dini, H Studiawan
Procedia Computer Science 72, 503-510, 2015
172015
Anomaly detection in a forensic timeline with deep autoencoders
H Studiawan, F Sohel
Journal of Information Security and Applications 63, 103002, 2021
162021
Named entity recognition for drone forensic using BERT and distilbert
S Silalahi, T Ahmad, H Studiawan
2022 International Conference on Data Science and Its Applications (ICoDSA …, 2022
142022
Performance evaluation of anomaly detection in imbalanced system log data
H Studiawan, F Sohel
2020 Fourth World Conference on Smart Trends in Systems, Security and …, 2020
142020
Sistem Pendeteksi Dini Banjir Menggunakan Sensor Kecepatan Air dan Sensor Ketinggian Air pada Mikrokontroler Arduino
GP Nugroho, AM Shiddiqi, H Studiawan
Jurnal Teknik Pomits 2 (1), 1-5, 2013
142013
1. Computer-aided diagnosis for osteoporosis based on trabecular bone analysis using panoramic radiographs
E Machmud
Dental Journal 43 (3), 2010
122010
Transformer-based named entity recognition on drone flight logs to support forensic investigation
S Silalahi, T Ahmad, H Studiawan
IEEE Access 11, 3257-3274, 2023
112023
系统目前无法执行此操作,请稍后再试。
文章 1–20