Follow
Hudan Studiawan
Hudan Studiawan
Department of Informatics, Institut Teknologi Sepuluh Nopember
Verified email at if.its.ac.id - Homepage
Title
Cited by
Cited by
Year
A survey on forensic investigation of operating system logs
H Studiawan, F Sohel, C Payne
Digital Investigation 29, 1-20, 2019
522019
Layanan Informasi Kereta Api Menggunakan GPS, Google Maps, dan Android
A Elian, A Mazharuddin, H Studiawan
Fakultas Teknologi Informasi Institut Teknologi Sepuluh November, Surabaya, 2012
442012
Graph clustering and anomaly detection of access control log for forensic purposes
H Studiawan, C Payne, F Sohel
Digital Investigation 21, 76-87, 2017
382017
Implementasi klien sip berbasis web menggunakan Html5 dan Node. Js
M Iqbal, M Husni, H Studiawan
Jurnal Teknik ITS 1 (1), A242-A245, 2012
382012
Anomaly Detection in Operating System Logs with Deep Learning-based Sentiment Analysis
H Studiawan, F Sohel, C Payne
IEEE Transactions on Dependable and Secure Computing 18 (5), 2136 - 2148, 2020
372020
Aggressive web application honeypot for exposing attacker's identity
S Djanali, FX Arunanto, BA Pratomo, A Baihaqi, H Studiawan, ...
2014 the 1st international conference on information technology, computer …, 2014
372014
Sentiment Analysis in a Forensic Timeline with Deep Learning
H Studiawan, F Sohel, C Payne
IEEE Access 8, 60664 - 60675, 2020
342020
Liquid volume monitoring based on ultrasonic sensor and Arduino microcontroller
M Husni, DO Siahaan, HT Ciptaningtyas, H Studiawan, YP Aliarham
IOP Conference Series: Materials Science and Engineering 128 (1), 012026, 2016
242016
SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker
S Djanali, FX Arunanto, BA Pratomo, H Studiawan, SG Nugraha
2014 International Symposium on Technology Management and Emerging …, 2014
232014
Automatic log parser to support forensic analysis
H Studiawan, F Sohel, C Payne
16th Australian Digital Forensics Conference, 1-10, 2018
222018
Shared secret-based steganography for protecting medical data
T Ahmad, H Studiawan, HS Ahmad, RM Ijtihadie, W Wibisono
2014 International Conference on Computer, Control, Informatics and Its …, 2014
202014
Automatic event log abstraction to support forensic investigation
H Studiawan, F Sohel, C Payne
Proceedings of the Australasian computer science week multiconference, 1-9, 2020
192020
Distribution route optimization of gallon water using genetic algorithm and tabu search
A Utamima, KR Pradina, NS Dini, H Studiawan
Procedia Computer Science 72, 503-510, 2015
172015
Sistem Pendeteksi Dini Banjir Menggunakan Sensor Kecepatan Air dan Sensor Ketinggian Air pada Mikrokontroler Arduino
GP Nugroho, A Mazharuddin, H Studiawan
Jurnal Teknik Pomits 2 (1), 1-5, 2013
152013
Anomaly detection in a forensic timeline with deep autoencoders
H Studiawan, F Sohel
Journal of Information Security and Applications 63, 103002, 2021
142021
Named entity recognition for drone forensic using bert and distilbert
S Silalahi, T Ahmad, H Studiawan
2022 International Conference on Data Science and Its Applications (ICoDSA …, 2022
122022
Performance evaluation of anomaly detection in imbalanced system log data
H Studiawan, F Sohel
2020 Fourth World Conference on Smart Trends in Systems, Security and …, 2020
122020
Rancang Bangun Sistem Keamanan dan Pengenalan Objek dalam Ruangan Sebagai Pengganti CCTV dengan Menggunakan Raspberry Pi
RS Prihantono, AM Shiddiqi, H Studiawan
Jurnal Teknik POMITS 2 (1), 2013
122013
Computer aided diagnosis for osteoporosis based on trabecular bone analysis using panoramic radiographs
AZ Arifin, A Yuniarti, LR Dewi, A Asano, A Taguchi, T Nakamoto, A Razak, ...
Dental Journal (Majalah Kedokteran Gigi) 43 (3), 107-112, 2010
122010
Adaptive image compression using adaptive Huffman and LZW
DF Djusdek, H Studiawan, T Ahmad
2016 International Conference on Information & Communication Technology and …, 2016
112016
The system can't perform the operation now. Try again later.
Articles 1–20