Follow
Hudan Studiawan
Hudan Studiawan
Department of Informatics, Institut Teknologi Sepuluh Nopember
Verified email at if.its.ac.id - Homepage
Title
Cited by
Cited by
Year
A survey on forensic investigation of operating system logs
H Studiawan, F Sohel, C Payne
Digital Investigation 29, 1-20, 2019
512019
Layanan Informasi Kereta Api Menggunakan GPS, Google Maps, dan Android
A Elian, A Mazharuddin, H Studiawan
Jurnal Teknik Pomits Surabaya 1 (1), 1-6, 2012
462012
Anomaly Detection in Operating System Logs with Deep Learning-based Sentiment Analysis
H Studiawan, F Sohel, C Payne
IEEE Transactions on Dependable and Secure Computing 18 (5), 2136 - 2148, 2020
372020
Graph clustering and anomaly detection of access control log for forensic purposes
H Studiawan, C Payne, F Sohel
Digital Investigation 21, 76-87, 2017
372017
Aggressive web application honeypot for exposing attacker's identity
S Djanali, FX Arunanto, BA Pratomo, A Baihaqi, H Studiawan, ...
2014 The 1st international conference on information technology, computer …, 2014
372014
Sentiment Analysis in a Forensic Timeline with Deep Learning
H Studiawan, F Sohel, C Payne
IEEE Access 8, 60664 - 60675, 2020
332020
Implementasi klien sip berbasis web menggunakan Html5 dan Node. Js
M Iqbal, M Husni, H Studiawan
Jurnal Teknik ITS 1 (1), A242-A245, 2012
332012
Liquid volume monitoring based on ultrasonic sensor and Arduino microcontroller
M Husni, DO Siahaan, HT Ciptaningtyas, H Studiawan, YP Aliarham
IOP Conference Series: Materials Science and Engineering 128 (1), 012026, 2016
232016
SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker
S Djanali, FX Arunanto, BA Pratomo, H Studiawan, SG Nugraha
2014 International Symposium on Technology Management and Emerging …, 2014
232014
Automatic log parser to support forensic analysis
H Studiawan, F Sohel, C Payne
16th Australian Digital Forensics Conference, 1-10, 2018
222018
Automatic event log abstraction to support forensic investigation
H Studiawan, F Sohel, C Payne
Proceedings of the Australasian computer science week multiconference, 1-9, 2020
192020
Shared secret-based steganography for protecting medical data
T Ahmad, H Studiawan, HS Ahmad, RM Ijtihadie, W Wibisono
2014 International Conference on Computer, Control, Informatics and Its …, 2014
192014
Distribution route optimization of gallon water using genetic algorithm and tabu search
A Utamima, KR Pradina, NS Dini, H Studiawan
Procedia Computer Science 72, 503-510, 2015
172015
Sistem Pendeteksi Dini Banjir Menggunakan Sensor Kecepatan Air dan Sensor Ketinggian Air pada Mikrokontroler Arduino
GP Nugroho, AM Shiddiqi, H Studiawan
Jurnal Teknik Pomits 2 (1), 1-5, 2013
132013
Anomaly detection in a forensic timeline with deep autoencoders
H Studiawan, F Sohel
Journal of Information Security and Applications 63, 103002, 2021
122021
Performance evaluation of anomaly detection in imbalanced system log data
H Studiawan, F Sohel
2020 Fourth World Conference on Smart Trends in Systems, Security and …, 2020
122020
Rancang Bangun Sistem Keamanan dan Pengenalan Objek dalam Ruangan Sebagai Pengganti CCTV dengan Menggunakan Raspberry Pi
RS Prihantono, AM Shiddiqi, H Studiawan
Jurnal Teknik POMITS 2 (1), 2013
122013
1. Computer-aided diagnosis for osteoporosis based on trabecular bone analysis using panoramic radiographs
E Machmud
Dental journal 43 (3), 2010
122010
Named entity recognition for drone forensic using BERT and distilbert
S Silalahi, T Ahmad, H Studiawan
2022 International Conference on Data Science and Its Applications (ICoDSA …, 2022
112022
Pengembangan metode block matching untuk deteksi copy-move pada pemalsuan citra
AY Wijaya, S Al Musayyab, H Studiawan
JUTI J. Ilm. Teknol. Inf 15 (1), 84-94, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20