Follow
Didik Sudyana
Didik Sudyana
STMIK Amik Riau, PhD student, National Yang Ming Chiao Tung University
Verified email at sar.ac.id - Homepage
Title
Cited by
Cited by
Year
Analysis of Security Awareness in using Technology and Social Media at Muhammadiyah University of Riau
S Soni, A Hafid, D Sudyana
International Journal of Computer Applications 975, 8887, 2019
182019
A novel multi-stage approach for hierarchical intrusion detection
M Verkerken, L D’hooge, D Sudyana, YD Lin, T Wauters, B Volckaert, ...
IEEE Transactions on Network and Service Management, 2023
142023
Analysis and Evaluation Digital Forensic Investigation Framework using ISO 27037: 2012
D Sudyana, Y Prayudi, B Sugiantoro
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 8 (1 …, 2019
132019
Optimalisasi Penggunaan VirtualBox Sebagai Virtual Computer Laboratory untuk Simulasi Jaringan dan Praktikum pada SMK Taruna Mandiri Pekanbaru
MK ANam, D Sudyana, AN Ulfah, N Lizarti
J-PEMAS-Jurnal Pengabdian Masyarakat 1 (2), 39-44, 2020
122020
Belajar Mengenali Forensika Digital
D Sudyana
Diandra Creative 1, 125, 2016
122016
Instrumen Evaluasi Framework Investigasi Forensik Digital Menggunakan SNI 27037:2014
D Sudyana, B Sugiantoro, A Luthfi
JURNAL INFORMATIKA SUNAN KALIJAGA 1 (2), 75-83, 2016
112016
Pelatihan secure computer user untuk meningkatkan kesadaran siswa terhadap keamanan data dan informasi
AN Ulfah, N Lizarti, MK Anam, D Sudyana, H Asnal
J-PEMAS-Jurnal Pengabdian Masyarakat 2 (1), 17-24, 2021
102021
Server Virtualization Acquisition Using Live Forensics Method
S Soni, Y Prayudi, B Sugiantoro, D Sudyana, H Mukhtar
International Conference of CELSciTech 2019-Science and Technology track …, 2019
82019
Virtualisasi Server dengan Proxmox untuk Pengoptimalisasian Penggunaan Resource Server pada Upt Teknologi dan Komunikasi Pendidikan
D Sudyana, E Ali
Sains dan Teknologi Informasi 3 (2), 99-106, 2018
82018
Analisis Kesadaran Mahasiswa UMRI Terkait Penggunaan Teknologi & Media Sosial Terhadap Bahaya Cyber Crime
S Soni, A Hafid, D Sudyana
JURNAL FASILKOM 9 (3), 28-34, 2019
72019
Digital evidence acquisition system on iaas cloud computing model using live forensic method
D Sudyana, L Nora
Scientific Journal of Informatics 6 (1), 2019
72019
Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037 : 2014
D Sudyana, RT Putra, Soni
Sinkron - Journal Publications & Informatics Engineering Research 3 (2), 67-72, 2019
62019
Forensic Investigation Framework on Server Side of Private Cloud Computing
D Sudyana, N Lizarti, E Erlin
Lontar Komputer: Jurnal Ilmiah Teknologi Informasi 10 (3), 181-192, 2019
52019
Task assignment and capacity allocation for ml-based intrusion detection as a service in a multi-tier architecture
YC Lai, D Sudyana, YD Lin, M Verkerken, L D’hooge, T Wauters, ...
IEEE Transactions on Network and Service Management 20 (1), 672-683, 2022
42022
Etika dan profesionalisme saksi ahli
D Sudyana, HD Utami
Tersedia di http://www. academia. edu,[Accessed December 22, 2016], 2015
42015
Etika Dan Profesionalisme Saksi Ahli Forensik
D Sudyana, S Soni
J. CoSciTech (Computer Sci. Inf. Technol., vol. 1, no. 1, pp. 13–20, 2020
32020
Machine Learning Based Intrusion Detection as a Service: Task Assignment and Capacity Allocation in a Multi-Tier Architecture
YC Lai, D Sudyana, YD Lin, M Verkerken, L D'hooge, T Wauters, ...
Proceedings of the 14th IEEE/ACM International Conference on Utility and …, 2021
22021
Virtualization Technology for Optimizing Server Resource Usage
E Ali, D Sudyana
International Conference on Engineering and Technology Development (ICETD), 2014
22014
ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions
YD Lin, JH Pratama, D Sudyana, YC Lai, RH Hwang, PC Lin, HY Lin, ...
Journal of Information Security and Applications 71, 103348, 2022
12022
Artificial Intelligence for Internet of Things as a Service: Small or Big Data, Private or Public Model, Centralized or Federated Learning?
YD Lin, YC Lai, D Sudyana, RH Hwang
Computer 56 (12), 65-79, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20