Publications
Journals
- Studiawan, H., Sohel, F., & Payne, C. (2020). Sentiment analysis in a forensic timeline with deep learning. IEEE Access, 8, 60664-60675.
- Studiawan, H., Sohel, F., & Payne, C. (2019). A survey on forensic investigation of operating system logs. Digital Investigation, 29, 1-20.
- Studiawan, H., Payne, C., & Sohel, F. (2017). Graph clustering and anomaly detection of access control log for forensic purposes. Digital Investigation, 21, 76-87.
- Djanali, S., Nugraha, D. P., Studiawan, H., & Pratomo, B. A. (2018). Vote identification and integrity of ballot in paper-based e-voting system. Electronic Goverment, 14(3), 240-254.
- Studiawan, H., Djanali, S., & Pratomo, D. A. (2016). Graph-based forensic analysis of web honeypot. Journal of Telecommunications and Information Technology, 2, 60-65.
- Djanali, S., Adi, B. P., Studiawan, H., Anggoro, R., & Henning, T. C. (2015). Coro: Graph-based automatic intrusion detection system signature generator for e-voting protection. Journal of Theoretical and Applied Information Technology, 81(3), 535-546.
- Ahmad, T., Marbun, M. S., Studiawan, H., Wibisono, W., & Ijtihadie, R. M. (2014). A novel random email-based steganography. International Journal of e-Education, e-Business, e-Management and e-Learning, 4(2), 129-134.
- Ahmad, T., Hanifatul Azizah, A., & Studiawan, H. (2013). Fingerprint-based authentication and cryptography in an e-voting system. Jurnal Manajemen Informatika, 2(2), 7-11.
- Djanali, S., & Studiawan, H. (2012). Real time estimation and monitoring of power in homogeneous server cluster using multiple linear regression. Kursor, 6(4), 205-210.
Conferences
- Studiawan, H., Sohel, F., & Payne, C. (2020). Automatic event log abstraction to support forensic investigation. In Proceedings of the Australasian Computer Science Week Multiconference (pp. 1-9).
- Studiawan, H., Payne, C., & Sohel, F. (2019). Automatic graph-based clustering for security logs. In Proceedings of the International Conference on Advanced Information Networking and Applications (pp. 914-926).
- Studiawan, H., Sohel, F., & Payne, C. (2018). Automatic log parser to support forensic analysis. In Proceedings of the 16th Australian Digital Forensics Conference (pp. 1-10).
- Shiddiqi, A. M., Baskoro, F., Wijaya, A. Y., & Studiawan, H. (2019). Sensor energy preservation for leak quantification using distance-based feature selection method. In Proceedings of the 12th International Conference on Information & Communication Technology and System (pp. 316-322).
- Studiawan, H., Pratomo, B. A., & Anggoro, R. (2016). Clustering of SSH brute-force attack logs using k-clique percolation. In Proceedings of the International Conference on Information & Communication Technology and Systems (pp. 39-42).
- Djusdek, D. F., Studiawan, H., & Ahmad, T. (2016). Adaptive image compression using Adaptive Huffman and LZW. In Proceedings of the International Conference on Information & Communication Technology and Systems (pp. 101-106).
- Djanali, S., Pratomo, B. A., Cipto, K. P. N., Koesriputranto, A., & Studiawan, H. (2016). Design and development of voting data security for electronic voting (E-Voting). In Proceedings of the 4th International Conference on Information and Communication Technology (pp. 1-4).
- Husni, M., Siahaan, D. O., Ciptaningtyas, H. T., Studiawan, H., & Aliarham, Y. P. (2016). Liquid volume monitoring based on ultrasonic sensor and Arduino microcontroller. In IOP Conference Series: Materials Science and Engineering (Vol. 128, No. 1, p. 012026).
- Utamima, A., Pradina, K. R., Dini, N. S., & Studiawan, H. (2015). Distribution route optimization of gallon water using genetic algorithm and tabu search. Procedia Computer Science, 72, 503-510.
- Djanali, S., Arunanto, F. X., Pratomo, B. A., Baihaqi, A., Studiawan, H., & Shiddiqi, A. M. (2014). Aggressive web application honeypot for exposing attacker’s identity. In Proceedings of the 1st International Conference on Information Technology, Computer, and Electrical Engineering (pp. 212-216).
- Ahmad, T., Studiawan, H., Ahmad, H. S., Ijtihadie, R. M., & Wibisono, W. (2014). Shared secret-based steganography for protecting medical data. In Proceedings of the International Conference on Computer, Control, Informatics and its Applications (pp. 87-92).
- Ahmad, T., Sukanto, G., Studiawan, H., Wibisono, W., & Ijtihadie, R. M. (2014). Emoticon-based steganography for securing sensitive data. In Proceedings of the 6th International Conference on Information Technology and Electrical Engineering (pp. 1-6).
- Djanali, S., Arunanto, F. X., Pratomo, B. A., Studiawan, H., & Nugraha, S. G. (2014). SQL injection detection and prevention system with Raspberry Pi honeypot cluster for trapping attacker. In Proceedings of the International Symposium on Technology Management and Emerging Technologies (pp. 163-166).
- Ahmad, T., Studiawan, H., & Ramadhan, T. T. (2014). Developing a Raspberry Pi-based monitoring system for detecting and securing an object. In Proceedings of the International Electronics Symposium (pp. 125-129).
- Ary Mazharuddin, S., Ijtihadie, R. M., Giovanni, I. A., Studiawan, H., Wibisono, W., & Ahmad, T. (2014). Location-based agenda using GPS with K-nearest neighbor algorithm context matching. In Proceedings of The International Conference of Information and Communication Technology for Embedded Systems.
- Djanali, S., Arunanto, F. X., Pratomo, B. A., & Studiawan, H.(2013). Honeypot in Raspberry Pi cluster for analyzing attacker behaviour. In Proceedings of the Engineering International Conference.
- Djanali, S., & Studiawan, H. (2013). Power optimization in high availability server cluster. In Proceedings of the 7th International Conference on Information & Communication Technology and Systems (pp. 239-244).