Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research Workshop
Abstract
Keywords
Full Text:
PDFReferences
N. D. Iskuntianti, M. A. Faisal, J. Naimah, and V. F. Sanjaya, “The Influence Of Brand Image, Lifestyle, And Product Quality on Purchasing Decisions,†Journal of Business Management Review, vol. 1, no. 6, pp. 436–448, Dec. 2020, doi: 10.47153/jbmr16.752020.
J. J. Siregar, “Analisis Explotasi Keamanan … (Junita Juwita Siregar) ANALISIS EXPLOTASI KEAMANAN WEB DENIAL OF SERVICE ATTACK.â€
M. Rauf, A. Prasetio, S. Sos, and M. Si, “AKTIVITTAS KOMUNIKASI APLIKASI PENCARIAN JODOH PADA MEDIA MiChat,†2021.
J. Elektronik, I. K. Udayana, K. Dwi, O. Mahendra, I. Komang, and A. Mogi, “Digital Forensic Analysis of Michat Applications on Android as Digital Proof in Handling Online Prostitution Cases,†Jurnal Elektronik Ilmu Komputer Udayana, vol. 9, no. 3, pp. 381–390, 2021.
A. Sanchez, N. Han, and P. Jones, “Mexico: Organized Crime and Drug Trafficking Organizations Related papers T he St rat egic Implicat ions of t he Cárt el de Jalisco Nueva Generación.†[Online]. Available: www.crs.gov
A. Sanchez, N. Han, and P. Jones, “Mexico: Organized Crime and Drug Trafficking Organizations Related papers T he St rat egic Implicat ions of t he Cárt el de Jalisco Nueva Generación.†[Online]. Available: www.crs.gov
V. L. Schul’tz, V. v. Kul’ba, A. B. Shelkov, and L. v. Bogatyryova, “Scenario Analysis of Improving the Effectiveness of Cybercrime Investigation Management Problems,†IFAC-PapersOnLine, vol. 54, no. 13, pp. 155–160, 2021, doi: 10.1016/j.ifacol.2021.10.437.
N. Iman, A. Susanto, and R. Inggi, “Analisa Perkembangan Digital Forensik dalam Penyelidikan Cybercrime di Indonesia (Systematic Review),†Jurnal Telekomunikasi dan Komputer, vol. 9, no. 3, p. 186, Jan. 2020, doi: 10.22441/incomtech.v9i3.7210.
M. N. O. Sadiku, M. Tembely, and S. M. Musa, “Digital Forensics,†International Journal of Advanced Research in Computer Science and Software Engineering, vol. 7, no. 4, pp. 274–276, Apr. 2017, doi: 10.23956/ijarcsse/V7I4/01404.
I. Riadi, R. Umar, and M. Fauzan Gustafi, “Audio Forensics on Smartphone with Digital Forensics Research Workshop (DFRWS) Method,†2021.
S. L. Garfinkel, “Digital forensics research: The next 10 years,†Digital Investigation, vol. 7, no. SUPPL., 2010, doi: 10.1016/j.diin.2010.05.009.
S. Garfinkel, P. Farrell, V. Roussev, and G. Dinolt, “Bringing science to digital forensics with standardized forensic corpora,†Digital Investigation, vol. 6, no. SUPPL., 2009, doi: 10.1016/j.diin.2009.06.016.
I. Riadi, Sunardi, and P. Widiandana, “Investigasi Cyberbullying pada WhatsApp Menggunakan Digital Forensics Research Workshop,†masa berlaku mulai, vol. 1, no. 3, pp. 730–735, 2017.
R. S. C. Ieong, “FORZA - Digital forensics investigation framework that incorporate legal issues,†Digital Investigation, vol. 3, no. SUPPL., pp. 29–36, 2006, doi: 10.1016/j.diin.2006.06.004.
I. Riadi, A. Yudhana, and Putra Ferbiansyah C M, “Akuisisi Bukti Digital Pada Instagram Messenger Berbasis Android Menggunakan Metode National Institute Of Justice(NIJ),†Jurnal Teknik Informatika dan Sistem Informasi, vol. 4, no. 2, pp. 219–227, 2018.
I. Riadi and A. Dahlan, “Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ),†JURTI, vol. 3, no. 1, 2019, [Online]. Available: www.Belkasoft.com,
I. Riadi and A. Dahlan, “Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ),†JURTI, vol. 3, no. 1, 2019, [Online]. Available: www.Belkasoft.com,
A. Yudhana, R. Umar, and A. Ahmadi, “Akuisisi Data Forensik Google Drive Pada Android Dengan Metode National Institute of Justice (NIJ),†2018.
H. Nurhairani and I. Riadi, “Analysis Mobile Forensics on Twitter Application using the National Institute of Justice (NIJ) Method,†2019.
A. G. Smith, “Risk Factors and Indicators Associated With Radicalization to Terrorism in the United States: What Research Sponsored by the National Institute of Justice Tells Us,†2018.
V. A. Yuliani and I. Riadi, “Forensic Analysis WhatsApp Mobile Application On Android-Based Smartphones Using National Institute of Standard and Technology (NIST) Framework,†2019.
H. Trisnasenjaya and I. Riadi, “Forensic Analysis of Android-based WhatsApp Messenger Against Fraud Crime Using The National Institute of Standard and Technology Framework,†2019.
I. Riadi, R. Umar, and M. Fauzan Gustafi, “Audio Forensics on Smartphone with Digital Forensics Research Workshop (DFRWS) Method,†2021.
A. Yudhana, I. Riadi, I. Zuhriyanto, and A. Dahlan, “Analisis Live Forensics Aplikasi Media Sosial Pada Browser Menggunakan Metode Digital Forensics Research Workshop (DFRWS),†vol. 20, no. 2, pp. 125–130, 2019, [Online]. Available: http://jurnalnasional.ump.ac.id/index.php/Techno
I. Riadi, R. Umar, and M. A. Aziz, “Forensik Web Layanan Instant Messaging Menggunakan Metode Association of Chief Police Officers (ACPO),†Mobile and Forensics, vol. 1, no. 1, p. 30, Sep. 2019, doi: 10.12928/mf.v1i1.705.
H. Lallie and L. Pimlott, “Applying the ACPO Principles in Public Cloud Forensic Investigations,†Journal of Digital Forensics, Security and Law, 2012, doi: 10.15394/jdfsl.2012.1113.
K. A. Latif, R. Hammad, T. T. Sujaka, K. Marzuki, and A. S. Anas, “Forensic Whatsapp Investigation Analysis on Bluestack Simulator Device Using Live Forensic Method With ACPO Standard,†International Journal of Information System & Technology Akreditasi, vol. 5, no. 3, pp. 331–338, 2021.
R. #1, I. Riadi, and Y. Prayudi, “Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone,†2016.
M. R. Setyawan, A. Yudhana, and A. Fadlil, “Data Acquisition On Messenger Skype Using The National Institute Of Justice Method,†Systemic: Information System and Informatics Journal, vol. 5, no. 2, pp. 13–18, Mar. 2020, doi: 10.29080/systemic.v5i2.724.
A. Yudhana, R. Umar, and A. Ahmadi, “Akuisisi Data Forensik Google Drive Pada Android Dengan Metode National Institute of Justice (NIJ).â€
I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,†Scientific Journal of Informatics, vol. 5, no. 2, pp. 2407–7658, 2018, [Online]. Available: http://journal.unnes.ac.id/nju/index.php/sji
A. Yudhana, I. Riadi, and I. Anshori, “Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist,†IT JOURNAL RESEARCH AND DEVELOPMENT, vol. 3, no. 1, pp. 13–21, Aug. 2018, doi: 10.25299/itjrd.2018.vol3(1).1658.
A. Yudhana, I. Riadi, and I. Zuhriyanto, “Analisis Live Forensics Aplikasi Media Sosial Pada Browser Menggunakan Metode Digital Forensics Research Workshop (DFRWS),†vol. 20, no. 2, pp. 125–130, 2019, [Online]. Available: http://jurnalnasional.ump.ac.id/index.php/Techno
R. Umar, A. Yudhana, and M. Nur Faiz, “Experimental Analysis of Web Browser Sessions Using Live Forensics Method,†International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5, p. 2951, Oct. 2018, doi: 10.11591/ijece.v8i5.pp2951-2958.
I. Riadi, R. Umar, and M. A. Aziz, “Forensik Web Layanan Instant Messaging Menggunakan Metode Association of Chief Police Officers (ACPO),†Mobile and Forensics, vol. 1, no. 1, p. 30, Sep. 2019, doi: 10.12928/mf.v1i1.705.
A. Yudhana, I. Riadi, and F. Ridho, “DDoS Classification Using Neural Network and Naïve Bayes Methods for Network Forensics,†International Journal of Advanced Computer Science and Applications, vol. 9, no. 11, 2018, doi: 10.14569/IJACSA.2018.091125.
A. Yudhana, A. Fadlil, and E. Prianto, “Performance Analysis of Hashing Methods on the Employment of App,†International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5, p. 3512, Oct. 2018, doi: 10.11591/ijece.v8i5.pp3512-3522.
DOI: https://doi.org/10.30865/mib.v6i2.3946
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 JURNAL MEDIA INFORMATIKA BUDIDARMA

This work is licensed under a Creative Commons Attribution 4.0 International License.
JURNAL MEDIA INFORMATIKA BUDIDARMA
Universitas Budi Darma
Secretariat: Sisingamangaraja No. 338 Telp 061-7875998
Email: mib.stmikbd@gmail.com

This work is licensed under a Creative Commons Attribution 4.0 International License.