Comparison of Forensic Tools on Social Media Services Using the Digital Forensic Research Workshop Method (DFRWS)
Abstract
Full Text:
PDFReferences
I. Riadi, A. Yudhana, dan M. C. F. Putra, “Akuisisi Bukti Digital Pada Instagram Messenger Berbasis Android Menggunakan Metode National Institute of Justice (Nij),†J. Tek. Inform. dan Sist. Inf., vol. 4, no. 2, hal. 219–227, 2018, doi: 10.28932/jutisi.v4i2.769.
N. Anwar dan I. Riadi, “Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web,†J. Ilm. Tek. Elektro Komput. dan Inform., vol. 3, no. 1, hal. 1, 2017, doi: 10.26555/jiteki.v3i1.6643.
W. A. Mukti, S. U. Masruroh, dan D. Khairani, “Analisa dan Perbandingan Bukti Forensik Aplikasi Media Sosial Facebook dan Twitter pada Smartphone Android,†J. Tek. Inform., vol. 10, no. 1, hal. 73–84, 2018, doi: 10.15408/jti.v10i1.6820.
Kementrian Komunikasi dan Informasi, “Kominfo : Pengguna Internet di Indonesia 63 Juta Orang,†Website Resmi Kementerian Komunikasi dan Informatika RI, 2013. .
M. Cindo, D. P. Rini, dan Ermatita, “Sentiment Analysis On Twitter By Using Maximum Entropy And Support Vector Machine Method,†Sinergi, vol. 24, no. 2, hal. 87–94, 2020, doi: 10.22441/sinergi.2020.2.002.
A. Fauzan, I. Riadi, dan A. Fadlil, “Analisis Forensik Digital Pada Line Messenger Untuk Penanganan Cybercrime,†in Annual Research Seminar (ARS), 2016, vol. 2, no. 1, hal. 159–163.
Kementrian Komunikasi dan Informasi, “SIARAN PERS NO. 08/HM/KOMINFO/01/2019 Warganet Paling Banyak Laporkan Akun Twitter,†Kementrian Komunikasi dan Informasi, 2019. [Daring]. Tersedia pada: https://www.kominfo.go.id/tautan. [Diakses: 01-Feb-2019].
I. Saputra dan M. N. Azhar, “Analisis dan Investigasi Forensik Digital Live Memory untuk Deteksi Tingkah Laku Agresi Pada Aplikasi Whatsapp,†Semin. Nas. dan Disk. Panel Multidisiplin Has. Penelit. Pengabdi. Kpd. Masy., hal. 119–125, 2018.
APJII, “Penetrasi & Profil Perilaku Pengguna Internet Indonesia Tahun 2018,†Indonesia, 2018.
A. Yudhana, I. Riadi, dan I. Anshori, “Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist,†It J. Res. Dev., vol. 3, no. 1, hal. 13–21, 2018, doi: 10.25299/itjrd.2018.vol3(1).1658.
I. Riadi, R. Umar, dan I. M. Nasrulloh, “Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij),†Elinvo (Electronics, Informatics, Vocat. Educ., vol. 3, no. 1, hal. 70–82, 2018, doi: 10.21831/elinvo.v3i1.19308.
A. L. Suryana, R. El Akbar, dan N. Widiyasono, “Investigasi Email Spoofing dengan Metode Digital Forensics Research Workshop (DFRWS),†J. Edukasi dan Penelit. Inform., vol. 2, no. 2, hal. 111–117, 2016, doi: 10.26418/jp.v2i2.16821.
I. Riadi, S. Sunardi, dan Sahiruddin, “Perbandingan Tool Forensik Data Recovery Berbasis Android Menggunakan Metode NIST,†J. Teknol. Inf. dan Ilmu Komput., vol. x, no. 30, hal. 1–8, 2020, doi: 10.25126/jtiik.202071921.
R. Inggi, B. Sugiantoro, dan Y. Prayudi, “Penerapan System Development Life Cycle ( Sdlc )Dalam Mengembangkan Framework Audio Forensik,†semanTIK, vol. 4, no. 2, hal. 193–200, 2018, doi: 10.5281/zenodo.2528444.
M. N. Yusoff, A. Dehghantanha, dan R. Mahmod, “Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies,†in Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, vol. 4, no. 4, Elsevier, 2017, hal. 41–62.
P. Salave dan Atisha Wakdikar, “Memory Forensics: Tools Comparison,†Int. J. Sci. Res., vol. 6, no. 6, hal. 5–8, 2017.
P. Brankica Popović dan P. Kristijan Kuk, “Comprehensive Forensic Examination With Belkasoft Evidence Center,†in International Scientific Conference “Archibald Reiss Days†Thematic Conference Proceedings of International Significance, 2018.
I. Riadi, A. Fadlil, dan A. Fauzan, “A study of mobile forensic tools evaluation on android-based LINE messenger,†Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 10, hal. 201–206, 2018, doi: 10.14569/IJACSA.2018.091024.
A. C. K. Wardana, R. Pedrason, dan T. B. Prasetyo, “Implementation of Digital Forensic Brunei Darussalam in Building Cyber Security,†J. Prodi Perang Asimetris, vol. VOL 4, no. 1, hal. 1–22, 2018.
R. Harris, “Arriving at an Anti-forensics Consensus,†in DFRWS 2006 Conference proceedings, 2006.
G. Palmer, “A Road Map for Digital Forensic Research Report From the First Digital Forensic Research Workshop (DFRWS),†Utica, New York, 2001.
A. Yudhana, R. Umar, dan A. Ahmadi, “Digital Evidence Identification on Google Drive in Android Device Using NIST Mobile Forensic Method,†Sci. J. Informatics Vol., vol. 6, no. 1, hal. 54–63, 2019, doi: 10.15294/sji.v6i1.17767.
I. F. Editia Kurdiat, N. Widiyasono, dan H. Mubarok, “Analisis Proses Investigasi Dekstop PC Yang Terhubung Layanan Private Cloud,†J. Tek. Inform. dan Sist. Inf., vol. 2, no. 2, hal. 221–230, 2016, doi: 10.28932/jutisi.v2i2.463.
R. Umar, I. Riadi, dan G. Maulana, “A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements,†Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 12, hal. 69–75, 2017, doi: 10.14569/ijacsa.2017.081210.
M. Parekh dan S. Jani, “Memory Forensic: Acquisition and Analysis of Memory and its Tools Comparison,†Int. J. Eng. Technol. Manag. Res., vol. 5, no. 2, hal. 90–95, 2018, doi: 10.5281/zenodo.1198968.
P. E. Walck, “Book Review: Social Communication in the Twitter Age,†Int. J. Interact. Commun. Syst. Technol., vol. 3, no. 2, hal. 66–69, 2013.
H. Basri, “Peran media Sosial Twitter dalam Interaksi Sosial Pelajar Sekolah Menengah Pertama di Kota Pekanbaru (Studi Kasus Pelajar Smpn 1 Kota Pekanbaru),†J. Online Mhs. Fak. Ilmu Sos. dan Ilmu Polit., vol. 4, no. 2, hal. 1–15, 2017.
DOI: https://doi.org/10.33387/jiko.v6i1.5872
Refbacks
- There are currently no refbacks.