The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
First Page Previous 1 2
cover
KLASIFIKASI MALWARE BANKING PADA ANDROID MENGGUNAKAN ALGORITMA RANDOM FOREST
Saputra, Ahmad Aji Guntur

Android smartphones is widely used for banking transactions. Thus, it can be at risk of malware attacks. Malware classification is a method that serves to identify and distinguish types of data cla…

Edition
-
ISBN/ISSN
-
Collation
xvi, 72 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T477432021
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN MALWARE RANSOMWARE PADA BITCOIN MINING DENGAN METODE K-MEANS…
Fitriani, Fitriani

Attack detection is an activity to analyze data or files whether the data has an attack or not. Snort IDS (intrusion detection system) help in analyzing and detecting attacks on a network in the bi…

Edition
-
ISBN/ISSN
-
Collation
xv, 54 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T477442021
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN MAN IN THE MIDDLE (MITM) ATTACK PADA JARINGAN SUPERVISORY CO…
Septiano, Sergio

Supervisory Control And Data Acquisition system adalah suatu sistem yang biasa digunakan pada dunia industri dimana untuk mengontrol perangkat dari jarak jauh dengan memanfaatkan jaringan komputer.…

Edition
-
ISBN/ISSN
-
Collation
xvi, 54 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T482832021
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI MALWARE BANKING PADA ANDROID DENGAN METODE SUPPORT VECTOR MACHINE
Octafian, Octafian

Malware classification is a way to recognize types of data that are classified as malware or normal files. Banking Malware is a type of trojan that aims to deceive bank customers and financial inst…

Edition
-
ISBN/ISSN
-
Collation
xvii, 65 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T477452021
Availability1
Add to basket
View DetailCite
cover
DETEKSI MALWARE RANSOMWARE PADA PLATFORM ANDROID MENGGUNAKAN METODE RANDOM FO…
Febriansyah, Rahmat

Malicious Software or better known as Malware is software that can enter and attack an operating system which can cause damage to the operating system. Malware itself consists of many types, there …

Edition
-
ISBN/ISSN
-
Collation
xvi, 53 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T560632021
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN DDOS FIN FLOOD DENGAN METODE ARTIFICIAL IMMUNE SYSTEM PA…
Setiawan, Agung

Distribute Denial of Service (DDoS) merupakan serangan yang bertujuan untuk mengganggu lalu lintas sebuah jaringan dengan memanfaatkan perangkat zombie yang dikendalikan oleh penyerang untuk memban…

Edition
-
ISBN/ISSN
-
Collation
xiv, 51 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T523612021
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN MALWARE BOTNET MENGGUNAKAN METODE CLUSTERING K-MEANS
Safitri, Nazula Rahma

Malware Attack Visualization aims to make it easier to recognize the type of malware and normal data. Malware or malicious software is a code or program file that is usually sent over the internet,…

Edition
-
ISBN/ISSN
-
Collation
xi, 61 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T530052021
Availability1
Add to basket
View DetailCite
cover
DETEKSI POLA RANSOMWARE BERBASIS SIGNATURE MALWARE DENGAN MEMBANDINGKAN BEBER…
PRATAMA, KEFIN

Although antivirus software has grown rapidly in the past decade, classic signature matching based on a byte pattern is still a common concept for identifying security threats. Signature is a simpl…

Edition
-
ISBN/ISSN
-
Collation
xv, 27 hlm.; ilus., tab.: 28 cm
Series Title
-
Call Number
T440812020
Availability1
Add to basket
View DetailCite
cover
SISTEM PENCEGAHAN SERANGAN MALWARE BANKING TROJAN DENGAN METODE RANDOM FOREST
Maulidin, Reza

Banking Trojans are one of the most well-known types of malware because they are designed to measure money directly from the bank accounts of mobile or PC users. Tinba is a small malware which is v…

Edition
-
ISBN/ISSN
-
Collation
xv, 52 hlm.; ilus., tab.: 28 cm
Series Title
-
Call Number
T394472020
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN MAN IN THE MIDDLE (MITM) PADA JARINGAN SUPERVISORY CONTR…
Anugrah, Harry

Pengawasan Kontrol Dan Akuisisi Data adalah Sistem Kontrol Industri yang digunakan untuk memantau dan mengontrol proses di sektor infrastruktur nasional yang kritis, salah satu protokol komunikasi …

Edition
-
ISBN/ISSN
-
Collation
xvi, 51 hlm.: tab.: ilus.; 29 cm
Series Title
-
Call Number
T480042021
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN PORT SCANNING DENGAN CLUSTERING K-MEANS PADA JARINGAN IN…
Rifki, Muhamad

Internet of things ( IoT ) muncul sebagai teknologi yang digunakan secara luas di beberapa bidang termasuk industri, transportasi, energi, pemantauan lingkungan, kesehatan, pertanian dan lain – l…

Edition
-
ISBN/ISSN
-
Collation
xvi, 81 hlm.; 29 cm
Series Title
-
Call Number
T401122020
Availability1
Add to basket
View DetailCite
cover
SISTEM PENCEGAHAN SERANGAN SQL INJECTION PADA WEB PENETRATION TESTING DAMN VU…
Alkasar, Juan

Intrusion Prevention System (IPS) is a development of Intrusion Detection System where a system (hardware, software, or a combination of hardware and software) that has the ability to monitor the n…

Edition
-
ISBN/ISSN
-
Collation
xvi, 75 hlm.; 29 cm
Series Title
-
Call Number
005.84
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI ANDROID MALWARE MENGGUNAKAN ALGORITMA PRINCIPAL COMPONENT ANALYSI…
Soraya, Dyah Citra

More and more parties are harmed because currently malware can infect almost all operating systems. One type of Android malware is MazarBot. Mazarbot is very dangerous because when it is installed …

Edition
-
ISBN/ISSN
-
Collation
xiv, 60 hlm.; 29 cm
Series Title
-
Call Number
T394832020
Availability1
Add to basket
View DetailCite
cover
VISUALISASI (CITRA GRAYSCALE) DAN KLASIFIKASI MALWARE MENGGUNAKAN METODE SUPP…
Anggara, Therio

This research is based on the process of visualizing malware capture data into a grayscale image, from the grayscale image there is a repeating pattern, the pattern will be taken using the Gray Lev…

Edition
-
ISBN/ISSN
-
Collation
xvi, 44 hlm.; 29 cm
Series Title
-
Call Number
T397142020
Availability1
Add to basket
View DetailCite
cover
SISTEM PENCEGAHAN SERANGAN MALWARE REMOTE ACCESS TROJAN (RATs) DENGAN METODE …
Andany, Deri

Remote Access Trojans (RATs) are a serious problem that needs to be resolved. RATs run silently in the background making them difficult to detect by users. Intrusion Detection and Prevention System…

Edition
-
ISBN/ISSN
-
Collation
xvi, 60 hlm.; 29 cm
Series Title
-
Call Number
T399582020
Availability1
Add to basket
View DetailCite
First Page Previous 1 2

Search Result

Found 45 from your keywords: Subject : "Malware"
You currently on page 2 of 2 page(s)
Query took 0.00221 second(s) to complete
XML ResultJSON Result

Suggestion
image
Organizational Behavior in Sport Management
Barnhill, Christopher R. - Smith, Natalie L. - Oja, Brent D.
image
GELANDANGAN, Pandangan Ilmuwan Sosial
LP3ES
image
Membuat Skripsi, Tesis, dan Disertasi : dengan Partial Least Square SEM (PLS_SEM)
Prabawati, Th. Arie - Sarwono Jonathan - Narimawati Umi
image
MANAJEMEN AIR SISTEM IRIGASI EVAPOTRANSPIRASI ALIRAN BAWAH PERMUKAAN (SISTEM IRIGASI EVAPOTRANSPIRASI) PADA BUDIDAYA PADI SISTEM OF RICE INTENSIFICATION (SRI) SALIBU
Agustina, Hilda
image
STUDI KUALITATIF MENGENAI RANCANGAN MEDIA PROMOSI KESEHATAN UNTUK PENCEGAHAN HIV/AIDS PADA REMAJA DI KOTA PALEMBANG
Synthia, Dhea
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search