The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
1 2 Next Last Page
cover
KLASIFIKASI MALWARE TROJAN HORSE MENGGUNAKAN METODE LONG SHORT TERM MEMORY (L…
Ramadhanil, Muhammad

Trojan horse is a cyber attack that is carried out by disguising or infiltrating a system through programs or files that appear normal and harmless. Trojan horses can gain unauthorized access into …

Edition
-
ISBN/ISSN
-
Collation
xiii, 79 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1658732025
Availability1
Add to basket
View DetailCite
cover
PERBANDINGAN ANALISIS STATIS DAN DINAMIS PADA DETEKSI WANNACRY RANSOMWARE
Dwiyono, Luqman Agus

Ransomware is a type of malware that encrypts the victim's data and demands a ransom to restore access, with WannaCry being one of the most notorious variants exploiting EternalBlue on the SMB prot…

Edition
-
ISBN/ISSN
-
Collation
xvii, 131 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1651772025
Availability1
Add to basket
View DetailCite
cover
DETEKSI MALWARE ANDROID MENGGUNAKAN METODE CONVOLUTIONAL NEURAL NETWORK (CNN)
Hidayatullah, Hidayatullah

As the most widely used mobile operating system, Android is increasingly becoming a prime target for malware attacks. The popularity of this operating system makes it attractive for cyber security …

Edition
-
ISBN/ISSN
-
Collation
xvi, 41 hlm.; tab.; Ilus.; 29 cm
Series Title
-
Call Number
T1481942024
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI PDF MALWARE PADA GARBA RUJUKAN DIGITAL (GARUDA) KEMDIKBUD DIKTI D…
Lestari, Virginita Putri

Malware that can enter through PDF files that appear unsuspicious is one of the main factors in cyber security attacks. The GARUDA dataset was analyzed statically using VirusTotal and PDFiD to iden…

Edition
-
ISBN/ISSN
-
Collation
xiii, 52 hlm.; ilus.; tab.; 28 cm
Series Title
-
Call Number
T1477842024
Availability1
Add to basket
View DetailCite
cover
LASIFIKASI SERANGAN SPYWARE DENGAN MENGGUNAKAN METODE K-NEAREST NEIGHBORS (KNN)
Pederson, Mulki

Spyware is one type of malware that threatens computer systems because it can steal users' personal information and sensitive data without their knowledge. Spyware can monitor user activities and s…

Edition
-
ISBN/ISSN
-
Collation
xiii, 59 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1467702024
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN MALWARE SPYWARE MENGGUNAKAN METODE K-MEANS CLUSTERING.
Saifullah, Muhammad Arief

K-means clustering is a tool for determining the cluster structure of a data set identified by its strong similarity to other clusters or its strong differences from other clusters. Another article…

Edition
-
ISBN/ISSN
-
Collation
xiii, 48 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308832023
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI FITUR SELEKSI PADA MALWARE DENGAN DEEP NEURAL NETWORK.
Irfan, Ahmad Naufal

Malware is malicious software that refers to programs that deliberately exploit vulnerabilities in computing systems for malicious purposes, Deep Neural Network is an Artificial Neural Network with…

Edition
-
ISBN/ISSN
-
Collation
xiv, 68 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308172023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN MALWARE SPYWARE DENGAN MENGGUNAKAN METODE RANDOM FOREST.
Pramudita, Amelia 

Spyware is a type of malware that aims to collect important information and data such as financial information and passwords without permission and send them to the attacker. Visualization techniqu…

Edition
-
ISBN/ISSN
-
Collation
xiii, 71 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1120832023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI SMS MALWARE PADA PLATFORM ANDROID DENGAN METODE SUPPORT VECTOR MA…
Raharjo, Ageng

Android is the most popular mobile software platform across the globe. The worldwide app downloads reached 352.9 billion in 2021. However, it still faces serious security threats due to its open-so…

Edition
-
ISBN/ISSN
-
Collation
xii, 66 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1233722023
Availability1
Add to basket
View DetailCite
cover
DETEKSI DAN KLASIFIKASI MALWARE PADA CITRA GRAYSCALE DENGAN MENGGUNAKAN DEEP …
Victory, Daniel Sandwi 

This research focuses on the utilization of Deep Learning techniques for malware detection and classification. By representing malware samples as grayscale images, a Deep Learning model based on Co…

Edition
-
ISBN/ISSN
-
Collation
xiv, 70 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1261862023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI PDF MALWARE PADA LAYANAN AGREGATOR NASIONAL (GARUDA) KEMDIKBUD DI…
Arista, Nata

Garba Rujukan Digital (GARUDA) merupakan salah satu e-library akademisi Indonesia yang memakai PDF sebagai ekstensi file. Dataset yang digunakan dalam penelitian ini berasal dari portal GARUDA deng…

Edition
-
ISBN/ISSN
-
Collation
xvii, 57 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1251112023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI PDF MALWARE MENGGUNAKAN CLUSTERING K-MEANS PADA LAYANAN GARUDA KE…
Resti, Indah Cahya

K-Means clustering is a method to grouping data based on the similarity of features and detect the hidden patterns in dataset. The dataset is from GARUDA Repository which contains raw data of PDF f…

Edition
-
ISBN/ISSN
-
Collation
xiii, 51 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T865352023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN PADA MALWARE SPYWARE MENGGUNAKAN METODE NAIVE BAYES CLAS…
Sartika, Sartika

The amount of Malware is constantly increasing. Most Malware is a modification of previous Malware data. The datasets used from CIC-MalMem-2022 are Benign and Spyware-CWS. This study used the Naïv…

Edition
-
ISBN/ISSN
-
Collation
xiv, 52 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1120812023
Availability1
Add to basket
View DetailCite
cover
CLUSTERING ANDROID MALWARE BERDASARKAN FREKUENSI SYSTEM CALL MENGGUNAKAN K-MEANS
Badrus, Muhammad Zufar

In the security sector, malware that specifically attacks smartphones is growing faster and more sophisticated. Malware is becoming more and more powerful in carrying out criminal acts, such as ste…

Edition
-
ISBN/ISSN
-
Collation
xiv, 52 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T828612022
Availability1
Add to basket
View DetailCite
cover
DETEKSI ANOMALI FILE PDF MALWARE PADA LAYANAN AGREGATOR GARBA RUJUKAN DIGITAL…
Yuningsih, Novi

Portable Document Format (PDF) is a document exchange media that is very vulnerable to malicious attacks, namely Malware PDF. One of the services that most often use PDF files as a medium is a scie…

Edition
-
ISBN/ISSN
-
Collation
xvii, 84 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T850282022
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI PDF MALWARE PADA GARBA RUJUKAN DIGITAL (GARUDA) KEMDIKBUD DIKTI D…
Fidela, Alifah

The Portable Document Format (PDF) is one of the most commonly used document reader formats, the object structure in PDF is flexible and easy to use. Therefore, that hackers use PDFs to carry out t…

Edition
-
ISBN/ISSN
-
Collation
xiii, 47 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T863312022
Availability1
Add to basket
View DetailCite
cover
Membasmi Virus Komputer dan Android
Kurniawan Dedik

Virus, trojan, dan semua komplotannya meupakan program jahat yang selalu mempunyai tujuan untuk menghancurkan, merusak data serta sistem komputer dan Android yang kita miliki. Virus tidak pernah p…

Edition
-
ISBN/ISSN
978-623-00-1696-7
Collation
viii, 226 hlm
Series Title
-
Call Number
005.84 Kur m
Availability3
Add to basket
View DetailCite
cover
Malware Analysis and Detection Engineering : A Comprehensive Approach to Dete…
Mohanta, AbhijitSaldanha, Anoop

Edition
1
ISBN/ISSN
978-1-4842-6129-7
Collation
iii, 948 hlm, 24 cm
Series Title
-
Call Number
005.84 Moh m

Edition
1
ISBN/ISSN
978-1-4842-6129-7
Collation
iii, 948 hlm, 24 cm
Series Title
-
Call Number
005.84 Moh m
Availability2
Add to basket
View DetailCite
cover
Malware Analysis Using Artificial Intelligence and Deep Learning
Stamp, MarkAlazab,Mamoun

Edition
1
ISBN/ISSN
978-3-030-62581-8
Collation
xx, 651 hlm; 24 cm
Series Title
-
Call Number
005.84 Sta m

Edition
1
ISBN/ISSN
978-3-030-62581-8
Collation
xx, 651 hlm; 24 cm
Series Title
-
Call Number
005.84 Sta m
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI MALWARE ADWARE PADA ANDROID MENGGUNAKAN METODE SUPPORT VEKTOR MAC…
Maulana, Padhli

The internet is a liaison between one electronic media and other electronic media quickly and accurately in acommunication network. Where the communication network sends information that is transmi…

Edition
-
ISBN/ISSN
-
Collation
xiii, 49 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T689982022
Availability1
Add to basket
View DetailCite
cover
VISUALISASI DAN KLASIFIKASI MALWARE MENGGUNAKAN METODE K-NEAREST NEIGHBOR
Hafiz, Meidi Dwi

Visualization is a method used to represent data in the form of an image to display hidden information. The visualization in this study uses malware data to be converted into a grayscale image. Thi…

Edition
-
ISBN/ISSN
-
Collation
xiii, 37 hlm,:ilus.; 29 cm
Series Title
-
Call Number
T399182021
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI ADWARE MALWARE PADA ANDROID DENGAN METODE RANDOM FOREST
Hardianto, Novit

The development of technology triggers the development of malicious files called malware. Malware is software that is explicitly designed with the aim of finding weaknesses or even damaging softwar…

Edition
-
ISBN/ISSN
-
Collation
xi, 53 hlm. : ilus. ; 29 cm
Series Title
-
Call Number
T395222021
Availability1
Add to basket
View DetailCite
cover
PENGENALAN POLA SERANGAN SLOW HTTP DOS DENGAN MENGGUNAKAN METODE REGULAR EXPR…
Diah, Komariah

Slow http dos attack is one of the DoS attack methods targeting HTTP servers. This method hampers the service by flooding it causing a pool of connections with slow and heavy requests to the web se…

Edition
-
ISBN/ISSN
-
Collation
xiii, 57 hlm,: ilus.; 29 cm
Series Title
-
Call Number
005.840 7
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI MALWARE RANSOMWARE BERBASIS TEKNIK SELEKSI FITUR DENGAN ALGORITMA…
Perdana, Tata Satria Timor

Malware adalah sebuah perangkat lunak yang dibuat dengan tujuan memasuki dan terkadang merusak sistem komputer, jaringan, ataupun server tanpa diketahui oleh pemiliknya, Ransomware merupakan jenis …

Edition
-
ISBN/ISSN
-
Collation
xiv, 67 hlm,:ilus.; 29 cm
Series Title
-
Call Number
T560682021
Availability1
Add to basket
View DetailCite
cover
SISTEM KLASIFIKASI SERANGAN SQL INJECTION & XSS PADA RAMA REPOSITORY DENGAN M…
Melinda, Lisa

Serangan SQL Injection dan XSS adalah salah satu contoh serangan kerentanan yang ada di aplikasi web. Serangan SQL Injection adalah salah satu dari lima teratas dalam semua risiko keamanan aplikasi…

Edition
-
ISBN/ISSN
-
Collation
xiv, 47 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T512812021
Availability1
Add to basket
View DetailCite
cover
SISTEM KLASIFIKASI SERANGAN DDOS HTTP FLOOD DENGAN METODE LONG SHORT TERM MEM…
Afidin, Ahmad

Distributed Denial of Service (DDoS) merupakan serangan yang dapat mengganggu lalu lintas sebuah jaringan dengan memanfaatkan mesin zombie yang dikendalikan oleh penyerang. Serangan HTTP Flood dila…

Edition
-
ISBN/ISSN
-
Collation
viii, 56 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T509442021
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI ALGORITMA PCA UNTUK PENINGKATAN SISTEM CLASSIFICATION MALWARE AN…
Nawawi, Muhammad

Reduksi dimensi sudah banyak dipakai berbagai penelitian didunia karena fungsinya yang baik dalam memperkecil data tanpa menghilangkan karakteristik dari data trsebut. Pada penelitian ini ingin mel…

Edition
-
ISBN/ISSN
-
Collation
xvii, 86 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T479822021
Availability1
Add to basket
View DetailCite
cover
SISTEM KLASIFIKASI SERANGAN SQL INJECTION & XSS PADA RAMA REPOSITORY DENGAN M…
Hermita, Tia

RAMA repository merupakan tempat penyimpanan paparan hasil penelitian nasional baik berbentuk tugas akhir proyek mahasiswa (Diploma), skripsi (S1), tesis (S2), disertasi (S3) maupun laporan penelit…

Edition
-
ISBN/ISSN
-
Collation
xiv, 48 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T509672021
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI SERANGAN SMURF DENIAL OF SERVICE DENGAN METODE ITERATIVE DICHOTOM…
Septiawan, M. Khoir

Denial of Service (DoS) adalah teknik serangan yang sering dilakukan oleh attacker yang bertujuan untuk melumpuhkan kemampuan sistem. Serangan dari Denial of Service (DoS) merupakan ancaman yang se…

Edition
-
ISBN/ISSN
-
Collation
xvii, 63 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T482062021
Availability1
Add to basket
View DetailCite
cover
KOMPARASI PADA KLASIFIKASI TRAFIK SERANGAN MALWARE BOTNET DENGAN METODE SUPPO…
Zamieyus, Meutia

Pada beberapa tahun terakhir penelitian mengenai botnet telah banyak dilakukan, botnet merupakan salah satu jenis malware yang menyerang dengan cara mengambil alih sistem komputer yang terhubung ke…

Edition
-
ISBN/ISSN
-
Collation
xiii, 38 hlm,: ilus.; 29 cm
Series Title
-
Call Number
T495282021
Availability1
Add to basket
View DetailCite
1 2 Next Last Page

Search Result

Found 45 from your keywords: Subject : "Malware"
Query took 0.00225 second(s) to complete
XML ResultJSON Result

Suggestion
image
IKAN HIAS AIR LAUT
Susanto, Heru
image
ANALISIS POTENSI RETRIBUSI PASAR KOTA PALEMBANG (STUDI KASUS PASAR CINDE DAN PASAR KM 5 PALEMBANG)
Ramadhoni, M. Nizal
image
ANALISIS NILAI TAMBAH, EFISIENSI DAN PRODUKTIVITAS TENAGA KERJA INDUSTRI KECAP DI INDONESIA PERIODE 1998-2008
Sembiring, Friskaulin
image
Mechanical Engineering Design, SIXTH EDITION
Shigley, Joseph E. - Mischke, Charles R.
image
Prinsip dan Praktik KEPERAWATAN PERIOPERATIF
Baradero, Mary - Dayrit, Mary Wilfrid - Monica, Ester - Ariani, Ns. Fruriolina - Siswandi, Yakobus
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search