The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
1 2 Next Last Page
cover
DETEKSI SERANGAN MALWARE APK REVERSE TCP MENGGUNAKAN METODE ANN (ARTIFICIAL N…
Firmansyah, Muhamad Bagas

The increasing use of Android devices has also led to the rise of security threats, one of which is the Reverse TCP attack technique that enables unauthorized remote access to victim devices. This …

Edition
-
ISBN/ISSN
-
Collation
xiii, 65 hlm.; ilus,; tab, 29 cm
Series Title
-
Call Number
T1835712025
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN MALWARE ANDROID REVERSE TCP PADA SMALL BOARD COMPUTER DENGAN…
Saputra, Dhani Medianto

Android malware threats using reverse TCP techniques are increasing and require effective detection methods. This study develops a detection systemusing the Naïve Bayes algorithm implemented on a …

Edition
-
ISBN/ISSN
-
Collation
xvi, 85 hlm.; ilus,; tab, 29 cm
Series Title
-
Call Number
T1835732025
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DDOS DOS DAN MITM PADA PERANGKAT SMART HOME MENGGUNAKAN METO…
Rahmadini, Fitri

This study aims to detect and classify Distributed Denial of Service (DDoS), Denial of Service (DoS), and Man in The Middle (MITM) attacks on smart home devices using the Naïve Bayes method. The r…

Edition
-
ISBN/ISSN
-
Collation
xiii, 98 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1856282025
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN MALWARE ANDROID REVERSE TCP PADA LALU LINTAS JARINGAN MENGGU…
Alfatiya, Fitri

Edition
-
ISBN/ISSN
-
Collation
xiv, 77 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1855552025

Edition
-
ISBN/ISSN
-
Collation
xiv, 77 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1855552025
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN MALWARE ANDROID REVERSE TCP PADA NETWORK TRAFFIC MENGGUNAKAN…
Lestari, Ayu

The rapid advancement of Android technology makes this operating system vulnerable to malware attacks, one of which is the Reverse TCP Trojan, capable of establishing a back connection from the vic…

Edition
-
ISBN/ISSN
-
Collation
xiv, 78 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1854742025
Availability1
Add to basket
View DetailCite
cover
DETEKSI REVERSE TCP METASPLOIT MENGGUNAKAN GRAPH CONVOLUTIONAL NETWORK
Fakhri, Muhammad

The rapid development of the open-source Android operating system has made it vulnerable to various cyberattacks, including malware that utilizes the reverse TCP technique. This attack allows an at…

Edition
-
ISBN/ISSN
-
Collation
xiii, 74 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1854582025
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI MALWARE TROJAN HORSE MENGGUNAKAN METODE LONG SHORT TERM MEMORY (L…
Ramadhanil, Muhammad

Trojan horse is a cyber attack that is carried out by disguising or infiltrating a system through programs or files that appear normal and harmless. Trojan horses can gain unauthorized access into …

Edition
-
ISBN/ISSN
-
Collation
xiii, 79 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1658732025
Availability1
Add to basket
View DetailCite
cover
PERBANDINGAN ANALISIS STATIS DAN DINAMIS PADA DETEKSI WANNACRY RANSOMWARE
Dwiyono, Luqman Agus

Ransomware is a type of malware that encrypts the victim's data and demands a ransom to restore access, with WannaCry being one of the most notorious variants exploiting EternalBlue on the SMB prot…

Edition
-
ISBN/ISSN
-
Collation
xvii, 131 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1651772025
Availability1
Add to basket
View DetailCite
cover
DETEKSI MALWARE ANDROID MENGGUNAKAN METODE CONVOLUTIONAL NEURAL NETWORK (CNN)
Hidayatullah, Hidayatullah

As the most widely used mobile operating system, Android is increasingly becoming a prime target for malware attacks. The popularity of this operating system makes it attractive for cyber security …

Edition
-
ISBN/ISSN
-
Collation
xvi, 41 hlm.; tab.; Ilus.; 29 cm
Series Title
-
Call Number
T1481942024
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI PDF MALWARE PADA GARBA RUJUKAN DIGITAL (GARUDA) KEMDIKBUD DIKTI D…
Lestari, Virginita Putri

Malware that can enter through PDF files that appear unsuspicious is one of the main factors in cyber security attacks. The GARUDA dataset was analyzed statically using VirusTotal and PDFiD to iden…

Edition
-
ISBN/ISSN
-
Collation
xiii, 52 hlm.; ilus.; tab.; 28 cm
Series Title
-
Call Number
T1477842024
Availability1
Add to basket
View DetailCite
cover
LASIFIKASI SERANGAN SPYWARE DENGAN MENGGUNAKAN METODE K-NEAREST NEIGHBORS (KNN)
Pederson, Mulki

Spyware is one type of malware that threatens computer systems because it can steal users' personal information and sensitive data without their knowledge. Spyware can monitor user activities and s…

Edition
-
ISBN/ISSN
-
Collation
xiii, 59 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1467702024
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN MALWARE SPYWARE MENGGUNAKAN METODE K-MEANS CLUSTERING.
Saifullah, Muhammad Arief

K-means clustering is a tool for determining the cluster structure of a data set identified by its strong similarity to other clusters or its strong differences from other clusters. Another article…

Edition
-
ISBN/ISSN
-
Collation
xiii, 48 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308832023
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI FITUR SELEKSI PADA MALWARE DENGAN DEEP NEURAL NETWORK.
Irfan, Ahmad Naufal

Malware is malicious software that refers to programs that deliberately exploit vulnerabilities in computing systems for malicious purposes, Deep Neural Network is an Artificial Neural Network with…

Edition
-
ISBN/ISSN
-
Collation
xiv, 68 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308172023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN MALWARE SPYWARE DENGAN MENGGUNAKAN METODE RANDOM FOREST.
Pramudita, Amelia 

Spyware is a type of malware that aims to collect important information and data such as financial information and passwords without permission and send them to the attacker. Visualization techniqu…

Edition
-
ISBN/ISSN
-
Collation
xiii, 71 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1120832023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI SMS MALWARE PADA PLATFORM ANDROID DENGAN METODE SUPPORT VECTOR MA…
Raharjo, Ageng

Android is the most popular mobile software platform across the globe. The worldwide app downloads reached 352.9 billion in 2021. However, it still faces serious security threats due to its open-so…

Edition
-
ISBN/ISSN
-
Collation
xii, 66 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1233722023
Availability1
Add to basket
View DetailCite
cover
DETEKSI DAN KLASIFIKASI MALWARE PADA CITRA GRAYSCALE DENGAN MENGGUNAKAN DEEP …
Victory, Daniel Sandwi 

This research focuses on the utilization of Deep Learning techniques for malware detection and classification. By representing malware samples as grayscale images, a Deep Learning model based on Co…

Edition
-
ISBN/ISSN
-
Collation
xiv, 70 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1261862023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI PDF MALWARE PADA LAYANAN AGREGATOR NASIONAL (GARUDA) KEMDIKBUD DI…
Arista, Nata

Garba Rujukan Digital (GARUDA) merupakan salah satu e-library akademisi Indonesia yang memakai PDF sebagai ekstensi file. Dataset yang digunakan dalam penelitian ini berasal dari portal GARUDA deng…

Edition
-
ISBN/ISSN
-
Collation
xvii, 57 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1251112023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI PDF MALWARE MENGGUNAKAN CLUSTERING K-MEANS PADA LAYANAN GARUDA KE…
Resti, Indah Cahya

K-Means clustering is a method to grouping data based on the similarity of features and detect the hidden patterns in dataset. The dataset is from GARUDA Repository which contains raw data of PDF f…

Edition
-
ISBN/ISSN
-
Collation
xiii, 51 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T865352023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN PADA MALWARE SPYWARE MENGGUNAKAN METODE NAIVE BAYES CLAS…
Sartika, Sartika

The amount of Malware is constantly increasing. Most Malware is a modification of previous Malware data. The datasets used from CIC-MalMem-2022 are Benign and Spyware-CWS. This study used the Naïv…

Edition
-
ISBN/ISSN
-
Collation
xiv, 52 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1120812023
Availability1
Add to basket
View DetailCite
cover
CLUSTERING ANDROID MALWARE BERDASARKAN FREKUENSI SYSTEM CALL MENGGUNAKAN K-MEANS
Badrus, Muhammad Zufar

In the security sector, malware that specifically attacks smartphones is growing faster and more sophisticated. Malware is becoming more and more powerful in carrying out criminal acts, such as ste…

Edition
-
ISBN/ISSN
-
Collation
xiv, 52 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T828612022
Availability1
Add to basket
View DetailCite
cover
DETEKSI ANOMALI FILE PDF MALWARE PADA LAYANAN AGREGATOR GARBA RUJUKAN DIGITAL…
Yuningsih, Novi

Portable Document Format (PDF) is a document exchange media that is very vulnerable to malicious attacks, namely Malware PDF. One of the services that most often use PDF files as a medium is a scie…

Edition
-
ISBN/ISSN
-
Collation
xvii, 84 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T850282022
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI PDF MALWARE PADA GARBA RUJUKAN DIGITAL (GARUDA) KEMDIKBUD DIKTI D…
Fidela, Alifah

The Portable Document Format (PDF) is one of the most commonly used document reader formats, the object structure in PDF is flexible and easy to use. Therefore, that hackers use PDFs to carry out t…

Edition
-
ISBN/ISSN
-
Collation
xiii, 47 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T863312022
Availability1
Add to basket
View DetailCite
cover
Membasmi Virus Komputer dan Android
Kurniawan Dedik

Virus, trojan, dan semua komplotannya meupakan program jahat yang selalu mempunyai tujuan untuk menghancurkan, merusak data serta sistem komputer dan Android yang kita miliki. Virus tidak pernah p…

Edition
-
ISBN/ISSN
978-623-00-1696-7
Collation
viii, 226 hlm
Series Title
-
Call Number
005.84 Kur m
Availability3
Add to basket
View DetailCite
cover
Malware Analysis and Detection Engineering : A Comprehensive Approach to Dete…
Mohanta, AbhijitSaldanha, Anoop

Edition
1
ISBN/ISSN
978-1-4842-6129-7
Collation
iii, 948 hlm, 24 cm
Series Title
-
Call Number
005.84 Moh m

Edition
1
ISBN/ISSN
978-1-4842-6129-7
Collation
iii, 948 hlm, 24 cm
Series Title
-
Call Number
005.84 Moh m
Availability2
Add to basket
View DetailCite
cover
Malware Analysis Using Artificial Intelligence and Deep Learning
Stamp, MarkAlazab,Mamoun

Edition
1
ISBN/ISSN
978-3-030-62581-8
Collation
xx, 651 hlm; 24 cm
Series Title
-
Call Number
005.84 Sta m

Edition
1
ISBN/ISSN
978-3-030-62581-8
Collation
xx, 651 hlm; 24 cm
Series Title
-
Call Number
005.84 Sta m
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI MALWARE ADWARE PADA ANDROID MENGGUNAKAN METODE SUPPORT VEKTOR MAC…
Maulana, Padhli

The internet is a liaison between one electronic media and other electronic media quickly and accurately in acommunication network. Where the communication network sends information that is transmi…

Edition
-
ISBN/ISSN
-
Collation
xiii, 49 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T689982022
Availability1
Add to basket
View DetailCite
cover
VISUALISASI DAN KLASIFIKASI MALWARE MENGGUNAKAN METODE K-NEAREST NEIGHBOR
Hafiz, Meidi Dwi

Visualization is a method used to represent data in the form of an image to display hidden information. The visualization in this study uses malware data to be converted into a grayscale image. Thi…

Edition
-
ISBN/ISSN
-
Collation
xiii, 37 hlm,:ilus.; 29 cm
Series Title
-
Call Number
T399182021
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI ADWARE MALWARE PADA ANDROID DENGAN METODE RANDOM FOREST
Hardianto, Novit

The development of technology triggers the development of malicious files called malware. Malware is software that is explicitly designed with the aim of finding weaknesses or even damaging softwar…

Edition
-
ISBN/ISSN
-
Collation
xi, 53 hlm. : ilus. ; 29 cm
Series Title
-
Call Number
T395222021
Availability1
Add to basket
View DetailCite
cover
PENGENALAN POLA SERANGAN SLOW HTTP DOS DENGAN MENGGUNAKAN METODE REGULAR EXPR…
Diah, Komariah

Slow http dos attack is one of the DoS attack methods targeting HTTP servers. This method hampers the service by flooding it causing a pool of connections with slow and heavy requests to the web se…

Edition
-
ISBN/ISSN
-
Collation
xiii, 57 hlm,: ilus.; 29 cm
Series Title
-
Call Number
005.840 7
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI MALWARE RANSOMWARE BERBASIS TEKNIK SELEKSI FITUR DENGAN ALGORITMA…
Perdana, Tata Satria Timor

Malware adalah sebuah perangkat lunak yang dibuat dengan tujuan memasuki dan terkadang merusak sistem komputer, jaringan, ataupun server tanpa diketahui oleh pemiliknya, Ransomware merupakan jenis …

Edition
-
ISBN/ISSN
-
Collation
xiv, 67 hlm,:ilus.; 29 cm
Series Title
-
Call Number
T560682021
Availability1
Add to basket
View DetailCite
1 2 Next Last Page

Search Result

Found 51 from your keywords: Subject : "Malware"
Query took 0.00241 second(s) to complete
XML ResultJSON Result

Suggestion
image
FAKTOR- FAKTOR YANG MEMPENGARUHI PERTIMBANGAN PEMERIKSAAN PAJAK OLEH FISKUS DI KANTOR PELAYANAN PAJAK DI PALEMBANG
Palira, Septi Zhumi
image
Experimentation in Biology : An Introduction to Design and Analysis
Ridgman, W. J
image
STRATEGI DIPLOMASI ENERGI CHINA MELALUI DIPLOMASI ENERGI DENGAN NIGERIA TAHUN 2018-2022
Ramadhani, Suci
image
West's BANKRUPTCY REPORTER; A Unit of the National Reporter System Volume 282
West Group
image
SOURCES OF IGNITION: Flammability Characteristics of Chemicals and Products
Bond, John
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search