XT-Pot: Exposing threat category of honeypot-based attacks Ryandy, C Lim, KE Silaen Proceedings of the 2021 International Conference on Engineering and …, 2020 | 14 | 2020 |
Xb-pot: Revealing honeypot-based attacker’s behaviors R Djap, C Lim, KE Silaen, A Yusuf 2021 9th International Conference on Information and Communication …, 2021 | 12 | 2021 |
A novel countermeasure to prevent XMLRPC WordPress attack KE Silaen, C Lim 2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016 | 4 | 2016 |
Hunting Cyber Threats in the Enterprise Using Network Defense Log A Oktadika, C Lim, K Erlangga 2021 9th International Conference on Information and Communication …, 2021 | 3 | 2021 |
KawalPilpres2019: a highly secured real count voting escort architecture OW Purbo, G Deograt, R Satriyanto, A Ferdinand, P Gesang, R Kesuma, ... TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (6 …, 2019 | 3 | 2019 |
Managing Risks of Managed Webhosting Outsourcing KE Silaen, MA Soetomo ACMIT Proceedings 3 (1), 56-66, 2016 | 1 | 2016 |
Malicious traffic analysis using Markov chain R Djap, C Lim, KE Silaen Proceedings of the 2022 International Conference on Engineering and …, 2022 | | 2022 |
Log Analytics System for Web Attack Detection AZ Awaludin, C Lim, KE Silaen Swiss German University, 2021 | | 2021 |
Actionable Threat Intelligence Generation Based on Darknet Traffic Analysis R Ryandy, C Lim, KE Silaen Swiss German University, 2020 | | 2020 |
Implementasi Zero Knowledge Proof Sebagai Proses Autentikasi Dengan Metode Guillou-Quisquater K Kusnardi Universitas Multimedia Nusantara, 2017 | | 2017 |
Turning Legal Website Into Distributed Denial of Service Tools KE Silaen, B Soewito, C Lim Swiss German University, 2016 | | 2016 |