Follow
Charles Lim
Title
Cited by
Cited by
Year
Analysis of machine learning techniques used in behavior-based malware detection
I Firdausi, C Lim, A Erwin, AS Nugroho
Advances in Computing, Control and Telecommunication Technologies (ACT …, 2010
4292010
Toward cloud computing reference architecture: Cloud service management perspective
Y Amanatullah, C Lim, HP Ipung, A Juliandri
2013 International Conference on ICT for Smart Society (ICISS),, 1-4, 2013
1042013
Minecraft: A Game as an Education and Scientific Learning Tool
G Ekaputra, C Lim, IE Kho
The Information Systems International Conference 2013, 2013
952013
Text classification techniques used to faciliate cyber terrorism investigation
DA Simanjuntak, C Lim, HP Ipung, AS Nugroho
Advances in Computing, Control and Telecommunication Technologies (ACT …, 2010
482010
Enhancing Honeypot Deception Capability Through Network Service Fingerprinting
R Dahbul, C Lim, J Purnama
1st International Conference on Computing and Applied Informatics (ICCAI 2016), 2016
392016
Information Security Maturity Model – A Best Practice Driven Approach to PCI DSS Compliance
S Yulianto, C Lim, B Soewito
2016 IEEE Region 10 Symposium (TENSYMP), 65-70, 2016
302016
A Comparison of International Information Security Regulations
J Johnson, SJ Lincke, R Imhof, C Lim
Interdisciplinary Journal of Information, Knowledge, and Management 9, 89-116, 2014
242014
Mal-Flux: Rendering hidden code of packed binary executable
C Lim, Suryadi, K Ramli, YS Kotualubun
Digital Investigation 28, 83-95, 2019
152019
Mal-ONE: A Unified Framework for Fast and Efficient Malware Detection
C Lim, K Ramli
2014 2nd International Conference on Technology, Informatics, Management …, 2014
152014
XT-Pot: eXposing Threat Category of Honeypot-based attacks
Ryandy, C Lim, KE Silaen
The International Conference on Engineering and Information Technology for …, 2020
142020
A Comparative Study of Behavior Analysis Sandboxes in Malware Detection
JT Juwono, C Lim, A Erwin
2015 3rd International Conference on New Media (CONMEDIA), 2015
142015
XB-Pot: Revealing Honeypot-based Attacker’s Behaviors
R Djap, C Lim, KE Silaen, A Yusuf
2021 9th International Conference on Information and Communication …, 2021
132021
Development of Distributed Honeypot Using Raspberry Pi
C Lim, M Marcello, A Japar, J Tommy, IE Kho
2014 International Conference on Information, Communication Technology and …, 2014
132014
Mapping Linux Shell Commands to MITRE ATT&CK using NLP-Based Approach
Y Andrew, C Lim, E Budiarto
The 4th International Conference on Electrical Engineering and Informatics …, 2022
112022
Risk analysis and comparative study of the different cloud computing providers in Indonesia
C Lim, A Suparman
2012 International Conference on Cloud Computing and Social Networking …, 2012
102012
Evaluation of fingerprint orientation field correction methods
AAK Surya, AS Nugroho, C Lim
2011 International Conference on Advanced Computer Science and Information …, 2011
92011
Implementation of intelligent searching using self-organizing map for webmining used in document containing information in relation to cyber terrorism
Endy, C Lim, KI Eng, AS Nugroho
Advances in Computing, Control and Telecommunication Technologies (ACT …, 2010
92010
Mal-EVE: Static detection model for evasive malware
C Lim, Nicsen
2015 10th International Conference on Communications and Networking in China …, 2015
72015
Forensics Analysis of Corporate and Personal Information Remaining on Hard Disk Drives Sold on the Secondhand Market in Indonesia
C Lim, I Firdausi, A Bresnev
Advanced Science Letters 20 (2), 2014
72014
Detecting Network Security Threats Using Domain Name System and NetFlow Traffic
R Hananto, C Lim, HP Ipung
2018 the 2nd International Conference on Cryptography, Security and Privacy …, 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20