Charles Lim
Cited by
Cited by
Analysis of machine learning techniques used in behavior-based malware detection
I Firdausi, C Lim, A Erwin, AS Nugroho
Advances in Computing, Control and Telecommunication Technologies (ACT …, 2010
Toward cloud computing reference architecture: Cloud service management perspective
Y Amanatullah, C Lim, HP Ipung, A Juliandri
2013 International Conference on ICT for Smart Society (ICISS),, 1-4, 2013
Minecraft: A Game as an Education and Scientific Learning Tool
G Ekaputra, C Lim, IE Kho
The Information Systems International Conference 2013, 2013
Text classification techniques used to faciliate cyber terrorism investigation
DA Simanjuntak, C Lim, HP Ipung, AS Nugroho
Advances in Computing, Control and Telecommunication Technologies (ACT …, 2010
Enhancing Honeypot Deception Capability Through Network Service Fingerprinting
R Dahbul, C Lim, J Purnama
1st International Conference on Computing and Applied Informatics (ICCAI 2016), 2016
Information Security Maturity Model – A Best Practice Driven Approach to PCI DSS Compliance
S Yulianto, C Lim, B Soewito
2016 IEEE Region 10 Symposium (TENSYMP), 65-70, 2016
A Comparison of International Information Security Regulations
J Johnson, SJ Lincke, R Imhof, C Lim
Interdisciplinary Journal of Information, Knowledge, and Management 9, 89-116, 2014
Mal-ONE: A Unified Framework for Fast and Efficient Malware Detection
C Lim, K Ramli
2014 2nd International Conference on Technology, Informatics, Management …, 2014
Mal-Flux: Rendering hidden code of packed binary executable
C Lim, Suryadi, K Ramli, YS Kotualubun
Digital Investigation 28, 83-95, 2019
Development of Distributed Honeypot Using Raspberry Pi
C Lim, M Marcello, A Japar, J Tommy, IE Kho
2014 International Conference on Information, Communication Technology and …, 2014
A Comparative Study of Behavior Analysis Sandboxes in Malware Detection
JT Juwono, C Lim, A Erwin
2015 3rd International Conference on New Media (CONMEDIA), 2015
XT-Pot: eXposing Threat Category of Honeypot-based attacks
Ryandy, C Lim, KE Silaen
The International Conference on Engineering and Information Technology for …, 2020
Risk analysis and comparative study of the different cloud computing providers in Indonesia
C Lim, A Suparman
2012 International Conference on Cloud Computing and Social Networking …, 2012
Evaluation of fingerprint orientation field correction methods
AAK Surya, AS Nugroho, C Lim
2011 International Conference on Advanced Computer Science and Information …, 2011
Implementation of intelligent searching using self-organizing map for webmining used in document containing information in relation to cyber terrorism
Endy, C Lim, KI Eng, AS Nugroho
Advances in Computing, Control and Telecommunication Technologies (ACT …, 2010
XB-Pot: Revealing Honeypot-based Attacker’s Behaviors
R Djap, C Lim, KE Silaen, A Yusuf
2021 9th International Conference on Information and Communication …, 2021
Mal-EVE: Static detection model for evasive malware
C Lim, Nicsen
2015 10th International Conference on Communications and Networking in China …, 2015
Detecting Network Security Threats Using Domain Name System and NetFlow Traffic
R Hananto, C Lim, HP Ipung
2018 the 2nd International Conference on Cryptography, Security and Privacy …, 2018
Analysis of Educational Institution DNS Network Traffic for Insider Threats
K Santosa, C Lim, A Erwin
The 2016 International Conference on Computer, Control, Informatics and its …, 2016
Forensics Analysis of Corporate and Personal Information Remaining on Hard Disk Drives Sold on the Secondhand Market in Indonesia
C Lim, I Firdausi, A Bresnev
Advanced Science Letters 20 (2), 2014
The system can't perform the operation now. Try again later.
Articles 1–20