关注
Kalpin Erlangga Silaen
Kalpin Erlangga Silaen
在 student.sgu.ac.id 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Xt-pot: Exposing threat category of honeypot-based attacks
Ryandy, C Lim, KE Silaen
Proceedings of the 2020 International Conference on Engineering and …, 2020
152020
Xb-pot: Revealing honeypot-based attacker’s behaviors
R Djap, C Lim, KE Silaen, A Yusuf
2021 9th International Conference on Information and Communication …, 2021
142021
A novel countermeasure to prevent XMLRPC WordPress attack
KE Silaen, C Lim
2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016
42016
Hunting Cyber Threats in the Enterprise Using Network Defense Log
A Oktadika, C Lim, K Erlangga
2021 9th International Conference on Information and Communication …, 2021
32021
KawalPilpres2019: a highly secured real count voting escort architecture
OW Purbo, G Deograt, R Satriyanto, A Ferdinand, P Gesang, R Kesuma, ...
TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (6 …, 2019
32019
Managing Risks of Managed Webhosting Outsourcing
KE Silaen, MA Soetomo
ACMIT Proceedings 3 (1), 56-66, 2016
12016
Usefulness of Honeypots Towards Data Security: A Systematic Literature Review
KE Silaen, M Meyliana, HLHS Warnars, H Prabowo, AN Hidayanto, ...
2023 International Workshop on Artificial Intelligence and Image Processing …, 2023
2023
Malicious traffic analysis using Markov chain
R Djap, C Lim, KE Silaen
Proceedings of the 2022 International Conference on Engineering and …, 2022
2022
Log Analytics System for Web Attack Detection
AZ Awaludin, C Lim, KE Silaen
Swiss German University, 2021
2021
XT-Pot: eXposing Threat Category of Honeypot-based attacks.
R Djap, C Lim, KE Silaen
ICONETSI, 31:1-31:6, 2020
2020
Actionable Threat Intelligence Generation Based on Darknet Traffic Analysis
R Ryandy, C Lim, KE Silaen
Swiss German University, 2020
2020
Implementasi Zero Knowledge Proof Sebagai Proses Autentikasi Dengan Metode Guillou-Quisquater
K Kusnardi
Universitas Multimedia Nusantara, 2017
2017
Turning Legal Website Into Distributed Denial of Service Tools
KE Silaen, B Soewito, C Lim
Swiss German University, 2016
2016
系统目前无法执行此操作,请稍后再试。
文章 1–13