[PDF][PDF] Detection of metasploit attacks using RAM Forensic on proprietary operating systems

DC Prakoso, I Riadi, Y Prayudi - Kinetik: Game Technology, Information …, 2020 - core.ac.uk
Information technology has become an essential thing in the digital era as it is today. With
the support of computer networks, information technology is used as a medium for …

Analisis Malware Aquvaprn. exe Untuk Investigasi Sistem Operasi Dengan Metode Memory Forensics

HN Aditya, N Widiyasono… - … Teknik Informatika dan …, 2024 - journal.maranatha.edu
In today's digital age, data has become a valuable asset. Various techniques are used to
steal personal data that could potentially be misused by irresponsible parties. The object …

[PDF][PDF] Malware Detection using Portable Executable Header and Gradient Boosting Classification Algorithm

LS Paza, TH Pudjiantoro, AI Hadiana - ieomsociety.org
The ever-increasing development of technology has created many loopholes for software
attackers to commit harmful crimes. Computer system users are vulnerable to malware …

Penerapan Memory Forensic Menggunakan Metode Live Forensic untuk Investigasi Random Access Memory

MN Rifkiansyah, RS Wibowo… - … Ilmu Komputer dan …, 2021 - conference.upnvj.ac.id
Memory forensic (terkadang disebut sebagai analisis memori) mengacu pada analisis data
volatile dalam dump sebuah memori komputer, memory forensic dibutuhkan untuk …