Xb-pot: Revealing honeypot-based attacker’s behaviors R Djap, C Lim, KE Silaen, A Yusuf 2021 9th International Conference on Information and Communication …, 2021 | 17 | 2021 |
Xt-pot: Exposing threat category of honeypot-based attacks Ryandy, C Lim, KE Silaen Proceedings of the 2020 International Conference on Engineering and …, 2020 | 16 | 2020 |
Hunting Cyber Threats in the Enterprise Using Network Defense Log A Oktadika, C Lim, K Erlangga 2021 9th International Conference on Information and Communication …, 2021 | 4 | 2021 |
A novel countermeasure to prevent XMLRPC WordPress attack KE Silaen, C Lim 2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016 | 4 | 2016 |
KawalPilpres2019: a highly secured real count voting escort architecture OW Purbo, G Deograt, R Satriyanto, A Ferdinand, P Gesang, R Kesuma, ... TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (6 …, 2019 | 3 | 2019 |
ApiPot: A Novelty API Honeypot for Exhaustive Attack Feature Detection in HTTP Protocol KE Silaen, B Soewito, MS Anggreainy, A Kurniawan 2024 11th International Conference on Future Internet of Things and Cloud …, 2024 | 1 | 2024 |
Usefulness of Honeypots Towards Data Security: A Systematic Literature Review KE Silaen, M Meyliana, HLHS Warnars, H Prabowo, AN Hidayanto, ... 2023 International Workshop on Artificial Intelligence and Image Processing …, 2023 | 1 | 2023 |
Managing Risks of Managed Webhosting Outsourcing KE Silaen, MA Soetomo ACMIT Proceedings 3 (1), 56-66, 2016 | 1 | 2016 |
Enhancing Honeypot Realism: A Framework for Improved Cyber Threat Intelligence Through Dynamic Web Cloning I Choiri, C Lim, KE Silaen 2024 International Conference on Intelligent Cybernetics Technology …, 2024 | | 2024 |
Leveraging Honeypot to Uncover Attack Behaviors on Redis MJ Tendean, C Lim, KE Silaen 2024 International Conference on Intelligent Cybernetics Technology …, 2024 | | 2024 |
Threat Modeling for Honeypot Deployment KE Silaen, FL Gaol, SH Supangkat, B Ranti 2024 IEEE 10th Information Technology International Seminar (ITIS), 57-61, 2024 | | 2024 |
Malicious traffic analysis using Markov chain R Djap, C Lim, KE Silaen Proceedings of the 2022 International Conference on Engineering and …, 2022 | | 2022 |
Log Analytics System for Web Attack Detection AZ Awaludin, C Lim, KE Silaen Swiss German University, 2021 | | 2021 |
XT-Pot: eXposing Threat Category of Honeypot-based attacks. R Djap, C Lim, KE Silaen ICONETSI, 31:1-31:6, 2020 | | 2020 |
Actionable Threat Intelligence Generation Based on Darknet Traffic Analysis R Ryandy, C Lim, KE Silaen Swiss German University, 2020 | | 2020 |
Implementasi Zero Knowledge Proof Sebagai Proses Autentikasi Dengan Metode Guillou-Quisquater K Kusnardi Universitas Multimedia Nusantara, 2017 | | 2017 |
Turning Legal Website Into Distributed Denial of Service Tools KE Silaen, B Soewito, C Lim Swiss German University, 2016 | | 2016 |