Follow
Charles Lim
Title
Cited by
Cited by
Year
Analysis of machine learning techniques used in behavior-based malware detection
I Firdausi, C Lim, A Erwin, AS Nugroho
Advances in Computing, Control and Telecommunication Technologies (ACT …, 2010
4752010
Minecraft: A Game as an Education and Scientific Learning Tool
G Ekaputra, C Lim, IE Kho
The Information Systems International Conference 2013, 2013
1122013
Toward cloud computing reference architecture: Cloud service management perspective
Y Amanatullah, C Lim, HP Ipung, A Juliandri
2013 International Conference on ICT for Smart Society (ICISS),, 1-4, 2013
1102013
Text classification techniques used to faciliate cyber terrorism investigation
DA Simanjuntak, C Lim, HP Ipung, AS Nugroho
Advances in Computing, Control and Telecommunication Technologies (ACT …, 2010
502010
Enhancing Honeypot Deception Capability Through Network Service Fingerprinting
R Dahbul, C Lim, J Purnama
1st International Conference on Computing and Applied Informatics (ICCAI 2016), 2016
462016
Information Security Maturity Model – A Best Practice Driven Approach to PCI DSS Compliance
S Yulianto, C Lim, B Soewito
2016 IEEE Region 10 Symposium (TENSYMP), 65-70, 2016
392016
A Comparison of International Information Security Regulations
J Johnson, SJ Lincke, R Imhof, C Lim
Interdisciplinary Journal of Information, Knowledge, and Management 9, 89-116, 2014
262014
Mapping Linux Shell Commands to MITRE ATT&CK using NLP-Based Approach
Y Andrew, C Lim, E Budiarto
The 4th International Conference on Electrical Engineering and Informatics …, 2022
202022
Mal-Flux: Rendering hidden code of packed binary executable
C Lim, Suryadi, K Ramli, YS Kotualubun
Digital Investigation 28, 83-95, 2019
192019
A Comparative Study of Behavior Analysis Sandboxes in Malware Detection
JT Juwono, C Lim, A Erwin
2015 3rd International Conference on New Media (CONMEDIA), 2015
172015
Mal-ONE: A Unified Framework for Fast and Efficient Malware Detection
C Lim, K Ramli
2014 2nd International Conference on Technology, Informatics, Management …, 2014
172014
XB-Pot: Revealing Honeypot-based Attacker’s Behaviors
R Djap, C Lim, KE Silaen, A Yusuf
2021 9th International Conference on Information and Communication …, 2021
152021
XT-Pot: eXposing Threat Category of Honeypot-based attacks
Ryandy, C Lim, KE Silaen
The International Conference on Engineering and Information Technology for …, 2020
152020
Development of Distributed Honeypot Using Raspberry Pi
C Lim, M Marcello, A Japar, J Tommy, IE Kho
2014 International Conference on Information, Communication Technology and …, 2014
122014
Risk analysis and comparative study of the different cloud computing providers in Indonesia
C Lim, A Suparman
2012 International Conference on Cloud Computing and Social Networking …, 2012
112012
Evaluation of fingerprint orientation field correction methods
AAK Surya, AS Nugroho, C Lim
2011 International Conference on Advanced Computer Science and Information …, 2011
92011
Implementation of intelligent searching using self-organizing map for webmining used in document containing information in relation to cyber terrorism
Endy, C Lim, KI Eng, AS Nugroho
Advances in Computing, Control and Telecommunication Technologies (ACT …, 2010
92010
Mapping Threats in Smart Grid System Using the MITRE ATT&CK ICS Framework
AB Izzuddin, C Lim
2022 IEEE International Conference on Aerospace Electronics and Remote …, 2022
82022
Forensics Analysis of Corporate and Personal Information Remaining on Hard Disk Drives Sold on the Secondhand Market in Indonesia
C Lim, I Firdausi, A Bresnev
Advanced Science Letters 20 (2), 2014
82014
Detecting Network Security Threats Using Domain Name System and NetFlow Traffic
R Hananto, C Lim, HP Ipung
2018 the 2nd International Conference on Cryptography, Security and Privacy …, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20