Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Tugas Sistem Operasi
Program Jahat atau Malware dan Jenisnya
YUNITA WIJAYANTI (12166334)
AMIK BSI Yogyakarta
    • by 
    •   3  
      Sistem OperasiTugas Sistem OperasiMalicious Software
    • by 
    • Malicious Software
TUGAS SISTEM OPERASI
PROGRAM-PROGRAM JAHAT "Malware"
Della Tiara (12164536)
AMIK BSI YOGYAKARTA
    • by 
    •   3  
      Sistem OperasiTugas Sistem OperasiMalicious Software
Due to rapid changes and consequent new threats to computer networks there is a need for the design of systems that enhance network security. These systems make network administrators fully aware of the potential vulnerability of their... more
    • by  and +1
    •   4  
      Network SecurityComputer NetworksWiresharkMalicious Software
College understudies are overwhelming clients of the Internet contrasted with the overall public, and they assume a pivotal part in securing the Internet, and assurance of PCs is left to the activity of the clients.The main aim of the... more
    • by  and +1
    •   11  
      Internet SecurityComputer SecuritySocial Networking Sites (SNS)Social Network Sites
The attackers do not want their Malicious software (or malwares) to be reviled by anti-virus analyzer. In order to conceal their malware, malware programmers are getting utilize the anti reverse engineering techniques and code changing... more
    • by 
    • Malicious Software
Tugas Sistem Operasi
Program Jahat Atau Malware dan Jenisnya
RENDY OKTA SAPUTRA (12160321)
AMIK BSI Yogyakarta
    • by 
    •   3  
      Sistem OperasiTugas Sistem OperasiMalicious Software
    • by 
    •   4  
      Philosophy of TechnologyMalware AnalysisMalicious SoftwareMiscomputation
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser’s host machine and user. In this paper we attempt to quantify the threat of browsers being indirectly misused for attacking third... more
    • by 
    •   4  
      SecurityMeasurementWeb SecurityMalicious Software
In the computational world all kind of communication is now using USB as it is globally recognized hardware standard of communication. Removable devices are very useful portable storage devices which are generally used for transferring... more
    • by 
    •   3  
      VirusText-based passwordsMalicious Software
In this digital world, security is the primary concern for users concerned about unauthorised access to their computer systems. At the same time, ransomware – a tool used by cyber criminals to encrypt the contents of a computer's file... more
    • by 
    •   3  
      Fraud Detection And PreventionMalicious SoftwareRansomware attack
—RecDroid is a smartphone permission management system which provides users with a fine-grained real-time app permission control and a recommendation system regarding whether to grant the permission or not based on expert users' responses... more
    • by 
    •   32  
      Electrical EngineeringComputer ScienceInformation SecurityComputer Engineering
    • by 
    •   6  
      SecurityNetworkComputer VirusesWorms
Tugas Sistem Operasi
Program Jahat atau Malware dan Jenisnya
ASTIANA DIAH AGUSTIANI (12162034)
AMIK BSI Yogyakarta
    • by 
    •   3  
      Sistem OperasiTugas Sistem OperasiMalicious Software
Malicious software is a kind of software or codes which took some: private data, information from the PC framework, its tasks is to do only malicious objectives to the PC framework, without authorization of the PC clients. The effect of... more
    • by 
    •   3  
      Malicious SoftwareHeuristics based AutomationSignature-Based Detection
Many countries around the world are implementing smart grids and smart meters. Malicious users that have moderate level of computer knowledge can manipulate smart meters and launch cyber-attacks. This poses cyber threats to network... more
    • by 
    •   5  
      SecuritySupport Vector MachinesAttacksSmart Grid Networks
This paper explains security intelligence and how corporations use it to maintain the security of information systems by analysis of malicious content. Most famous threats to corporate information systems and departments that fight... more
    • by  and +1
    •   3  
      Information SecurityCybercrimesMalicious Software