{"dcterms:modified":"2023-10-06","dcterms:creator":"A Dataverse Instance","@type":"ore:ResourceMap","@id":"https://dataverse.telkomuniversity.ac.id/api/datasets/export?exporter=OAI_ORE&persistentId=doi:10.34820/FK2/RFBEE1","ore:describes":{"Deposit Date":"2022-04-13","Subject":"Computer and Information Science","Title":"Data Perbandingan Penggunaan Memori pada Fork Bomb Attack","citation:Depositor":"ALMAARIF, AHMAD","Author":{"author:Name":"ALMAARIF, AHMAD","author:Affiliation":"Fakultas Rekayasa Industri - Enterprise and Industrial System"},"citation:Description":{"dsDescription:Text":"Data Perbandingan Penggunaan Memori pada Fork Bomb Attack"},"Related Publication":{"Citation":"Efendy, R. A., Almaarif, A., Budiono, A., Saputra, M., Puspitasari, W., & Sutoyo, E. (2019, November). Exploring the possibility of usb based fork bomb attack on windows environment. In 2019 International Conference on ICT for Smart Society (ICISS) (Vol. 7, pp. 1-4). IEEE."},"citation:Contact":{"datasetContact:Name":"ALMAARIF, AHMAD","datasetContact:Affiliation":"Fakultas Rekayasa Industri - Enterprise and Industrial System","datasetContact:E-mail":"ahmadalmaarif@telkomuniversity.ac.id"},"@id":"doi:10.34820/FK2/RFBEE1","@type":["ore:Aggregation","schema:Dataset"],"schema:version":"1.0","schema:datePublished":"2023-10-05","schema:name":"Data Perbandingan Penggunaan Memori pada Fork Bomb Attack","schema:dateModified":"Thu Oct 05 14:19:33 WIB 2023","schema:license":"https://creativecommons.org/publicdomain/zero/1.0/","dvcore:fileTermsOfAccess":{"dvcore:fileRequestAccess":false},"schema:includedInDataCatalog":"AHMAD ALMAARIF Dataverse","ore:aggregates":[{"schema:name":"Data Perbandingan Penggunaan Memori.docx","dvcore:restricted":false,"schema:version":1,"dvcore:datasetVersionId":382,"@id":"doi:10.34820/FK2/RFBEE1/HQLUIE","schema:sameAs":"https://dataverse.telkomuniversity.ac.id/api/access/datafile/:persistentId?persistentId=doi:10.34820/FK2/RFBEE1/HQLUIE","@type":"ore:AggregatedResource","schema:fileFormat":"application/vnd.openxmlformats-officedocument.wordprocessingml.document","dvcore:filesize":26720,"dvcore:storageIdentifier":"file://18022310e09-c0106b0b0223","dvcore:rootDataFileId":-1,"dvcore:checksum":{"@type":"MD5","@value":"cb78c063ec6ee0e839c8c35e8c54a9ea"}}],"schema:hasPart":["doi:10.34820/FK2/RFBEE1/HQLUIE"]},"@context":{"Author":"http://purl.org/dc/terms/creator","Citation":"http://purl.org/dc/terms/bibliographicCitation","Deposit Date":"http://purl.org/dc/terms/dateSubmitted","Related Publication":"http://purl.org/dc/terms/isReferencedBy","Subject":"http://purl.org/dc/terms/subject","Title":"http://purl.org/dc/terms/title","author":"https://dataverse.org/schema/citation/author#","citation":"https://dataverse.org/schema/citation/","datasetContact":"https://dataverse.org/schema/citation/datasetContact#","dcterms":"http://purl.org/dc/terms/","dsDescription":"https://dataverse.org/schema/citation/dsDescription#","dvcore":"https://dataverse.org/schema/core#","ore":"http://www.openarchives.org/ore/terms/","schema":"http://schema.org/"}}