{"id":5370,"identifier":"FK2/D2MFX0","persistentUrl":"https://doi.org/10.34820/FK2/D2MFX0","protocol":"doi","authority":"10.34820","publisher":"Telkom University Dataverse","publicationDate":"2023-10-05","storageIdentifier":"file://10.34820/FK2/D2MFX0","datasetVersion":{"id":332,"datasetId":5370,"datasetPersistentId":"doi:10.34820/FK2/D2MFX0","storageIdentifier":"file://10.34820/FK2/D2MFX0","versionNumber":1,"versionMinorNumber":0,"versionState":"RELEASED","lastUpdateTime":"2023-10-05T07:22:04Z","releaseTime":"2023-10-05T07:22:04Z","createTime":"2022-04-11T08:32:49Z","license":"CC0","termsOfUse":"CC0 Waiver","fileAccessRequest":false,"metadataBlocks":{"citation":{"displayName":"Citation Metadata","fields":[{"typeName":"title","multiple":false,"typeClass":"primitive","value":"Replication Data for: Acquaintance Management Algorithm Based on the Multi\u0002Class Risk-Cost Analysis for Collaborative Intrusion  Detection Network"},{"typeName":"author","multiple":true,"typeClass":"compound","value":[{"authorName":{"typeName":"authorName","multiple":false,"typeClass":"primitive","value":"PURWANTO, YUDHA"},"authorAffiliation":{"typeName":"authorAffiliation","multiple":false,"typeClass":"primitive","value":"Telkom University"},"authorIdentifierScheme":{"typeName":"authorIdentifierScheme","multiple":false,"typeClass":"controlledVocabulary","value":"ORCID"}}]},{"typeName":"datasetContact","multiple":true,"typeClass":"compound","value":[{"datasetContactName":{"typeName":"datasetContactName","multiple":false,"typeClass":"primitive","value":"PURWANTO, YUDHA"},"datasetContactAffiliation":{"typeName":"datasetContactAffiliation","multiple":false,"typeClass":"primitive","value":"Telkom University"},"datasetContactEmail":{"typeName":"datasetContactEmail","multiple":false,"typeClass":"primitive","value":"omyudha@telkomuniversity.ac.id"}}]},{"typeName":"dsDescription","multiple":true,"typeClass":"compound","value":[{"dsDescriptionValue":{"typeName":"dsDescriptionValue","multiple":false,"typeClass":"primitive","value":"A collaborative intrusion detection system"},"dsDescriptionDate":{"typeName":"dsDescriptionDate","multiple":false,"typeClass":"primitive","value":"2021-01-29"}}]},{"typeName":"subject","multiple":true,"typeClass":"controlledVocabulary","value":["Engineering"]},{"typeName":"depositor","multiple":false,"typeClass":"primitive","value":"PURWANTO, YUDHA"},{"typeName":"dateOfDeposit","multiple":false,"typeClass":"primitive","value":"2022-04-11"}]}},"files":[{"label":"13322-Article Text-55940-4-10-20220117.pdf","restricted":false,"version":1,"datasetVersionId":332,"dataFile":{"id":5371,"persistentId":"doi:10.34820/FK2/D2MFX0/MDQRO5","pidURL":"https://doi.org/10.34820/FK2/D2MFX0/MDQRO5","filename":"13322-Article Text-55940-4-10-20220117.pdf","contentType":"application/pdf","filesize":2666526,"storageIdentifier":"file://18017bf9901-c57ff69e3c39","rootDataFileId":-1,"md5":"005b1fdb99e4499148656282a7eddde6","checksum":{"type":"MD5","value":"005b1fdb99e4499148656282a7eddde6"},"creationDate":"2022-04-11"}}],"citation":"PURWANTO, YUDHA, 2023, \"Replication Data for: Acquaintance Management Algorithm Based on the Multi\u0002Class Risk-Cost Analysis for Collaborative Intrusion Detection Network\", https://doi.org/10.34820/FK2/D2MFX0, Telkom University Dataverse, V1"}}