{"id":5988,"identifier":"FK2/RFBEE1","persistentUrl":"https://doi.org/10.34820/FK2/RFBEE1","protocol":"doi","authority":"10.34820","publisher":"Telkom University Dataverse","publicationDate":"2023-10-05","storageIdentifier":"file://10.34820/FK2/RFBEE1","datasetVersion":{"id":382,"datasetId":5988,"datasetPersistentId":"doi:10.34820/FK2/RFBEE1","storageIdentifier":"file://10.34820/FK2/RFBEE1","versionNumber":1,"versionMinorNumber":0,"versionState":"RELEASED","lastUpdateTime":"2023-10-05T07:19:33Z","releaseTime":"2023-10-05T07:19:33Z","createTime":"2022-04-13T09:11:26Z","license":"CC0","termsOfUse":"CC0 Waiver","fileAccessRequest":false,"metadataBlocks":{"citation":{"displayName":"Citation Metadata","fields":[{"typeName":"title","multiple":false,"typeClass":"primitive","value":"Data Perbandingan Penggunaan Memori pada Fork Bomb Attack"},{"typeName":"author","multiple":true,"typeClass":"compound","value":[{"authorName":{"typeName":"authorName","multiple":false,"typeClass":"primitive","value":"ALMAARIF, AHMAD"},"authorAffiliation":{"typeName":"authorAffiliation","multiple":false,"typeClass":"primitive","value":"Fakultas Rekayasa Industri - Enterprise and Industrial System"}}]},{"typeName":"datasetContact","multiple":true,"typeClass":"compound","value":[{"datasetContactName":{"typeName":"datasetContactName","multiple":false,"typeClass":"primitive","value":"ALMAARIF, AHMAD"},"datasetContactAffiliation":{"typeName":"datasetContactAffiliation","multiple":false,"typeClass":"primitive","value":"Fakultas Rekayasa Industri - Enterprise and Industrial System"},"datasetContactEmail":{"typeName":"datasetContactEmail","multiple":false,"typeClass":"primitive","value":"ahmadalmaarif@telkomuniversity.ac.id"}}]},{"typeName":"dsDescription","multiple":true,"typeClass":"compound","value":[{"dsDescriptionValue":{"typeName":"dsDescriptionValue","multiple":false,"typeClass":"primitive","value":"Data Perbandingan Penggunaan Memori pada Fork Bomb Attack"}}]},{"typeName":"subject","multiple":true,"typeClass":"controlledVocabulary","value":["Computer and Information Science"]},{"typeName":"publication","multiple":true,"typeClass":"compound","value":[{"publicationCitation":{"typeName":"publicationCitation","multiple":false,"typeClass":"primitive","value":"Efendy, R. A., Almaarif, A., Budiono, A., Saputra, M., Puspitasari, W., & Sutoyo, E. (2019, November). Exploring the possibility of usb based fork bomb attack on windows environment. In 2019 International Conference on ICT for Smart Society (ICISS) (Vol. 7, pp. 1-4). IEEE."}}]},{"typeName":"depositor","multiple":false,"typeClass":"primitive","value":"ALMAARIF, AHMAD"},{"typeName":"dateOfDeposit","multiple":false,"typeClass":"primitive","value":"2022-04-13"}]}},"files":[{"label":"Data Perbandingan Penggunaan Memori.docx","restricted":false,"version":1,"datasetVersionId":382,"dataFile":{"id":5989,"persistentId":"doi:10.34820/FK2/RFBEE1/HQLUIE","pidURL":"https://doi.org/10.34820/FK2/RFBEE1/HQLUIE","filename":"Data Perbandingan Penggunaan Memori.docx","contentType":"application/vnd.openxmlformats-officedocument.wordprocessingml.document","filesize":26720,"storageIdentifier":"file://18022310e09-c0106b0b0223","rootDataFileId":-1,"md5":"cb78c063ec6ee0e839c8c35e8c54a9ea","checksum":{"type":"MD5","value":"cb78c063ec6ee0e839c8c35e8c54a9ea"},"creationDate":"2022-04-13"}}],"citation":"ALMAARIF, AHMAD, 2023, \"Data Perbandingan Penggunaan Memori pada Fork Bomb Attack\", https://doi.org/10.34820/FK2/RFBEE1, Telkom University Dataverse, V1"}}