<?xml version='1.0' encoding='UTF-8'?><metadata xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns="http://dublincore.org/documents/dcmi-terms/"><dcterms:title>Data Perbandingan Penggunaan Memori pada Fork Bomb Attack</dcterms:title><dcterms:identifier>https://doi.org/10.34820/FK2/RFBEE1</dcterms:identifier><dcterms:creator>ALMAARIF, AHMAD</dcterms:creator><dcterms:publisher>Telkom University Dataverse</dcterms:publisher><dcterms:issued>2023-10-05</dcterms:issued><dcterms:modified>2023-10-05T07:19:33Z</dcterms:modified><dcterms:description>Data Perbandingan Penggunaan Memori pada Fork Bomb Attack</dcterms:description><dcterms:subject>Computer and Information Science</dcterms:subject><dcterms:isReferencedBy>Efendy, R. A., Almaarif, A., Budiono, A., Saputra, M., Puspitasari, W., &amp; Sutoyo, E. (2019, November). Exploring the possibility of usb based fork bomb attack on windows environment. In 2019 International Conference on ICT for Smart Society (ICISS) (Vol. 7, pp. 1-4). IEEE.</dcterms:isReferencedBy><dcterms:contributor>ALMAARIF, AHMAD</dcterms:contributor><dcterms:dateSubmitted>2022-04-13</dcterms:dateSubmitted><dcterms:license>CC0</dcterms:license><dcterms:rights>CC0 Waiver</dcterms:rights></metadata>