{"@context":"http://schema.org","@type":"Dataset","@id":"https://doi.org/10.34820/FK2/RFBEE1","identifier":"https://doi.org/10.34820/FK2/RFBEE1","name":"Data Perbandingan Penggunaan Memori pada Fork Bomb Attack","creator":[{"name":"ALMAARIF, AHMAD","affiliation":"Fakultas Rekayasa Industri - Enterprise and Industrial System"}],"author":[{"name":"ALMAARIF, AHMAD","affiliation":"Fakultas Rekayasa Industri - Enterprise and Industrial System"}],"datePublished":"2023-10-05","dateModified":"2023-10-05","version":"1","description":["Data Perbandingan Penggunaan Memori pada Fork Bomb Attack"],"keywords":["Computer and Information Science"],"citation":[{"@type":"CreativeWork","text":"Efendy, R. A., Almaarif, A., Budiono, A., Saputra, M., Puspitasari, W., &amp; Sutoyo, E. (2019, November). Exploring the possibility of usb based fork bomb attack on windows environment. In 2019 International Conference on ICT for Smart Society (ICISS) (Vol. 7, pp. 1-4). IEEE."}],"license":{"@type":"Dataset","text":"CC0","url":"https://creativecommons.org/publicdomain/zero/1.0/"},"includedInDataCatalog":{"@type":"DataCatalog","name":"Telkom University Dataverse","url":"https://dataverse.telkomuniversity.ac.id"},"publisher":{"@type":"Organization","name":"Telkom University Dataverse"},"provider":{"@type":"Organization","name":"Telkom University Dataverse"},"distribution":[{"@type":"DataDownload","name":"Data Perbandingan Penggunaan Memori.docx","fileFormat":"application/vnd.openxmlformats-officedocument.wordprocessingml.document","contentSize":26720,"@id":"https://doi.org/10.34820/FK2/RFBEE1/HQLUIE","identifier":"https://doi.org/10.34820/FK2/RFBEE1/HQLUIE","contentUrl":"https://dataverse.telkomuniversity.ac.id/api/access/datafile/5989"}]}