idsecconf, profile picture

idsecconf

Sort by
IDSECCONF2025 - Ali - DursGo–Web Security Scanner with AI Analysis.pdf
IDSECCONF2025 - Obrina Briliyant, Hendra Rudiansyah - Network Packet Security Analysis using SQL-RAG Approach and Cybersecurity-Tuned LLM.pdf
IDSECCONF2025 - Budi Rahardjo - Cyber Security and AI.pdf
IDSECCONF2025 - Faisal Ilham - Semi Automating Vulnerability Scanner and Exploitation in Biometric Systems A Dual-Script Approach.pdf
IDSECCONF2025 - Baskoro Adi Pratomo - Game untuk Pembelajaran Keamanan Siber.pdf
IDSECCONF2025 - Aan Wahyu - Maze–Malware Analysis Platform.pdf
IDSECCONF2025 - Nosa Shandy - Discovering and Disclosing Privacy Vulnerabilities in Large-Scale Social Media Platforms–Methodology, Impact, and Case Studies.pdf
IDSECCONF2025 - Rama Tri Nanda - Hunting Stingray GSM on Budget.pdf
IDSECCONF2024 Capture The FLag Write up - 3 MAS MAS
IDSECCONF2024 - Rifqi Hilmy Zhafrant - Hunting and Exploiting GraphQL Vulnerability for Phun and Profit.pdf
IDSECCONF2024 - Arief Karfianto - AI-Enhanced Security Analysis in Requirement Engineering.pdf
IDSECCONF2024 - Ryan Fabella, Daniel Dhaniswara - Keamanan Siber Pada Kendaraan Listrik-Studi Kasus Motor Listrik di Indonesia.pdf
IDSECCONF2024 - Angela Oryza - ITS Nabu-Platform Pelatihan Keamanan Siber dengan Mode Pelatihan Linear dan Adaptif.pdf
IDSECCONF2024 - Rama Tri Nanda - MQTT hacking, RCE in Smart Router.pdf