idsecconf, profile picture

idsecconf

Sort by
IDSECCONF2024 Capture The FLag Write up - 3 MAS MAS
IDSECCONF2024 - Rifqi Hilmy Zhafrant - Hunting and Exploiting GraphQL Vulnerability for Phun and Profit.pdf
IDSECCONF2024 - Arief Karfianto - AI-Enhanced Security Analysis in Requirement Engineering.pdf
IDSECCONF2024 - Ryan Fabella, Daniel Dhaniswara - Keamanan Siber Pada Kendaraan Listrik-Studi Kasus Motor Listrik di Indonesia.pdf
IDSECCONF2024 - Angela Oryza - ITS Nabu-Platform Pelatihan Keamanan Siber dengan Mode Pelatihan Linear dan Adaptif.pdf
IDSECCONF2024 - Rama Tri Nanda - MQTT hacking, RCE in Smart Router.pdf
IDSECCONF2024 - Muhammad Dwison - The Implementation Of One Pixel Attack To Save Captcha From Deep Learning.pdf
IDSECCONF2024 - Kang Ali - Local LLM can Simulate Apt Malware With Jailbreak Prompt.pdf
IDSECCONF2024 - Brian Nasywa - Comparison of Quantum Key Distribution Protocols BB84, B92, and BBM92.pdf
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router via CWMP Communication using MITM Scenario.pdf
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure Automation in Emerging Red Team Operations.pdf
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection Engineering dalam Proses Threat Modeling di dalam Security Operation Center (SOC).pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Automated IOC Detection and Response through Seamless Orchestration.pdf