ICoCICs
  • Call for Paper
  • ICoCICs
    • Committees
    • Agenda
    • Parallel Session Schedule
    • Venue
    • Conference Materials
    • Previous Events
      • ICOCICS 2023
  • Guidelines
    • Author Guidelines
    • Reviewer Guidelines
    • Final Camera-Ready Guidelines
    • IEEE PDF Express Guideline
    • Policy
  • Registration & Payment
  • Contact

Parallel Session Schedule

22 Oct | Parallel Session 1
22 Oct | Parallel Session 2
23 Oct | Parallel Session 3
23 Oct | Parallel Session 4
22 Oct | Parallel Session 1

  • 22 Oct Parallel Session 1 | 13.00 – 15.00 WIB
13:00 – 15:00 Meeting Room A : Online

Parallel Session 1 | Session Chair : Dr. Eka Budiarto

1090 – RAG-Fusion Based Framework for Indonesian Hoax News Detection
Authors: Fadhil Dzaky Muhammad, Sy. Yuliani Yakub, Marlinda Vasty Overbeek and Fenina Adline Twince Tobing

1131 – Assessing The Generalization Capacity of Machine Learning Classifiers Against Resilient DGA Families
Authors: Rodi Fadhelar R, Yudhistira Nugraha and Muhamad Erza Aminanto

1267 – Comparative Analysis of CNN and BERT for English Fake News Detection Across Short and Long Texts
Authors: Jessica Setiawan Tjoe, Alexander Agung Santoso Gunawan and Rilo Chandra Pradana

1305 – Audio Deepfake Detection: Leveraging Deep Learning for Automatic Speaker Verification and Spoofing Prevention
Authors: Ferry Irwanto, Muhammad Farrell Hafizh Sasongko, Simen Ferdinand Djamhari and Alexander Agung Santoso Gunawan

2253 – Analyzing the Implementation Gaps in ISO/IEC 27001:2022 Controls: Insights from PDPC Singapore’s Cybersecurity Breaches
Authors: Jeremy Leonard Naramuda, Nathaniel Gillbert Sjaibani, Gary Wiliam Kurniadi and Diana Diana

2616 – Constructing and Analyzing Indonesian Privacy Policies: A Dataset for Privacy Research
Authors: Guntur Budi Herwanto, Kabul Kurniawan, Uha Isnaini, Bambang Nurcahyo Prastowo, Eka Putri and Sukma Hadi Wijaya

4442 – Machine Learning for DDoS Attack Detection in SDN: A Systematic Literature Review
Authors: Tirtadi Muchtar and Kusprasapta Mutijarsa

4692 – Hybrid Sequential Pattern Mining and Naive Bayes for Hoax Detection Using Indonesia’s News Outlet Dataset
Authors: Mohammad Alfarizky Ramadhani Oscandar and Sy Yuliani

Session Chair : Dr. Eka Budiarto Session Chair : Dr. Eka Budiarto
13:00 – 15:00 Meeting Room B : Offline

Parallel Session 1 | Session Chair : Dr. Prasetyo Adi Wibowo Putro

1885 – Optimizing Random Forest with Genetic Algorithm for Malware Detection Using PE Header Features
Authors: Agung Setiaji and Elisa Bahara Soritua

2233 – SiagaJakarta: An Agentic GeoAI Framework for Autonomous Geospatial Analysis of Emergency Services
Authors: Zakiul Jailani, Raden Bambang Syumanjaya, Raka Dimas Saputra and Haris Rafi

2509 – Machine Learning Models for Learning Focus Assessment: A Comparative Analysis at UNHAN RI
Authors: Nadiza Lediwara, Sembada Denrineksa Bimorogo, Aulia Khamas Heikmakhtiar, Aisyah Gusmi Putri Utami and Cheva Anggara Putra

3541 – Physical Tells Digital Threats: Supervised ML-IDS for Multimodal IoT Telemetry in Smart Buildings
Authors: Obrina Briliyant, Amir Javed, Yulia Cherdantseva and Septia Ulfa Sunaringtyas

3979 – Evaluating the Robustness of Mean Decrease Accuracy and Mean Decrease Gini in Random Forest Classification under Multicollinearity
Authors: Rahmi Fadhilah, Heri Kuswanto and Dedy Dwi Prastyo

7166 – Design of RFID and SHA-256 Based Access Control System for Monitoring and Accountability in Fuel Dispensing Process
Authors: Brian Nasywa Rayhan, Siti Manayra Sabiya, Faqih Rangga Wijaya and Dion Ogi

8954 – Optimized Duplicate Detection Using Smith-Waterman Algorithm with Sorted Neighborhood Method
Authors: Yusuf Lestanto and Rahma Mualifa

9508 – Implementation of Authentication Scheme to Provide User Anonymity on Telegram Chatbot-based Smart Home Environment Prototype
Authors: Ariska Allamanda, Fetty Amelia, Agus Reza Aristiadi Nurwa, Magfirawaty Magfirawaty and Arnoldus Triono

Session Chair : Prasetyo Adi W.P. Session Chair : Prasetyo Adi W.P.
13:00 – 15:00 Meeting Room C : Offline

Parallel Session 1 | Session Chair : Dr. Amiruddin

0115 – Evaluation of Web Security and Performance in PHP Frameworks: A Case Study of CodeIgniter 4 and Yii2
Authors: M. Dja’Far Karzein Hafidz Yuntanozra, Hermawan Setiawan and I Komang Setia Buana

1936 – Towards Privacy-Aware IoT Audit Framework: A Grounded Theory Approach
Authors: Handry Diansyah, Yudhistira Nugraha and Muhamad Erza Aminanto

2591 – Axiom Deployment of Open Redirect, Path Traversal, and SSRF Attacks to Accelerate Website Penetration Test Automation
Authors: Ryan Muhammad Azizulfiqar Kamajaya, Setiyo Cahyono, Jacob Lumbantoruan and Rheva Anindya Wijayanti

3073 – Enhancing IoT Vulnerability Prioritization using Real-Time EPSS and SSVC Decision Tree Modeling
Authors: Obrina Briliyant, Girinoto Girinoto, Mohamad Syahral and Rahmat Purwoko

4565 – Markicek: A Telegram-Based Bot for Real-Time Detection of Malicious URLs and Files
Authors: Rakha Maulana, I Gede Maha Putra, Nurul Qomariasih, Toddy Upananda, Nathanael Berliano Novanka Putra and M. Lazaro Fa. Al-Dzaki

5172 – Adaptation and Validation of HAIS-Q for Measuring Information Security Awareness in Indonesian Government Institutions
Authors: Muhammad Ihsanul Hakim Mokhsen and Rio Guntur Utomo

5473 – SafeUSB: Implementation of Keystroke Monitoring System to Prevent BadUSB HID Injection Attack
Authors: R. M. Genggam Satoe Bintang, Arizal Arizal, Rahmat Purwoko, Mohamad Syahral, Stefanus Santori Zen, Rheva Anindya Wijayanti and I Gede Maha Putra

5814 – Exploratory Analysis of Browser Fingerprint in Online Anonymity Internet Browser, Proxy, VPN, and TOR
Authors: Jeckson Sidabutar, Bimo Setyo Husodo, Setiyo Cahyono, Amiruddin Amiruddin and Stefanus Santori Zen

Session Chair : Dr. Amiruddin Session Chair : Dr. Amiruddin

22 Oct | Parallel Session 2

  • 22 Oct Parallel Session 2 | 15.30 – 17.00 WIB
15:30 – 17:00 Meeting Room A : Online

Parallel Session 2 | Session Chair : Dr. Susila Windarta

4918 – Enhancing Detection PostgreSQL Shell Honeypot With Interactive Query Response
Authors: Jundi Al Hafidz, Charles Lim and Kalpin Erlangga Silaen

5125 – Understanding Trust and Usability in Encrypted Email Adoption Among Indonesian Government and Intelligence Professionals
Authors: Muhammad Mubdya Barry Sahya, Jihad Dinullah Akbar and Yudhistira Nugraha

5794 – Enhancing Smart Home Cybersecurity: A Comparative Analysis of Decision Tree, Random Forest, and XGBoost for IoT Intrusion Detection – Work in Progress
Authors: Adi Wibowo, Deris Stiawan, Ahmad Heryanto, Ferry Astika Saputra, Fandi Kurniawan, Rahmat Budiarto, Adi Hermansyah, Mohd Yazid Idris and Edo Pratama

5934 – Bot, Tool, or Human? A Machine Learning Approach to Web Attacker Behavior Analysis
Authors: Andi Parada Tambunan, Charles Lim and Kalpin Erlangga Silaen

7113 – Integrated RTBH–RBS Model for Illegal Traffic Mitigation in Indonesia’s Internet Exchange
Authors: Moh. A. Amin Soetomo, Charles Lim and Muhammad Arif

7888 – Trust without Transparency: An Empirical Analysis of Anonymity and Verifiability in Iron Fish Cryptocurrency
Authors: Rinoto Adi Prasojo, I Putu Bayu Pati and Yudhistira Nugraha

Session Chair : Dr. Susila Windarta Session Chair : Dr. Susila Windarta
15:30 – 17:00 Meeting Room B : Offline

Parallel Session 2 | Session Chair : TBA

6264 – Improving Threat Intelligence in Healthcare Through a High Interaction DICOM Honeypot
Authors: Dendi Risman Saputra, Charles Lim and Kalpin Erlangga Silaen

6688 – Beyond Static Analysis: Detecting SQL Injection via Context-Aware Code Review in Web Applications
Authors: Christopher Ralin Anggoman, Rakha Maulana, Hermawan Setiawan and Muhammad Aqil Nuur Al-Farabi

6689 – E-Learning Web Based Education Malware Incidents based on ENISA Cyber Exercise
Authors: Jacob Lumbantoruan, Setiyo Cahyono, Septia Ulfa Sunaringtyas, Dimas Febriyan Priambodo and Martua Raja Doli Pangaribuan

6840 – Benchmarking DevSecOps Pipelines: A Performance and Security Analysis of Laravel and CodeIgniter
Authors: Muhammad Faki Raihan and Hermawan Setiawan

6919 – Pungoe Pentest: Orchestration of Web Penetration Testing Tools with Assistance Based on Large Language Model (LLM) Pentest-AI and Retrieval Augmented
Authors: Syubbanul Siddiq, R Budiarto Hadiprakoso, Prasetyo Adi Wibowo Putro, Girinoto Girinoto and Deva Finanda Saputra

8692 – INsAN: An AI-Based Framework Profiler for Automating OSINT
Authors: Mochammad Latief Reswandana Musonip, Agry Zharfa, Nabira Ananda, Nurul Qomariasih and I Komang Setia Buana

15:30 – 17:00 Meeting Room C : Online

Parallel Session 2 | Session Chair : TBA

1987 – Exploring Datasets and Techniques in Misinformation Detection: A Systematic Literature Review On Advancements and Challenges
Authors: Ahmad Tabrani, Arief Setyanto, Kusrini Kusrini and Ema Utami

2044 – Pulmonary Tuberculosis Classification on Chest X-Ray Images Using an Attention-Based Convolutional Neural Network (CNN) and Bayesian Hyperparameter Optimization
Authors: Santi Santi, Handa Johana, Valenia Hanna, Muhammad Andrean Syahridho, Akhmad Raihan Ramadhani Ramadhani and Kusrini Kusrini

2353 – Enhancing the User Interface of Open-Source ERP for Educational Use in Higher Education
Authors: Hanif Al-Farizi Muhammad and Nuril Kusumawardani Soeprapto Putri

2512 – Leveraging Machine Learning for Early Detection of Depression Based on Social Media Behavior
Authors: Jonathan, Andien Dwi Novika and Derwin Suhartono

2694 – Classification VS Few-Shot-Learning Model for Translating Sign to Speech
Authors: Priscillia Lovemel Candra, Felicia Susanty and Alexander Agung Santoso Gunawan

2919 – Advancing Rainfall Forecasting Through LSTM and EDLSTM Approach with CHIRPS Satellite Data
Authors: Ni Luh Putu Ika Candrawengi, Md Wira Putra Dananjaya and Yadhurani Dewi Amritha

23 Oct | Parallel Session 3

  • 23 Oct Parallel Session 3 | 10.45 – 12.15 WIB
10:45 – 12:15 Meeting Room A : Online

Parallel Session 3 | Session Chair : TBA

0310 – Schizophrenia Classification using Random Forest and XGBoost with EEG Dataset
Authors: Leander Farrell Suryadi, Febrio Dharma Wijaya and Andry Chowanda

2179 – Consortium Blockchain Model to Improve Transparency of Property Investment
Authors: Inayatulloh Inayatulloh, Erlina Puspitaloka Mahadewi, Suratminingsih Suratminingsih, Nyoman Ayu Gita Gayatri, Yulyanty Chandra and Loso Julianto

2424 – KeyBlob: A Standardized Format for Secure HSM Key Transport and Storage
Authors: Sarat Chandra Prasad Gingupalli

4893 – Enhancing New Lightweight Cryptographic Algorithm using Key-based Dynamic S-Box
Authors: Khairunnisa Novitania Rahardja, Farah Afianti and Favian Dewanta

5248 – A Hybrid McEliece Goppa-Polar Cryptosystem to Secure Post-Quantum IoT
Authors: Moussa Diop, Papis Ndiaye, Doudou Dione and Idy Diop

5851 – An RSA-Like Scheme over Eisenstein Integers
Authors: Abdul Hadi, Uha Isnaini, Erwin Eko Wahyudi and Indah Emilia Wijayanti

10:45 – 12:15 Meeting Room B : Offline

Parallel Session 3 | Session Chair : TBA

8869 – Forecasting the VMware ESXi Security Risks: A CVE-Based Vulnerability Analysis
Authors: Olga Geby Nabila and Akhmad Rizal Arifudin

9223 – Critical Sociotechnical Barriers to Cyber Crisis Management in a Critical Information Infrastructure Sector in Indonesia
Authors: Emanuel Ario Bimo and Prabaswari Prabaswari

9267 – Systematic Mapping of Cybersecurity Awareness Content in Digital Educational Games for Children
Authors: Ni Komang Ayu Krisnasari, Yudhistira Nugraha and Muhamad Erza Aminanto

9629 – OTX AlienVault Indicator of Compromise Implementation on MISP Threat Sharing for Network Intrusion Detection System Suricata
Authors: Dimas Wahyu Utomo, Nanang Trianto, Ira Rosianal Hikmah and Tiyas Yulita

9687 – Development of News Classification Model Using Bidirectional Encoder Representations from Transformers (BERT) with Interpretability Analysis Based on Explainable Artificial Intelligence (XAI)
Authors: I Gede Maha Putra, Raden Budiarto Hadiprakoso, Rheva Anindya Wijayanti and Stefanus Santori Zen

9958 – Risk Mitigation of Security Information Through Optimization Risk Assessment Based on ISO 27005:2022 & NIST SP 800-30 Revision 1 Standards at XYZ Company
Authors: Muhammad Raiven Ramadhan Harahap and Candiwan Candiwan

10:45 – 12:15 Meeting Room C : Offline

Parallel Session 3 | Session Chair : TBA

5173 – Granular GPU Flag Configuration for Optimising Browser-Based Federated Learning Performance
Authors: Muhammad Senoyodha Brennaf, Po Yang, Vitaveska Lanfranchi, Khairunnisa Kirana Andromeda and Anugrah Nurrewa

0085 – Pseudo-random Number Generation Based on Quantum Kicked Rotor Dynamics
Authors: Taukhid W. Broto, Supriadi Rustad, Ahmad Zainul Fanani, Sri Winarno and De Rosal Ignatius Moses Setiadi

0159 – Cryptanalytic Evaluation of a Modified RSA Scheme Using Lenstra’s Elliptic Curve Factorization and Coppersmith’s
Authors: Muhammad Haidar Wijaya, Bety Hayat Susanti and Luthfi Hakim Panuntun

0996 – Formal Analysis of the Munilla Authentication Protocol using ProVerif
Authors: Rohiqi Maghtum Imama, Nadia Paramita Retno Adiati, Nia Yulianti and Yeni Farida

1252 – Common Modulus Attack on A New Public Key Cryptosystem Based on the Cubic Pell Curve
Authors: Dandi Agus Ferdianto and Bety Hayat Susanti

2933 – A Unified Mathematical Model for Human Vocal Dynamics Integrating Energy, Entropy, and Resonance for Voice Activity Detection and Affective Computing
Authors: Hoga Saragih

23 Oct | Parallel Session 4

  • 23 Oct Parallel Session 4 | 13.15 – 15.15 WIB
13:15 – 15:15 Meeting Room A : Online

Parallel Session 4 | Session Chair : TBA

7673 – Rapid DDoS Detection and Mitigation Framework in SDN Space
Authors: Alfred Antonio, Jonathan Djoko, Rexi Leon Saputra and Ika Dyah Agustia Rachmawati

7706 – Classification of Phishing Attacks from OSINT Data Using Naive Bayes Algorithm for Enhanced Cyber Situational Awareness
Authors: Sahat Erwin Gemayel Siagian, Herry Sujaini and Rudy Gianto

7841 – Machine Learning-Based Intrusion Detection System for Network Security: Evaluation Using R and the UNSWNB15 Datase
Authors: Yadhurani Dewi Amritha, Ni Luh Putu Ika Candrawengi and Md Wira Putra Dananjaya

8920 – Towards Robust SSH Anomaly Detection: A Deep Learning Comparative Analysis
Authors: Md Wira Putra Dananjaya, Ni Luh Putu Ika Candrawengi, I Wayan Aditya Suranata and I Gusti Ngurah Darma Paramartha

9123 – AI-Driven Misinformation Mitigation: Implementation of RAG System for Hoax Detection and Cybersecurity in Indonesia
Authors: Rivo Juicer Wowor, Sy Yuliani Yakub and Santi Indarjani

9326 – Using Hybrid Blockchain to Increase Transaction Transparency in Government Bond Investments
Authors: Inayatulloh Inayatulloh

9404 – Implementation of GRU Model for Identifying Hoax News in Indonesia: A Focus on Cyber Security
Authors: Christian Ivan Wibowo and Sy. Yuliani Yakub

9884 – An Analysis of Password Manager Adoption and Trust Among Indonesian Digital Users
Authors: Muhammad Malik Pandu Galang, Fadhil Pratama and Yudhistira Nugraha

1269 – Deep Learning Application and Comparison of ResNet50 and DenseNet121 Models for Corn Leaf Disease Detection
Authors: Ilham Ananda Binta Toroshi, Alfonsus Nathanael, Yehezkiel Kenneth Hosea, Ayu Maulina and Muhammad Fikri Hasani

13:15 – 15:15 Meeting Room B : Offline

Parallel Session 4 | Session Chair : TBA

3010 – Needs Analysis and AI Competency among Indonesian Students: An Adaptive Study Based on International Frameworks
Authors: Galen Nayaka Nayottama, Adele Mailangkay and Sasmoko Sasmoko

3453 – YOLO Object Detection in Synthetic Aperture Radar Imagery: A Study on SARDet-100K with Image Denoising
Authors: Kasandika Andariefli, Jervino Handaya, Keitaro Herman and Alexander Gunawan

4828 – Brain Tumor Classification on MRI Images Based on Transfer Learning
Authors: Haris Rafi, Zakiul Fahmi Zailani and Dimas Aryo Anggoro

6486 – A Multi-Model Approach to Sentiment Analysis of Earning Calls: Integrating Whisper, BART, and FinGPT
Authors: Frederick Marvel, Louis Dasten Suryajaya, Jose Alexandre, Andien Dwi Novika and Derwin Suhartono

6556 – Enhancing Story Point Estimation in Software Projects Using Transformer-Based Embeddings and Ensemble Regression Models
Authors: Darren Cornelius Citra Wijaya, Auryn Larissa Sabrina and Meiliana

7470 – Hybrid Feature Fusion for Aspect Categorization: Combining FastText and IndoRoBERTa Embeddings for Indonesian Smartphone Reviews
Authors: Justien Venerdi, David Arifin, Hengky Arifin, Muhammad Fikri Hasani and Ayu Maulina

7492 – Enhancing Attention Span in Human-Computer Interaction by Designing Digital Interfaces for Optimal Cognitive Efficiency
Authors: Henry Ricardo, Edbert Andersen, Nikita Masaling and Andry Chowanda

9106 – Comparative Study of PRTG and Grafana-Prometheus for Monitoring Information Technology Infrastructure
Authors: Dita Nurmadewi, Yusran Rizky Mulyadi and Shidiq Al Hakim

9842 – Machine Learning Methods for Diagnosis of Human Disesases: A Systematic Literature Review
Authors: Denada Denada, Santi Santi, Muhammad Ghozy Alkhairi and Ema Utami

13:15 – 15:15 Meeting Room C : Offline

Parallel Session 4 | Session Chair : TBA

2477 – Collision Analysis of the 10-Round SLIM-based Matyas-Meyer-Oseas Scheme: Implications for Length Extension Attack
Authors: Widya Jati Lestari, Bety Hayat Susanti and Sepha Siswantyo

2572 – All Subkey Recovery Attack on 5-Round SCENERY Algorithm
Authors: Farid Akbar, Nia Yulianti, Sri Rosdiana and Mareta Ardyani

3468 – The Shifted Discrete Logarithm Problem and Its Applications in Post-Quantum Cryptography
Authors: Brayen Damara, Muhammad Imran and Kiki A. Sugeng

6509 – Efficient and Secure Multiparty Key Exchange Schemes from Bilinear Maps
Authors: Annisa Dini Handayani, Indah Emilia Wijayanti, Uha Isnaini and Prastudy Fauzi

7429 – Chaotic Enhancement via LE-guided Quantum XYZ Rotational Encoding and Amplitude-Scaled
Authors: De Rosal Ignatius Moses Setiadi, Supriadi Rustad, T. Sutojo, Muhamad Akrom, Mohamad Afendee Mohamed and Aceng Sambas

8604 – Extended Self-Adaptive Honey Encryption (XSHE) for User Authentication Scheme Using a Generative Adversarial Network (GAN)
Authors: Adek Muhammad Zulkham Rk, Girinoto, Herman Kabetta and Hermawan Setiawan

© 2025 International Conference on Cryptography, Informatics and Cybersecurity