Parallel Session 1 | Session Chair : Dr. Eka Budiarto
1090 – RAG-Fusion Based Framework for Indonesian Hoax News Detection Authors: Fadhil Dzaky Muhammad, Sy. Yuliani Yakub, Marlinda Vasty Overbeek and Fenina Adline Twince Tobing 1131 – Assessing The Generalization Capacity of Machine Learning Classifiers Against Resilient DGA Families Authors: Rodi Fadhelar R, Yudhistira Nugraha and Muhamad Erza Aminanto 1267 – Comparative Analysis of CNN and BERT for English Fake News Detection Across Short and Long Texts Authors: Jessica Setiawan Tjoe, Alexander Agung Santoso Gunawan and Rilo Chandra Pradana 1305 – Audio Deepfake Detection: Leveraging Deep Learning for Automatic Speaker Verification and Spoofing Prevention Authors: Ferry Irwanto, Muhammad Farrell Hafizh Sasongko, Simen Ferdinand Djamhari and Alexander Agung Santoso Gunawan 2253 – Analyzing the Implementation Gaps in ISO/IEC 27001:2022 Controls: Insights from PDPC Singapore’s Cybersecurity Breaches Authors: Jeremy Leonard Naramuda, Nathaniel Gillbert Sjaibani, Gary Wiliam Kurniadi and Diana Diana 2616 – Constructing and Analyzing Indonesian Privacy Policies: A Dataset for Privacy Research Authors: Guntur Budi Herwanto, Kabul Kurniawan, Uha Isnaini, Bambang Nurcahyo Prastowo, Eka Putri and Sukma Hadi Wijaya 4442 – Machine Learning for DDoS Attack Detection in SDN: A Systematic Literature Review Authors: Tirtadi Muchtar and Kusprasapta Mutijarsa 4692 – Hybrid Sequential Pattern Mining and Naive Bayes for Hoax Detection Using Indonesia’s News Outlet Dataset Authors: Mohammad Alfarizky Ramadhani Oscandar and Sy Yuliani
Parallel Session 1 | Session Chair : Dr. Prasetyo Adi Wibowo Putro
1885 – Optimizing Random Forest with Genetic Algorithm for Malware Detection Using PE Header Features Authors: Agung Setiaji and Elisa Bahara Soritua 2233 – SiagaJakarta: An Agentic GeoAI Framework for Autonomous Geospatial Analysis of Emergency Services Authors: Zakiul Jailani, Raden Bambang Syumanjaya, Raka Dimas Saputra and Haris Rafi 2509 – Machine Learning Models for Learning Focus Assessment: A Comparative Analysis at UNHAN RI Authors: Nadiza Lediwara, Sembada Denrineksa Bimorogo, Aulia Khamas Heikmakhtiar, Aisyah Gusmi Putri Utami and Cheva Anggara Putra 3541 – Physical Tells Digital Threats: Supervised ML-IDS for Multimodal IoT Telemetry in Smart Buildings Authors: Obrina Briliyant, Amir Javed, Yulia Cherdantseva and Septia Ulfa Sunaringtyas 3979 – Evaluating the Robustness of Mean Decrease Accuracy and Mean Decrease Gini in Random Forest Classification under Multicollinearity Authors: Rahmi Fadhilah, Heri Kuswanto and Dedy Dwi Prastyo 7166 – Design of RFID and SHA-256 Based Access Control System for Monitoring and Accountability in Fuel Dispensing Process Authors: Brian Nasywa Rayhan, Siti Manayra Sabiya, Faqih Rangga Wijaya and Dion Ogi 8954 – Optimized Duplicate Detection Using Smith-Waterman Algorithm with Sorted Neighborhood Method Authors: Yusuf Lestanto and Rahma Mualifa 9508 – Implementation of Authentication Scheme to Provide User Anonymity on Telegram Chatbot-based Smart Home Environment Prototype Authors: Ariska Allamanda, Fetty Amelia, Agus Reza Aristiadi Nurwa, Magfirawaty Magfirawaty and Arnoldus Triono
Parallel Session 1 | Session Chair : Dr. Amiruddin
0115 – Evaluation of Web Security and Performance in PHP Frameworks: A Case Study of CodeIgniter 4 and Yii2 Authors: M. Dja’Far Karzein Hafidz Yuntanozra, Hermawan Setiawan and I Komang Setia Buana 1936 – Towards Privacy-Aware IoT Audit Framework: A Grounded Theory Approach Authors: Handry Diansyah, Yudhistira Nugraha and Muhamad Erza Aminanto 2591 – Axiom Deployment of Open Redirect, Path Traversal, and SSRF Attacks to Accelerate Website Penetration Test Automation Authors: Ryan Muhammad Azizulfiqar Kamajaya, Setiyo Cahyono, Jacob Lumbantoruan and Rheva Anindya Wijayanti 3073 – Enhancing IoT Vulnerability Prioritization using Real-Time EPSS and SSVC Decision Tree Modeling Authors: Obrina Briliyant, Girinoto Girinoto, Mohamad Syahral and Rahmat Purwoko 4565 – Markicek: A Telegram-Based Bot for Real-Time Detection of Malicious URLs and Files Authors: Rakha Maulana, I Gede Maha Putra, Nurul Qomariasih, Toddy Upananda, Nathanael Berliano Novanka Putra and M. Lazaro Fa. Al-Dzaki 5172 – Adaptation and Validation of HAIS-Q for Measuring Information Security Awareness in Indonesian Government Institutions Authors: Muhammad Ihsanul Hakim Mokhsen and Rio Guntur Utomo 5473 – SafeUSB: Implementation of Keystroke Monitoring System to Prevent BadUSB HID Injection Attack Authors: R. M. Genggam Satoe Bintang, Arizal Arizal, Rahmat Purwoko, Mohamad Syahral, Stefanus Santori Zen, Rheva Anindya Wijayanti and I Gede Maha Putra 5814 – Exploratory Analysis of Browser Fingerprint in Online Anonymity Internet Browser, Proxy, VPN, and TOR Authors: Jeckson Sidabutar, Bimo Setyo Husodo, Setiyo Cahyono, Amiruddin Amiruddin and Stefanus Santori Zen
Parallel Session 2 | Session Chair : Dr. Susila Windarta
4918 – Enhancing Detection PostgreSQL Shell Honeypot With Interactive Query Response Authors: Jundi Al Hafidz, Charles Lim and Kalpin Erlangga Silaen 5125 – Understanding Trust and Usability in Encrypted Email Adoption Among Indonesian Government and Intelligence Professionals Authors: Muhammad Mubdya Barry Sahya, Jihad Dinullah Akbar and Yudhistira Nugraha 5794 – Enhancing Smart Home Cybersecurity: A Comparative Analysis of Decision Tree, Random Forest, and XGBoost for IoT Intrusion Detection – Work in Progress Authors: Adi Wibowo, Deris Stiawan, Ahmad Heryanto, Ferry Astika Saputra, Fandi Kurniawan, Rahmat Budiarto, Adi Hermansyah, Mohd Yazid Idris and Edo Pratama 5934 – Bot, Tool, or Human? A Machine Learning Approach to Web Attacker Behavior Analysis Authors: Andi Parada Tambunan, Charles Lim and Kalpin Erlangga Silaen 7113 – Integrated RTBH–RBS Model for Illegal Traffic Mitigation in Indonesia’s Internet Exchange Authors: Moh. A. Amin Soetomo, Charles Lim and Muhammad Arif 7888 – Trust without Transparency: An Empirical Analysis of Anonymity and Verifiability in Iron Fish Cryptocurrency Authors: Rinoto Adi Prasojo, I Putu Bayu Pati and Yudhistira Nugraha
Parallel Session 2 | Session Chair : TBA
6264 – Improving Threat Intelligence in Healthcare Through a High Interaction DICOM Honeypot Authors: Dendi Risman Saputra, Charles Lim and Kalpin Erlangga Silaen 6688 – Beyond Static Analysis: Detecting SQL Injection via Context-Aware Code Review in Web Applications Authors: Christopher Ralin Anggoman, Rakha Maulana, Hermawan Setiawan and Muhammad Aqil Nuur Al-Farabi 6689 – E-Learning Web Based Education Malware Incidents based on ENISA Cyber Exercise Authors: Jacob Lumbantoruan, Setiyo Cahyono, Septia Ulfa Sunaringtyas, Dimas Febriyan Priambodo and Martua Raja Doli Pangaribuan 6840 – Benchmarking DevSecOps Pipelines: A Performance and Security Analysis of Laravel and CodeIgniter Authors: Muhammad Faki Raihan and Hermawan Setiawan 6919 – Pungoe Pentest: Orchestration of Web Penetration Testing Tools with Assistance Based on Large Language Model (LLM) Pentest-AI and Retrieval Augmented Authors: Syubbanul Siddiq, R Budiarto Hadiprakoso, Prasetyo Adi Wibowo Putro, Girinoto Girinoto and Deva Finanda Saputra 8692 – INsAN: An AI-Based Framework Profiler for Automating OSINT Authors: Mochammad Latief Reswandana Musonip, Agry Zharfa, Nabira Ananda, Nurul Qomariasih and I Komang Setia Buana
Parallel Session 2 | Session Chair : TBA
1987 – Exploring Datasets and Techniques in Misinformation Detection: A Systematic Literature Review On Advancements and Challenges Authors: Ahmad Tabrani, Arief Setyanto, Kusrini Kusrini and Ema Utami 2044 – Pulmonary Tuberculosis Classification on Chest X-Ray Images Using an Attention-Based Convolutional Neural Network (CNN) and Bayesian Hyperparameter Optimization Authors: Santi Santi, Handa Johana, Valenia Hanna, Muhammad Andrean Syahridho, Akhmad Raihan Ramadhani Ramadhani and Kusrini Kusrini 2353 – Enhancing the User Interface of Open-Source ERP for Educational Use in Higher Education Authors: Hanif Al-Farizi Muhammad and Nuril Kusumawardani Soeprapto Putri 2512 – Leveraging Machine Learning for Early Detection of Depression Based on Social Media Behavior Authors: Jonathan, Andien Dwi Novika and Derwin Suhartono 2694 – Classification VS Few-Shot-Learning Model for Translating Sign to Speech Authors: Priscillia Lovemel Candra, Felicia Susanty and Alexander Agung Santoso Gunawan 2919 – Advancing Rainfall Forecasting Through LSTM and EDLSTM Approach with CHIRPS Satellite Data Authors: Ni Luh Putu Ika Candrawengi, Md Wira Putra Dananjaya and Yadhurani Dewi Amritha
Parallel Session 3 | Session Chair : TBA
0310 – Schizophrenia Classification using Random Forest and XGBoost with EEG Dataset Authors: Leander Farrell Suryadi, Febrio Dharma Wijaya and Andry Chowanda 2179 – Consortium Blockchain Model to Improve Transparency of Property Investment Authors: Inayatulloh Inayatulloh, Erlina Puspitaloka Mahadewi, Suratminingsih Suratminingsih, Nyoman Ayu Gita Gayatri, Yulyanty Chandra and Loso Julianto 2424 – KeyBlob: A Standardized Format for Secure HSM Key Transport and Storage Authors: Sarat Chandra Prasad Gingupalli 4893 – Enhancing New Lightweight Cryptographic Algorithm using Key-based Dynamic S-Box Authors: Khairunnisa Novitania Rahardja, Farah Afianti and Favian Dewanta 5248 – A Hybrid McEliece Goppa-Polar Cryptosystem to Secure Post-Quantum IoT Authors: Moussa Diop, Papis Ndiaye, Doudou Dione and Idy Diop 5851 – An RSA-Like Scheme over Eisenstein Integers Authors: Abdul Hadi, Uha Isnaini, Erwin Eko Wahyudi and Indah Emilia Wijayanti
Parallel Session 3 | Session Chair : TBA
8869 – Forecasting the VMware ESXi Security Risks: A CVE-Based Vulnerability Analysis Authors: Olga Geby Nabila and Akhmad Rizal Arifudin 9223 – Critical Sociotechnical Barriers to Cyber Crisis Management in a Critical Information Infrastructure Sector in Indonesia Authors: Emanuel Ario Bimo and Prabaswari Prabaswari 9267 – Systematic Mapping of Cybersecurity Awareness Content in Digital Educational Games for Children Authors: Ni Komang Ayu Krisnasari, Yudhistira Nugraha and Muhamad Erza Aminanto 9629 – OTX AlienVault Indicator of Compromise Implementation on MISP Threat Sharing for Network Intrusion Detection System Suricata Authors: Dimas Wahyu Utomo, Nanang Trianto, Ira Rosianal Hikmah and Tiyas Yulita 9687 – Development of News Classification Model Using Bidirectional Encoder Representations from Transformers (BERT) with Interpretability Analysis Based on Explainable Artificial Intelligence (XAI) Authors: I Gede Maha Putra, Raden Budiarto Hadiprakoso, Rheva Anindya Wijayanti and Stefanus Santori Zen 9958 – Risk Mitigation of Security Information Through Optimization Risk Assessment Based on ISO 27005:2022 & NIST SP 800-30 Revision 1 Standards at XYZ Company Authors: Muhammad Raiven Ramadhan Harahap and Candiwan Candiwan
Parallel Session 3 | Session Chair : TBA
5173 – Granular GPU Flag Configuration for Optimising Browser-Based Federated Learning Performance Authors: Muhammad Senoyodha Brennaf, Po Yang, Vitaveska Lanfranchi, Khairunnisa Kirana Andromeda and Anugrah Nurrewa 0085 – Pseudo-random Number Generation Based on Quantum Kicked Rotor Dynamics Authors: Taukhid W. Broto, Supriadi Rustad, Ahmad Zainul Fanani, Sri Winarno and De Rosal Ignatius Moses Setiadi 0159 – Cryptanalytic Evaluation of a Modified RSA Scheme Using Lenstra’s Elliptic Curve Factorization and Coppersmith’s Authors: Muhammad Haidar Wijaya, Bety Hayat Susanti and Luthfi Hakim Panuntun 0996 – Formal Analysis of the Munilla Authentication Protocol using ProVerif Authors: Rohiqi Maghtum Imama, Nadia Paramita Retno Adiati, Nia Yulianti and Yeni Farida 1252 – Common Modulus Attack on A New Public Key Cryptosystem Based on the Cubic Pell Curve Authors: Dandi Agus Ferdianto and Bety Hayat Susanti 2933 – A Unified Mathematical Model for Human Vocal Dynamics Integrating Energy, Entropy, and Resonance for Voice Activity Detection and Affective Computing Authors: Hoga Saragih
Parallel Session 4 | Session Chair : TBA
7673 – Rapid DDoS Detection and Mitigation Framework in SDN Space Authors: Alfred Antonio, Jonathan Djoko, Rexi Leon Saputra and Ika Dyah Agustia Rachmawati 7706 – Classification of Phishing Attacks from OSINT Data Using Naive Bayes Algorithm for Enhanced Cyber Situational Awareness Authors: Sahat Erwin Gemayel Siagian, Herry Sujaini and Rudy Gianto 7841 – Machine Learning-Based Intrusion Detection System for Network Security: Evaluation Using R and the UNSWNB15 Datase Authors: Yadhurani Dewi Amritha, Ni Luh Putu Ika Candrawengi and Md Wira Putra Dananjaya 8920 – Towards Robust SSH Anomaly Detection: A Deep Learning Comparative Analysis Authors: Md Wira Putra Dananjaya, Ni Luh Putu Ika Candrawengi, I Wayan Aditya Suranata and I Gusti Ngurah Darma Paramartha 9123 – AI-Driven Misinformation Mitigation: Implementation of RAG System for Hoax Detection and Cybersecurity in Indonesia Authors: Rivo Juicer Wowor, Sy Yuliani Yakub and Santi Indarjani 9326 – Using Hybrid Blockchain to Increase Transaction Transparency in Government Bond Investments Authors: Inayatulloh Inayatulloh 9404 – Implementation of GRU Model for Identifying Hoax News in Indonesia: A Focus on Cyber Security Authors: Christian Ivan Wibowo and Sy. Yuliani Yakub 9884 – An Analysis of Password Manager Adoption and Trust Among Indonesian Digital Users Authors: Muhammad Malik Pandu Galang, Fadhil Pratama and Yudhistira Nugraha 1269 – Deep Learning Application and Comparison of ResNet50 and DenseNet121 Models for Corn Leaf Disease Detection Authors: Ilham Ananda Binta Toroshi, Alfonsus Nathanael, Yehezkiel Kenneth Hosea, Ayu Maulina and Muhammad Fikri Hasani
Parallel Session 4 | Session Chair : TBA
3010 – Needs Analysis and AI Competency among Indonesian Students: An Adaptive Study Based on International Frameworks Authors: Galen Nayaka Nayottama, Adele Mailangkay and Sasmoko Sasmoko 3453 – YOLO Object Detection in Synthetic Aperture Radar Imagery: A Study on SARDet-100K with Image Denoising Authors: Kasandika Andariefli, Jervino Handaya, Keitaro Herman and Alexander Gunawan 4828 – Brain Tumor Classification on MRI Images Based on Transfer Learning Authors: Haris Rafi, Zakiul Fahmi Zailani and Dimas Aryo Anggoro 6486 – A Multi-Model Approach to Sentiment Analysis of Earning Calls: Integrating Whisper, BART, and FinGPT Authors: Frederick Marvel, Louis Dasten Suryajaya, Jose Alexandre, Andien Dwi Novika and Derwin Suhartono 6556 – Enhancing Story Point Estimation in Software Projects Using Transformer-Based Embeddings and Ensemble Regression Models Authors: Darren Cornelius Citra Wijaya, Auryn Larissa Sabrina and Meiliana 7470 – Hybrid Feature Fusion for Aspect Categorization: Combining FastText and IndoRoBERTa Embeddings for Indonesian Smartphone Reviews Authors: Justien Venerdi, David Arifin, Hengky Arifin, Muhammad Fikri Hasani and Ayu Maulina 7492 – Enhancing Attention Span in Human-Computer Interaction by Designing Digital Interfaces for Optimal Cognitive Efficiency Authors: Henry Ricardo, Edbert Andersen, Nikita Masaling and Andry Chowanda 9106 – Comparative Study of PRTG and Grafana-Prometheus for Monitoring Information Technology Infrastructure Authors: Dita Nurmadewi, Yusran Rizky Mulyadi and Shidiq Al Hakim 9842 – Machine Learning Methods for Diagnosis of Human Disesases: A Systematic Literature Review Authors: Denada Denada, Santi Santi, Muhammad Ghozy Alkhairi and Ema Utami
Parallel Session 4 | Session Chair : TBA
2477 – Collision Analysis of the 10-Round SLIM-based Matyas-Meyer-Oseas Scheme: Implications for Length Extension Attack Authors: Widya Jati Lestari, Bety Hayat Susanti and Sepha Siswantyo 2572 – All Subkey Recovery Attack on 5-Round SCENERY Algorithm Authors: Farid Akbar, Nia Yulianti, Sri Rosdiana and Mareta Ardyani 3468 – The Shifted Discrete Logarithm Problem and Its Applications in Post-Quantum Cryptography Authors: Brayen Damara, Muhammad Imran and Kiki A. Sugeng 6509 – Efficient and Secure Multiparty Key Exchange Schemes from Bilinear Maps Authors: Annisa Dini Handayani, Indah Emilia Wijayanti, Uha Isnaini and Prastudy Fauzi 7429 – Chaotic Enhancement via LE-guided Quantum XYZ Rotational Encoding and Amplitude-Scaled Authors: De Rosal Ignatius Moses Setiadi, Supriadi Rustad, T. Sutojo, Muhamad Akrom, Mohamad Afendee Mohamed and Aceng Sambas 8604 – Extended Self-Adaptive Honey Encryption (XSHE) for User Authentication Scheme Using a Generative Adversarial Network (GAN) Authors: Adek Muhammad Zulkham Rk, Girinoto, Herman Kabetta and Hermawan Setiawan