<?xml version="1.0" encoding="UTF-8"?> 
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"> 
    <url>
        <loc>https://icc.or.id</loc>
        <priority>0.8</priority>
    </url>
    

    <url>
        <loc>https://icc.or.id/artikel/serangan-juicejacking-ancaman-siber-di-balik-pengisian-daya-perangkat.html</loc>
        <lastmod>2026-01-22</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/data-poisoning-dan-model-evasion-dalam-penyerangan-siber-berbasis-kecerdasan-buatan.html</loc>
        <lastmod>2026-01-22</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/iptables-berbasis-ai-evolusi-firewall-linux-di-era-kecerdasan-buatan.html</loc>
        <lastmod>2026-01-22</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/pertahanan-siber-menghadapi-serangan-siber-berbasis-teknologi-ai.html</loc>
        <lastmod>2026-01-22</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/serangan-bogon-dalam-keamanan-jaringan-komputer.html</loc>
        <lastmod>2026-01-19</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/serangan-spoofing-dalam-keamanan-siber.html</loc>
        <lastmod>2026-01-19</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/regex-wordpress-untuk-menghindari-serangan.html</loc>
        <lastmod>2026-01-08</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/penomoran-port-pada-komputer.html</loc>
        <lastmod>2026-01-08</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/apa-itu-cve.html</loc>
        <lastmod>2026-01-08</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/kunci-keamanan-siber-adalah-pengguna.html</loc>
        <lastmod>2026-01-06</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/apa-itu-cisrt.html</loc>
        <lastmod>2026-01-06</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/gunakan-snort-untuk-jaringan-komplek.html</loc>
        <lastmod>2026-01-06</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/gunakan-fail2ban-untuk-vps-server-anda-bukan-snort.html</loc>
        <lastmod>2026-01-06</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/perbedaan-fail2ban-dengan-snort.html</loc>
        <lastmod>2026-01-06</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/fail2ban-aplikasi-kecil-ids.html</loc>
        <lastmod>2026-01-06</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/serangan-siber-pada-router.html</loc>
        <lastmod>2025-03-25</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/apa-itu-kernel-dan-apa-fugsinya.html</loc>
        <lastmod>2025-03-25</lastmod>
        <changefreq>weekly</changefreq>
    </url>

    <url>
        <loc>https://icc.or.id/artikel/keamanan-perangkat-bermula-dari-sistem-operasi.html</loc>
        <lastmod>2025-03-25</lastmod>
        <changefreq>weekly</changefreq>
    </url>

</urlset>