{ "main": { "id": "80edb8299950e81c", "type": "split", "children": [ { "id": "a0965a7be66d6773", "type": "tabs", "children": [ { "id": "e11a6a080eb83632", "type": "leaf", "state": { "type": "markdown", "state": { "file": "ISEN/English/CIPA4/11 fev 2026.md", "mode": "source", "source": false, "backlinks": true, "backlinkOpts": { "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical", "showSearch": false, "searchQuery": "", "backlinkCollapsed": false, "unlinkedCollapsed": true } }, "icon": "lucide-file", "title": "11 fev 2026" } }, { "id": "37a6109c5cf4f8fa", "type": "leaf", "state": { "type": "pdf", "state": { "file": "ISEN/Sécurité IOT/CIPA4/IoT.Firmware.Analysis.pdf" }, "icon": "lucide-file-text", "title": "IoT.Firmware.Analysis" } }, { "id": "ae4f57562b1235e7", "type": "leaf", "state": { "type": "pdf", "state": { "file": "ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/20250708_CRYPTO_exos_avec_corriges.pdf" }, "icon": "lucide-file-text", "title": "20250708_CRYPTO_exos_avec_corriges" } }, { "id": "8d52247f0504a39c", "type": "leaf", "state": { "type": "pdf", "state": { "file": "ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/20011126_fips-197.pdf" }, "icon": "lucide-file-text", "title": "20011126_fips-197" } } ] } ], "direction": "vertical" }, "left": { "id": "d3d4eea0bba5f59a", "type": "split", "children": [ { "id": "e1170e13731b03ab", "type": "tabs", "children": [ { "id": "622da1d4e0ba0f73", "type": "leaf", "state": { "type": "file-explorer", "state": { "sortOrder": "alphabetical", "autoReveal": false }, "icon": "lucide-folder-closed", "title": "Files" } }, { "id": "0a8401764020cd87", "type": "leaf", "state": { "type": "search", "state": { "query": "tag:#CIPA4", "matchingCase": false, "explainSearch": false, "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical" }, "icon": "lucide-search", "title": "Search" } }, { "id": "8cf536f7a3e86d40", "type": "leaf", "state": { "type": "bookmarks", "state": {}, "icon": "lucide-bookmark", "title": "Bookmarks" } } ] } ], "direction": "horizontal", "width": 300 }, "right": { "id": "620e2dd59da72017", "type": "split", "children": [ { "id": "6b275ce780eb9e51", "type": "tabs", "children": [ { "id": "a26c7d896ccf150d", "type": "leaf", "state": { "type": "backlink", "state": { "file": "ISEN/Energie/CIPA3/Energie Cours 4.md", "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical", "showSearch": false, "searchQuery": "", "backlinkCollapsed": false, "unlinkedCollapsed": true }, "icon": "links-coming-in", "title": "Backlinks for Energie Cours 4" } }, { "id": "447dae918b3ceb41", "type": "leaf", "state": { "type": "outgoing-link", "state": { "file": "ISEN/Energie/CIPA3/Energie Cours 4.md", "linksCollapsed": false, "unlinkedCollapsed": true }, "icon": "links-going-out", "title": "Outgoing links from Energie Cours 4" } }, { "id": "a1a2a7f3dfd58872", "type": "leaf", "state": { "type": "tag", "state": { "sortOrder": "frequency", "useHierarchy": false, "showSearch": false, "searchQuery": "" }, "icon": "lucide-tags", "title": "Tags" } }, { "id": "879827be6c73ce1e", "type": "leaf", "state": { "type": "outline", "state": { "file": "ISEN/Physique/CIPA3/Compte rendu TP Amplificateur Opérationnel et Contre-Réaction.md", "followCursor": false, "showSearch": false, "searchQuery": "" }, "icon": "lucide-list", "title": "Outline of Compte rendu TP Amplificateur Opérationnel et Contre-Réaction" } }, { "id": "fbc4c5274a72cd3d", "type": "leaf", "state": { "type": "all-properties", "state": { "sortOrder": "frequency", "showSearch": false, "searchQuery": "" }, "icon": "lucide-archive", "title": "All properties" } }, { "id": "cc56184c227b09ca", "type": "leaf", "state": { "type": "git-view", "state": {}, "icon": "git-pull-request", "title": "Source Control" } } ], "currentTab": 5 } ], "direction": "horizontal", "width": 319.5 }, "left-ribbon": { "hiddenItems": { "bases:Create new base": false, "switcher:Open quick switcher": false, "graph:Open graph view": false, "canvas:Create new canvas": false, "templates:Insert template": false, "command-palette:Open command palette": false, "audio-recorder:Start/stop recording": false, "obsidian-git:Open Git source control": false } }, "active": "e11a6a080eb83632", "lastOpenFiles": [ "ISEN/English/CIPA4/11 fev 2026.md", "ISEN/Sécurité IOT/CIPA4/Sécurité IOT TP2.md", "Pasted image 20260210150329.png", "ISEN/Sécurité IOT/CIPA4/LabFiles/URHProject.xml", "ISEN/Sécurité IOT/CIPA4/Sécurité IOT TP1.md", "ISEN/Sécurité IOT/CIPA4/IoT.Firmware.Analysis.pdf", "ISEN/Sécurité IOT/CIPA4/test2.md", "ISEN/Sécurité IOT/CIPA4/test.md", "ISEN/Sécurité IOT/CIPA4/IoT.Security.Primer.2026.part4.pdf", "ISEN/Sécurité IOT/CIPA4/IoT.Security.Primer.2026.part3.pdf", "ISEN/Sécurité IOT/CIPA4/IoT.Security.Primer.2026.part2.pdf", "ISEN/Sécurité IOT/CIPA4/IoT.Security.Primer.2026.part1.pdf", "ISEN/Sécurité IOT/CIPA4/Sécurité IOT Cours 3.md", "Pasted image 20260210141034.png", "Pasted image 20260210140833.png", "ISEN/Sécurité IOT/CIPA4/LabFiles/rawdata-B1-I-f4.335000e+08-s8.000000e+06.cfile", "ISEN/Sécurité IOT/CIPA4/LabFiles/B1-I-433_5MHz-2MSps-2MHz.complex16s", "ISEN/Sécurité IOT/CIPA4/LabFiles/FullRemote-433_7MHz-2MSps-2MHz.complex16s", "ISEN/Sécurité IOT/CIPA4/LabFiles", "ISEN/Sécurité IOT/CIPA4/Firmware/_iotdev_firmware.bin.extracted/squashfs-root/usr/html/logo-7.svg", "ISEN/Sécurité IOT/CIPA4/Firmware/_iotdev_firmware.bin.extracted/squashfs-root/usr/html/graph2.png", "ISEN/Sécurité IOT/CIPA4/Firmware/_iotdev_firmware.bin.extracted/squashfs-root/usr/html/graph1.png", "ISEN/Sécurité IOT/CIPA4/Firmware/_iotdev_firmware.bin.extracted/squashfs-root-0/usr/html/logo-7.svg", "ISEN/Sécurité IOT/CIPA4/Firmware/_iotdev_firmware.bin.extracted/squashfs-root-0/usr/html/graph2.png", "ISEN/Sécurité IOT/CIPA4/Firmware/_iotdev_firmware.bin.extracted/squashfs-root-0/usr/html/graph1.png", "ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/Crypto Cours 2.md", "ISEN/Sécurité IOT/CIPA4/Sécurité IOT Cours 1.md", "ISEN/Sécurité IOT/CIPA4/Sécurité IOT Cours 2.md", "ISEN/Navigation de vehicule autonome/CIPA4/Navigation de véhicule autonome Cours 1.md", "ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/Cyber Cours 2.md", "ISEN/Web/CIPA 4/TP/TP5/MPD.png", "ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/Crypto Cours 1.md", "ISEN/Réunion/CIPA 3/Rentrée 2024-25.md", "ISEN/Réunion/CIPA 3/Départ en entreprise 1 20-09-2024.md", "ISEN/Réunion/CIPA 3/CR Conseil de scolarité S6.md", "ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/Cyber Cours 1.md", "ISEN/Réunion/CIPA 4/Réunion international.md", "ISEN/Cloud Computing/CIPA4/Cloud Computing Cours 3.md", "ISEN/Cloud Computing/CIPA4/Cloud Computing Cours 4.md", "ISEN/Cloud Computing/CIPA4/Cloud Computing Cours 2.md", "ISEN/Cloud Computing/CIPA4/Cloud Computing Cours 5.md", "ISEN/Cloud Computing/CIPA4/Cloud Computing Cours 1.md", "ISEN/Cloud Computing/CIPA4/TP 4 Ansible.md", "ISEN/Cloud Computing/CIPA4/TP 3 Ansible.md", "ISEN/Cloud Computing/CIPA4/TP 2 Ansible.md", "ISEN/Cloud Computing/CIPA4/TP 1 Ansible.md", "ISEN/Introduction a la cyber et a la cryptographie/CIPA 4/Tunnel SSH TP.canvas", "ISEN/Réseau/A2/TP Ansible et docker.canvas", "ISEN/BDD/CIR2/TD2.canvas", "ISEN/Modelec/NB point.canvas", "Untitled.canvas", "ISEN/Other/Graph Overseer.canvas", "ISEN/Algo C/A2/TP1 Exercice 1.canvas", "ISEN/Algo C/A2/MergeSort.canvas", "ISEN/FHS/A1/Stage/Organigramme Go-Recup.canvas", "ISEN/FHS/A1/Démocratie/Mouvement Social.canvas" ] }