Παρακολούθηση
Tohari Ahmad
Tohari Ahmad
Department of Informatics, Institut Teknologi Sepuluh Nopember
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα if.its.ac.id - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Pair-polar coordinate-based cancelable fingerprint templates
T Ahmad, J Hu, S Wang
Pattern recognition 44 (10-11), 2555-2564, 2011
1942011
A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment
K Xi, T Ahmad, F Han, J Hu
Security and Communication Networks 4 (5), 487-499, 2011
1262011
Hybrid Association Rule Learning and Process Mining for Fraud Detection.
R Sarno, RD Dewandono, T Ahmad, MF Naufal, F Sinaga
IAENG International Journal of Computer Science 42 (2), 2015
1192015
Information hiding scheme for digital images using difference expansion and modulus function
P Maniriho, T Ahmad
Journal of king saud university-computer and information sciences 31 (3 …, 2019
1092019
Data preprocessing and feature selection for machine learning intrusion detection systems
T Ahmad, MN Aziz
ICIC Express Lett 13 (2), 93-101, 2019
1092019
Anomaly-based intrusion detection approach for IoT networks using machine learning
P Maniriho, E Niyigaba, Z Bizimana, V Twiringiyimana, LJ Mahoro, ...
2020 international conference on computer engineering, network, and …, 2020
802020
A hybrid machine learning method for increasing the performance of network intrusion detection systems
AA Megantara, T Ahmad
Journal of Big Data 8 (1), 142, 2021
762021
An efficient mobile voting system security scheme based on elliptic curve cryptography
T Ahmad, J Hu, S Han
2009 Third International Conference on Network and System Security, 474-479, 2009
612009
Analyzing the performance of machine learning algorithms in anomaly network intrusion detection systems
P Maniriho, T Ahmad
2018 4th international conference on science and technology (ICST), 1-6, 2018
502018
Fuzzy MADM approach for rating of process-based fraud
S Huda, R Sarno, T Ahmad
Journal of ICT Research and Applications 9 (2), 111-128, 2015
502015
An Improved Quad and RDE-based Medical Data Hiding Method
T Ahmad, M Holil, W Wibisono, RM Ijtihadie
CYBERNETICSCOM, 141-145, 2013
482013
Penggunaan Internet dan Teknologi IoT untuk Meningkatkan Kualitas Pendidikan
AM Shiddiqi, RM Ijtihadie, T Ahmad, W Wibisono, R Anggoro, BJ Santos
Sewagati 4 (3), 235-240, 2020
462020
Falls detection and notification system using tri-axial accelerometer and gyroscope sensors of a smartphone
W Wibisono, DN Arifin, BA Pratomo, T Ahmad, RM Ijtihadie
2013 Conference on Technologies and Applications of Artificial Intelligence …, 2013
462013
Detecting Intrusions in Computer Network Traffic with Machine Learning Approaches.
P Maniriho, LJ Mahoro, E Niyigaba, Z Bizimana, T Ahmad
International Journal of Intelligent Engineering & Systems 13 (3), 2020
442020
Identification of Process-based Fraud Patterns in Credit Application
S Huda, T Ahmad, R Sarno, HA Santoso
432014
A convolutional neural network to detect possible hidden data in spatial domain images
JDLC Ntivuguruzwa, T Ahmad
Cybersecurity 6 (1), 23, 2023
372023
Variance threshold as early screening to Boruta feature selection for intrusion detection system
MAFA Fida, T Ahmad, M Ntahobari
2021 13th International Conference on Information & Communication Technology …, 2021
362021
Improving intrusion detection system by estimating parameters of random forest in Boruta
AN Iman, T Ahmad
2020 International Conference on Smart Technology and Applications (ICoSTA), 1-6, 2020
362020
Secret message protection using fuzzy logic and difference expansion in digital images
NJ De La Croix, CC Islamy, T Ahmad
2022 IEEE Nigeria 4th International Conference on Disruptive Technologies …, 2022
352022
Generating cancelable biometrie templates using a projection line
T Ahmad, J Hu
2010 11th International Conference on Control Automation Robotics & Vision, 7-12, 2010
352010
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20