Tohari Ahmad

Orcid: 0000-0002-3390-0756

According to our database1, Tohari Ahmad authored at least 57 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows.
J. Big Data, December, 2024

FuzConvSteganalysis: Steganalysis via fuzzy logic and convolutional neural network.
SoftwareX, 2024

AudioSecure: An open-source code to secure data using interpolation and multi-layering techniques within audio covers.
Softw. Impacts, 2024

Comprehensive survey on image steganalysis using deep learning.
Array, 2024

Severity-Oriented Multiclass Drone Flight Logs Anomaly Detection.
IEEE Access, 2024

Feature Selection Using Pearson Correlation with Lasso Regression for Intrusion Detection System.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Load Characterization of AI Applications using DQoES Scheduler for Serving Multiple Requests.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

A Steganographic Approach Based on Pixel Blocks Differencing to Enhance the Quality of the Stego Image.
Proceedings of the Conference on Information Communications Technology and Society, 2024

Reduced Difference Expansion based on Cover Image Bisection for a Quality Stego Image.
Proceedings of the Conference on Information Communications Technology and Society, 2024

Toward the Confidential Data Location in Spatial Domain Images via a Genetic-based Pooling in a Convolutional Neural Network.
Proceedings of the 16th International Conference on Computer and Automation Engineering, 2024

2023
A convolutional neural network to detect possible hidden data in spatial domain images.
Cybersecur., December, 2023

Reversible data hiding based on histogram and prediction error for sharing secret data.
Cybersecur., December, 2023

Segmentation embedding method with modified interpolation for increasing the capacity of adaptable and reversible audio data hiding.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

DFLER: Drone Flight Log Entity Recognizer to support forensic investigation on drone device.
Softw. Impacts, March, 2023

Transformer-Based Named Entity Recognition on Drone Flight Logs to Support Forensic Investigation.
IEEE Access, 2023

Enhancing Secret Data Detection Using Convolutional Neural Networks With Fuzzy Edge Detection.
IEEE Access, 2023

Fuzzy Logic-based Steganographic Scheme for high Payload Capacity with high Imperceptibility.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Transformer-based Sentiment Analysis for Anomaly Detection on Drone Forensic Timeline.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Botnet Dataset Overview Using Statistical Approach Based on Time Gap Activity Analysis.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

CHI2CV : Feature Selection using Chi-Square with Cross-Validation for Intrusion Detection System.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

Toward Hidden Data Detection via Local Features Optimization in Spatial Domain Images.
Proceedings of the Conference on Information Communications Technology and Society, 2023

Botnet Attacks Detection using Image Processing Approach: Sequential Neural Network and Feature Selection.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Image to Image Steganography using U-Net Architecture with MobileNet Convolutional Neural Network.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

An Enhanced Approach For Botnet Intrusion Detection System Based on Machine-Learning Model.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

RISET: Secure Eye-Tracking Password Authentication with Random Image Sequence.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Analysis of the smoothing and payload distribution method on reversible audio steganography.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Dimensional Feature Reduction for Detecting Botnet Activities.
Proceedings of the 25th International Conference on Advanced Communication Technology, 2023

2022
DroneTimeline: Forensic timeline analysis for drones.
SoftwareX, December, 2022

Simultaneous Botnet Dataset Generator: A simulation tool for generating a botnet dataset with simultaneous attack characteristic.
Softw. Impacts, December, 2022

Hybrid model for bot group activity detection using similarity and correlation approaches based on network traffic flows analysis.
J. King Saud Univ. Comput. Inf. Sci., 2022

Improving the performance of histogram-based data hiding method in the video environment.
J. King Saud Univ. Comput. Inf. Sci., 2022

Direction Estimation of Drone Collision Using Optical Flow for Forensic Investigation.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

2021
A hybrid machine learning method for increasing the performance of network intrusion detection systems.
J. Big Data, 2021

Performance Analysis of the New Filtering Algorithm with Kalman on Indoor Positioning System.
Proceedings of the Hybrid Intelligent Systems, 2021

Improved Interpolation-Based Reversible Audio Data Hiding Using Sample Dispersion and Value Shifting.
Proceedings of the Hybrid Intelligent Systems, 2021

2020
Reversible data hiding with segmented secrets and smoothed samples in various audio genres.
J. Big Data, 2020

B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis.
KSII Trans. Internet Inf. Syst., 2020

Reducing the Error Mapping of the Students' Performance Using Feature Selection.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

Forensic Analysis of Copy-Move Attack with Robust Duplication Detection.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

A New Approach to Detecting Bot Attack Activity Scenario.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

Protecting Data by Improving the Performance of Controlling Expansion Method.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
Information hiding scheme for digital images using difference expansion and modulus function.
J. King Saud Univ. Comput. Inf. Sci., 2019

Digital Image Information Hiding Methods for Protecting Transmitted Data: A Survey.
J. Commun., 2019

Protecting Secret Data using RDE and Fuzzy Logic to Specify the Embedding Level.
Proceedings of the 2019 IEEE International Conference on Signal and Image Processing Applications, 2019

2018
Adaptive Pixel Value Grouping for Protecting Secret Data in Public Computer Networks.
J. Commun., 2018

2017
A Mobile Crowdsensing Framework for Integrating Smartphone and IoT Devices to Cloud Computing Services.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

SCFT: Sector-based cancelable fingeprint template.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
Audio Data Hiding Based on Sample Value Modification Using Modulus Function.
J. Inf. Process. Syst., 2016

Difference Expansion-Based Data Hiding Method by Changing Expansion Media.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016

2015
Improving the performance of projection-based cancelable fingerprint template method.
Proceedings of the 7th International Conference of Soft Computing and Pattern Recognition, 2015

2014
Increasing the Performance of Difference Expansion-based Steganography when Securing Medical Data.
Smart Comput. Rev., 2014

Shared secret-based steganography for protecting medical data.
Proceedings of the 2014 International Conference on Computer, 2014

2013
Falls Detection and Notification System Using Tri-axial Accelerometer and Gyroscope Sensors of a Smartphone.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2013

2011
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment.
Secur. Commun. Networks, 2011

Pair-polar coordinate-based cancelable fingerprint templates.
Pattern Recognit., 2011

2010
Generating cancelable biometrie templates using a projection line.
Proceedings of the 11th International Conference on Control, 2010

2009
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography.
Proceedings of the Third International Conference on Network and System Security, 2009


  Loading...