Tohari Ahmad
Orcid: 0000-0002-3390-0756
According to our database1,
Tohari Ahmad
authored at least 57 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows.
J. Big Data, December, 2024
SoftwareX, 2024
AudioSecure: An open-source code to secure data using interpolation and multi-layering techniques within audio covers.
Softw. Impacts, 2024
Feature Selection Using Pearson Correlation with Lasso Regression for Intrusion Detection System.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
Load Characterization of AI Applications using DQoES Scheduler for Serving Multiple Requests.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
A Steganographic Approach Based on Pixel Blocks Differencing to Enhance the Quality of the Stego Image.
Proceedings of the Conference on Information Communications Technology and Society, 2024
Reduced Difference Expansion based on Cover Image Bisection for a Quality Stego Image.
Proceedings of the Conference on Information Communications Technology and Society, 2024
Toward the Confidential Data Location in Spatial Domain Images via a Genetic-based Pooling in a Convolutional Neural Network.
Proceedings of the 16th International Conference on Computer and Automation Engineering, 2024
2023
A convolutional neural network to detect possible hidden data in spatial domain images.
Cybersecur., December, 2023
Reversible data hiding based on histogram and prediction error for sharing secret data.
Cybersecur., December, 2023
Segmentation embedding method with modified interpolation for increasing the capacity of adaptable and reversible audio data hiding.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
DFLER: Drone Flight Log Entity Recognizer to support forensic investigation on drone device.
Softw. Impacts, March, 2023
Transformer-Based Named Entity Recognition on Drone Flight Logs to Support Forensic Investigation.
IEEE Access, 2023
Enhancing Secret Data Detection Using Convolutional Neural Networks With Fuzzy Edge Detection.
IEEE Access, 2023
Fuzzy Logic-based Steganographic Scheme for high Payload Capacity with high Imperceptibility.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023
Transformer-based Sentiment Analysis for Anomaly Detection on Drone Forensic Timeline.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023
Botnet Dataset Overview Using Statistical Approach Based on Time Gap Activity Analysis.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023
CHI2CV : Feature Selection using Chi-Square with Cross-Validation for Intrusion Detection System.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023
Toward Hidden Data Detection via Local Features Optimization in Spatial Domain Images.
Proceedings of the Conference on Information Communications Technology and Society, 2023
Botnet Attacks Detection using Image Processing Approach: Sequential Neural Network and Feature Selection.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023
Image to Image Steganography using U-Net Architecture with MobileNet Convolutional Neural Network.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023
An Enhanced Approach For Botnet Intrusion Detection System Based on Machine-Learning Model.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023
Analysis of the smoothing and payload distribution method on reversible audio steganography.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023
Proceedings of the 25th International Conference on Advanced Communication Technology, 2023
2022
Simultaneous Botnet Dataset Generator: A simulation tool for generating a botnet dataset with simultaneous attack characteristic.
Softw. Impacts, December, 2022
Hybrid model for bot group activity detection using similarity and correlation approaches based on network traffic flows analysis.
J. King Saud Univ. Comput. Inf. Sci., 2022
Improving the performance of histogram-based data hiding method in the video environment.
J. King Saud Univ. Comput. Inf. Sci., 2022
Direction Estimation of Drone Collision Using Optical Flow for Forensic Investigation.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022
2021
A hybrid machine learning method for increasing the performance of network intrusion detection systems.
J. Big Data, 2021
Performance Analysis of the New Filtering Algorithm with Kalman on Indoor Positioning System.
Proceedings of the Hybrid Intelligent Systems, 2021
Improved Interpolation-Based Reversible Audio Data Hiding Using Sample Dispersion and Value Shifting.
Proceedings of the Hybrid Intelligent Systems, 2021
2020
Reversible data hiding with segmented secrets and smoothed samples in various audio genres.
J. Big Data, 2020
B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis.
KSII Trans. Internet Inf. Syst., 2020
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
2019
Information hiding scheme for digital images using difference expansion and modulus function.
J. King Saud Univ. Comput. Inf. Sci., 2019
J. Commun., 2019
Proceedings of the 2019 IEEE International Conference on Signal and Image Processing Applications, 2019
2018
Adaptive Pixel Value Grouping for Protecting Secret Data in Public Computer Networks.
J. Commun., 2018
2017
A Mobile Crowdsensing Framework for Integrating Smartphone and IoT Devices to Cloud Computing Services.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
2016
J. Inf. Process. Syst., 2016
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016
2015
Improving the performance of projection-based cancelable fingerprint template method.
Proceedings of the 7th International Conference of Soft Computing and Pattern Recognition, 2015
2014
Increasing the Performance of Difference Expansion-based Steganography when Securing Medical Data.
Smart Comput. Rev., 2014
Proceedings of the 2014 International Conference on Computer, 2014
2013
Falls Detection and Notification System Using Tri-axial Accelerometer and Gyroscope Sensors of a Smartphone.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2013
2011
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment.
Secur. Commun. Networks, 2011
Pattern Recognit., 2011
2010
Proceedings of the 11th International Conference on Control, 2010
2009
An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography.
Proceedings of the Third International Conference on Network and System Security, 2009