Follow
Tohari Ahmad
Title
Cited by
Cited by
Year
Pair-polar coordinate-based cancelable fingerprint templates
T Ahmad, J Hu, S Wang
Pattern recognition 44 (10-11), 2555-2564, 2011
1862011
A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment
K Xi, T Ahmad, F Han, J Hu
Security and Communication Networks 4 (5), 487-499, 2011
1242011
Hybrid Association Rule Learning and Process Mining for Fraud Detection.
R Sarno, RD Dewandono, T Ahmad, MF Naufal, F Sinaga
IAENG International Journal of Computer Science 42 (2), 2015
1122015
Information hiding scheme for digital images using difference expansion and modulus function
P Maniriho, T Ahmad
Journal of king saud university-computer and information sciences 31 (3 …, 2019
1042019
Data preprocessing and feature selection for machine learning intrusion detection systems
T Ahmad, MN Aziz
ICIC Express Lett 13 (2), 93-101, 2019
952019
Anomaly-based intrusion detection approach for IoT networks using machine learning
P Maniriho, E Niyigaba, Z Bizimana, V Twiringiyimana, LJ Mahoro, ...
2020 international conference on computer engineering, network, and …, 2020
682020
An efficient mobile voting system security scheme based on elliptic curve cryptography
T Ahmad, J Hu, S Han
2009 Third International Conference on Network and System Security, 474-479, 2009
602009
Fuzzy MADM approach for rating of process-based fraud
S Huda, R Sarno, T Ahmad
Journal of ICT Research and Applications 9 (2), 111-128, 2015
492015
A hybrid machine learning method for increasing the performance of network intrusion detection systems
AA Megantara, T Ahmad
Journal of Big Data 8 (1), 142, 2021
472021
An Improved Quad and RDE-based Medical Data Hiding Method
T Ahmad, M Holil, W Wibisono, RM Ijtihadie
CYBERNETICSCOM, 141-145, 2013
452013
Falls detection and notification system using tri-axial accelerometer and gyroscope sensors of a smartphone
W Wibisono, DN Arifin, BA Pratomo, T Ahmad, RM Ijtihadie
2013 Conference on Technologies and Applications of Artificial Intelligence …, 2013
432013
Identification of Process-based Fraud Patterns in Credit Application
S Huda, T Ahmad, R Sarno, HA Santoso
392014
Detecting Intrusions in Computer Network Traffic with Machine Learning Approaches.
P Maniriho, LJ Mahoro, E Niyigaba, Z Bizimana, T Ahmad
International Journal of Intelligent Engineering & Systems 13 (3), 2020
352020
Generating cancelable biometrie templates using a projection line
T Ahmad, J Hu
2010 11th International Conference on Control Automation Robotics & Vision, 7-12, 2010
342010
Improving intrusion detection system by estimating parameters of random forest in Boruta
AN Iman, T Ahmad
2020 International Conference on Smart Technology and Applications (ICoSTA), 1-6, 2020
322020
Penggunaan Internet dan Teknologi IoT untuk Meningkatkan Kualitas Pendidikan
AM Shiddiqi, RM Ijtihadie, T Ahmad, W Wibisono, R Anggoro, BJ Santos
Sewagati 4 (3), 235-240, 2020
322020
Increasing accuracy of process-based fraud detection using a behavior model
S Huda, R Sarno, T Ahmad
International Journal of Software Engineering and Its Applications 10 (5 …, 2016
312016
Medical Record Protection with Improved GRDE Data Hiding Method on Audio Files.
MB Andra, T Ahmad, T Usagawa
Engineering Letters 25 (2), 2017
302017
Reversible data hiding using pixel-value-ordering and difference expansion in digital images
NJ de La Croix, CC Islamy, T Ahmad
2022 IEEE International Conference on Communication, Networks and Satellite …, 2022
292022
Secret message protection using fuzzy logic and difference expansion in digital images
NJ De La Croix, CC Islamy, T Ahmad
2022 IEEE Nigeria 4th International Conference on Disruptive Technologies …, 2022
292022
The system can't perform the operation now. Try again later.
Articles 1–20