Browse Faculty

   

Tohari Ahmad S.Kom., MIT, Ph.D

Email:

Department: D. Teknik Informatika

Faculty: Fakultas Teknologi Elektro dan Informatika Cerdas

Affiliations

Prof.Ir. Supeno Djanali M.Sc Ph.D

D. Teknik Informatika

Prof. Drs. Ec. Ir. Riyanarto Sarno M.Sc., Ph.D

D. Teknik Informatika

Waskitho Wibisono S.Kom., M.Eng., Ph.D

D. Teknik Informatika

Royyana Muslim Ijtihadie S.Kom, M.Kom., Ph.D

D. Teknik Informatika

Ary Mazharuddin Shiddiqi S.Kom., M.Comp.Sc.,

D. Teknik Informatika

Dr.Eng. Radityo Anggoro S.Kom, M.Sc

D. Teknik Informatika

Hudan Studiawan S.Kom., M.Kom.

D. Teknik Informatika

Baskoro Adi Pratomo S.Kom, M.Kom

D. Teknik Informatika

Abdul Munif S.Kom, M.Sc.Eng

D. Teknik Informatika

×

EXPERT MAP

×

Publications

CONFERENCES & JOURNALS

BOOKS & RESEARCHS

PATENS
×

 

  CONFERENCES

  Scopus

 29

 29

 

  JOURNALS

  Scopus

 18

 18

 

  BOOKS

 0

 

  RESEARCHS

 16


    • 1.

      2011 : A novel image encryption method based on invertible 3D maps and its security analysis

      2.

      2011 : String-based cancelable fingerprint templates

      3.

      2011 : Cartesian and polar transformation-based cancelable fingerprint template

      4.

      2010 : Generating cancelable biometric templates using a projection line

      5.

      2009 : An efficient mobile voting system security scheme based on elliptic curve cryptography

    • 1.

      2019 : Continuous Top-k Dominating Query of Incomplete Data over Data Streams

      2.

      2018 : SCFT: Sector-based cancelable fingeprint template

      3.

      2018 : A data hiding approach using enhanced-RDE in grayscale images

      4.

      2018 : Enhanced pixel value modification based on modulus function for RGB image steganography

      5.

      2018 : Protecting data by improving quality of stego image based on enhanced reduced difference expansion

      6.

      2018 : Edit distance weighting modification using phonetic and typographic letter grouping over homomorphic encrypted data

      7.

      2017 : Adaptive image compression using Adaptive Huffman and LZW

      8.

      2017 : Difference expansion-based data hiding method by changing expansion media

      9.

      2017 : Hiding secret data by using modulo function in quad difference expansion

      10.

      2017 : A mobile crowdsensing framework for integrating smartphone and IoT devices to cloud computing services

      11.

      2017 : A Study on Intrusion Detection Using Centroid-Based Classification

      12.

      2017 : Increasing performance of IDS by selecting and transforming features

      13.

      2017 : Overlapped scheme for neighboring similarity method in video-based data hiding

      14.

      2017 : Using Quality Threshold distance to detect intrusion in TCP/IP network

      15.

      2016 : Enhancing DE-based data hiding method by controlling the expansion

      16.

      2016 : Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale images

      17.

      2016 : Improving the performance of projection-based cancelable fingerprint template method

      18.

      2016 : An improved neighbouring similarity method for video steganography

      19.

      2015 : Detecting Intrusion Using Recursive Clustering and Sum of Log Distance to Sub-centroid

      20.

      2014 : Shared secret-based steganography for protecting medical data

      21.

      2014 : Identification of process-based fraud patterns in credit application

      22.

      2014 : A prototype of event-based tracking system for mobile users

      23.

      2013 : An improved Quad and RDE-based medical data hiding method

      24.

      2013 : Falls detection and notification system using tri-axial accelerometer and gyroscope sensors of a smartphone

      25.

      2011 : A novel image encryption method based on invertible 3D maps and its security analysis

      26.

      2011 : String-based cancelable fingerprint templates

      27.

      2011 : Cartesian and polar transformation-based cancelable fingerprint template

    • - no conferences recorded -
    • - no conferences recorded -
    • 1.

      2011 : A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment

      2.

      2011 : Pair-polar coordinate-based cancelable fingerprint templates

    • 1.

      2019 : HIGH QUALITY PVM BASED REVERSIBLE DATA HIDING METHOD FOR DIGITAL IMAGES

      2.

      2018 : Adaptive pixel value grouping for protecting secret data in public computer networks

      3.

      2018 : Improving Prediction Error Expansion based data hiding method for securing confidential data

      4.

      2018 : Enhancing the performance of audio data hiding method by smoothing interpolated samples

      5.

      2018 : Protecting data by improving quality of stego image based on enhanced reduced difference expansion

      6.

      2018 : Detecting malicious activities in a computer cluster for developing dynamic honeypot

      7.

      2018 : Enhancing the capability of data hiding method based on reduced difference expansion

      8.

      2018 : Securing secret data by enhancing the controlling expansion method

      9.

      2018 : Information hiding scheme for digital images using difference expansion and modulus function

      10.

      2017 : Medical record protection with improved grde data hiding method on audio files

      11.

      2016 : L-SCANN: Logarithmic subcentroid and nearest neighbor

      12.

      2016 : Audio data hiding based on sample value modification using modulus function

      13.

      2016 : Increasing accuracy of process-based fraud detection using a behavior model

      14.

      2015 : Fuzzy MADM approach for rating of process-based fraud

      15.

      2015 : Secret data hiding by optimizing general smoothness difference expansionbased method

      16.

      2015 : Hybrid association rule learning and process mining for fraud detection

      17.

      2011 : A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment

      18.

      2011 : Pair-polar coordinate-based cancelable fingerprint templates

    • - no journals recorded -
    • - no journals recorded -
  • - no books recorded -
  • 1.

    2020 : Tohari Ahmad, Metode Proteksi untuk Meningkatkan Keamanan Data pada Jaringan Komputer

    2.

    2020 : Tohari Ahmad, Pengembangan Metode Data Hiding dan Optimasi Intrusion Detection System pada Jaringan Komputer untuk Proteksi Data

    3.

    2020 : Tohari Ahmad, Mekanisme Network Balancing dan Efisiensi Flooding di Lingkungan Hybrid Jaringan Software Defined Network untuk Menunjang Keamanan Informasi

    4.

    2020 : Pengembangan Mekanisme Grid-Based Clustering dan Mobile Data Ferry Untuk Penghematan Energy Pada Proses Transmisi Data Di Lingkungan Wireless Sensor Network

    5.

    2019 : Pengembangan Mekanisme Komputasi Offloading Untuk Peningkatan Kinerja dan Efisiensi Sumber Daya Pada Perangkat Bergerak Di Lingkungan Nirkabel

    6.

    2019 : Tohari Ahmad, Metode Proteksi untuk Meningkatkan Keamanan Data pada Jaringan Komputer

    7.

    2019 : Pengembangan Mekanisme Routing Adaptif dan Penanganan Routing Hole Untuk Pengurangan Kongesti Dan Peningkatan Kinerja Jaringan Sensor Nirkabel

    8.

    2019 : Tohari Ahmad, Pengembangan Metode Pengamanan Data

    9.

    2018 : Pengembangan Protokol Pengiriman dan Agregasi Data Untuk Penghematan Energi dan Penjaminan Reliabilitas Pengiriman Data Pada Lingkungan Wireless Sensor Network

    10.

    2018 : Tohari Ahmad, Pengembangan Metode Proteksi untuk Menjaga Keamanan Data dan privasi Pengguna

    11.

    2016 : Tohari Ahmad, Rancang bangun mekanisme transformasi untuk pengamanan data \n

    12.

    2016 : Pengembangan Mekanisme Clustering Sensor Node Secara Adaptif pada Lingkungan jaringan Sensor Nirkabel untuk Pengaturan Distribusi Beban dan Penghematan Energi\n

    13.

    2015 : Rancang Bangun Sistem Tracking Posisi Multi User Pada Lingkungan Bergerak dengan Model Interaksi Publish-Subscribe

    14.

    2015 : Tohari Ahmad, Rancang bangun mekanisme transformasi untuk pengamanan data\n

    15.

    2014 : Tohari Ahmad, Pengembangan teknik steganography pada citra medis untuk menjaga privasi pasien\n

    16.

    2014 : Rancang Bangun Sistem Tracking Posisi Multi User Pada Lingkungan Bergerak dengan Model Interaksi Publish-Subscribe\n

  • - no patents recorded -
    • - no social responsibilities recorded -
    • 1.

      2020 : Penggunaan Internet dan Teknologi IoT untuk Meningkatkan Kualitas Pendidikan

      2.

      2019 : Peningkatan Kualitas Pembelajaran dengan Menggunakan E-Learning

      3.

      2019 : Peningkatan Pemahaman Teknologi Internet of Things (IoT) terhadap Guru dan Murid di SD Raden Patah Surabaya untuk Meningkatkan Kualitas Pembelajaran

      4.

      2018 : Aplikasi Mobile untuk Pencatatan Peralatan Infrastruktur Jaringan di Lingkungan DPTSI ITS

      5.

      2017 : Implementasi Sistem untuk Proses Manajemen di Masjid Asasul A’mal

      6.

      2016 : Peningkatan Kualitas Guru SMA di Tulungagung dalam Bidang TIK Untuk Penyiapan Materi Pembelajaran

      7.

      2016 : Sistem Informasi Pengelolaan Peralatan Infrastruktur Jaringan Komputer di Lingkungan LPTSI ITS\n

    • - no social responsibilities recorded -
    • 1.

      2020 : Penggunaan Internet dan Teknologi IoT untuk Meningkatkan Kualitas Pendidikan

      2.

      2019 : Peningkatan Kualitas Pembelajaran dengan Menggunakan E-Learning

      3.

      2019 : Peningkatan Pemahaman Teknologi Internet of Things (IoT) terhadap Guru dan Murid di SD Raden Patah Surabaya untuk Meningkatkan Kualitas Pembelajaran

      4.

      2018 : Aplikasi Mobile untuk Pencatatan Peralatan Infrastruktur Jaringan di Lingkungan DPTSI ITS

      5.

      2017 : Implementasi Sistem untuk Proses Manajemen di Masjid Asasul A’mal

      6.

      2016 : Peningkatan Kualitas Guru SMA di Tulungagung dalam Bidang TIK Untuk Penyiapan Materi Pembelajaran

      7.

      2016 : Sistem Informasi Pengelolaan Peralatan Infrastruktur Jaringan Komputer di Lingkungan LPTSI ITS\n

© 2015 ICT Services and Development - Sepuluh Nopember Institute of Technology