Royyana Muslim Ijtihadie
Institut Teknologi Sepuluh Nopember
H-index: 9
Asia-Indonesia
Top articles of Royyana Muslim Ijtihadie
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Botnet sequential activity detection with hybrid analysis | Egyptian Informatics Journal | Muhammad Aidiel Rachman Putra Tohari Ahmad Dandy Pramana Hostiadi Royyana Muslim Ijtihadie | 2024/3/1 |
Botnet Attack Analysis through Graph Visualization. | International Journal of Intelligent Engineering & Systems | Muhammad Aidiel Rachman Putra Tohari Ahmad Dandy Pramana Hostiadi Royyana Muslim Ijtihadie Pascal Maniriho | 2024/1/1 |
Pixel-block-based Steganalysis Method for Hidden Data Location in Digital Images. | International Journal of Intelligent Engineering & Systems | Ntivuguruzwa Jean De La Croix Tohari Ahmad Royyana Muslim Ijtihadie | 2023/11/1 |
Reversible data hiding based on histogram and prediction error for sharing secret data | Cybersecurity | Chaidir Chalaf Islamy Tohari Ahmad Royyana Muslim Ijtihadie | 2023/6/2 |
Answering Durable Skyline Queries on Multidimensional Time Series Data Using Grid-Based Approach | Bagus Jati Santoso Royyana Muslim Ijtihadie I Nyoman Yoga Mahottama | 2023/10/4 | |
Vulnerability Data Assessment and Management Based on Passive Scanning Method and CVSS | Bagus Jati Santoso Royyana Muslim Ijtihadie Gusti Ngurah Satria Aryawan | 2023/10/4 | |
Convolutional Neural Network with Multi-scale Pooling for the Efficient Steganalysis in Images of Arbitrary Sizes | Ntivuguruzwa Jean De La Croix Tohari Ahmad Royyana Muslim Ijtihadie | 2023/10/4 | |
A Docker Container-Based Solution for Course Archival on Moodle: Implementation and Evaluation | Bagus Jati Santoso Royyana Muslim Ijtihadie Zahratul Millah | 2023/9/28 | |
Detecting Botnet Spam Activity by Analyzing Network Traffic Using Two-Stack Decision Tree Algorithms | Muhammad Aidiel Rachman Putra Tohari Ahmad Royyana Muslim Ijtihadie Dandy Pramana Hostiadi | 2023/11/10 | |
Git-Enabled Middleware for Data Change Management on Network Devices Configuration | Bagus Jati Santoso Royyana Muslim Ijtihadie Muhammad Faris Didin Andiyar Baskoro Adi Pratomo Hudan Studiawan | 2023/9/28 | |
Training Autoencoders with Noisy Training Sets for Detecting Low-rate Attacks on the Network | Baskoro Adi Pratomo Ahmad Ibnu Fajar Abdul Munif Royyana Muslim Ijtihadie Hudan Studiawan | 2022/6/16 | |
Analysis of autoencoder compression performance in intrusion detection system | International Journal of Safety and Security Engineering | I Gede Agung Krisna Pamungkas Tohari Ahmad Royyana Muslim Ijtihadie | 2022/6 |
Implementing Autoencoder Compression to Intrusion Detection System | I Gede Agung Krisna Pamungkas Tohari Ahmad Royyana Muslim Ijtihadie Ary Mazharuddin Shiddiqi | 2022/12/13 | |
Prototyping distributed botnet detection system in computer networks | Muhammad Aidiel Rachman Putra Tohari Ahmad Royyana Muslim Ijtihadie Dandy Pramana Hostiadi | 2022/3/9 | |
Secret Image Sharing and Steganography based on Fuzzy Logic and Prediction Error | Chaidir Chalaf Islamy Tohari Ahmad Royyana Muslim Ijtihadie | 2022/11/3 | |
A survey on logging in distributed system | Swardiantara Silalahi Royyana Muslim Ijtihadie Tohari Ahmad Hudan Studiawan | 2022/7/27 | |
Analyzing ANOVA F-test and Sequential Feature Selection for Intrusion Detection Systems. | International Journal of Advances in Soft Computing & Its Applications | Muhammad Jaya Siraj Tohari Ahmad Royyana Muslim Ijtihadie | 2022/7/1 |
Evaluating the Impact of the Number of Secret Sharing Participants on Stego Image | Chaidir Chalaf Islamy Tohari Ahmad Royyana Muslim Ijtihadie | 2021/10/23 | |
e-Torres: An Efficient Torrent Video Streaming on Android Platform | Ananta Dwi Prasetya Purna Yuda Ary Mazharuddin Shiddiqi Royyana Muslim Ijtihadie | 2021/9/18 | |
Multi-Device Task Offloading with Scheduling in an Edge Cloud Platform | Moch Yasin Tohari Ahmad Royyana Muslim Ijtihadie | 2021/7/17 |