Anwar, H.
109  results:
Search for persons X
?
1

Nighttime attraction based on of Gedung Sate area:

, In: Sustainable Development in Creative Industries: Embracing Digital Culture for Humanities,
Abdulhadi, R.H.W. ; Anwar, H. ; Budiono, I.Z. - p. 290-295 , 2023
 
?
2

Identification of building around the Bogor market as formi..:

, In: Sustainable Development in Creative Industries: Embracing Digital Culture for Humanities,
Anwar, H. ; Hambali, R. ; Raja, T. Mulya - p. 102-106 , 2023
 
?
3

A Secure Hierarchical Federated Learning Using Dirichlet-ba..:

, In: 2024 International Conference on Computing, Networking and Communications (ICNC),
 
?
4

Deception-Based IDS Against ARP Spoofing Attacks in Softwar..:

, In: 2024 International Conference on Computing, Networking and Communications (ICNC),
 
?
5

A Network Centrality Game for Epidemic Control:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
Tsemogne, Olivier ; Kouam, Willie ; Anwar, Ahmed H.... - p. 255-273 , 2023
 
?
6

Deception in Drone Surveillance Missions: Strategic vs. Lea..:

, In: Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing,
Wan, Zelin ; Cho, Jin-Hee ; Zhu, Mu... - p. 382-387 , 2023
 
?
7

Mitigating Energy Depletion Attack In Wireless Sensor Netwo..:

, In: ICC 2023 - IEEE International Conference on Communications,
 
?
8

Smart Transportation Systems in Smart Cities: Practices, Ch..:

, In: Smart Cities; Studies in Energy, Resource and Environmental Economics,
 
?
9

FlipPath Game to Counter Stealthy Attacks in SDN-Based Tact..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
10

Cyber Deception Against Zero-Day Attacks: A Game Theoretic ..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
11

Phytoremediation of Stormwater by Floating Treatment Wetlan:

, In: Lecture Notes in Civil Engineering; Proceedings of the 8th International Conference on Water Resource and Environment,
 
?
12

Optimal Honeypot Allocation using Core Attack Graph in Cybe..:

, In: 2023 IEEE 34th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC),
 
?
13

Honeypot Allocation for Cyber Deception in Dynamic Tactical..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
14

Honeypot-Based Cyber Deception Against Malicious Reconnaiss..:

, In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference,
Anwar, Ahmed H. ; Zhu, Mu ; Wan, Zeilin... - p. 3393-3398 , 2022
 
?
15

Deep Learning for Cyber Deception in Wireless Networks:

, In: 2021 17th International Conference on Mobility, Sensing and Networking (MSN),
 
1-15