An Overview of Principal Component Analysis S Karamizadeh, S M. Abdullah, A A. Manaf, M Zamani, A Hooman Journal of Signal and Information Processing 4 (3B), 173-175, 2013 | 390 | 2013 |
Authentication in mobile cloud computing: A survey M Alizadeh, S Abolfazli, M Zamani, S Baharun, K Sakurai Journal of Network and Computer Applications 61, 59-80, 2016 | 172 | 2016 |
A taxonomy of botnet detection techniques H Rouhani Zeidanloo, M Jorjor Zadeh Shooshtari, P Vahdani Amoli, ... Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE …, 2010 | 159* | 2010 |
An Introduction to Image Steganography Techniques A A Jabbar Altaay, S Bin Sahib, M Zamani Advanced Computer Science Applications and Technologies (ACSAT), 2012 …, 2012 | 125* | 2012 |
Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks F Kiani, E Amiri, M Zamani, T Khodadadi, AA Manaf International Journal of Distributed Sensor Networks 2015, 1-13, 2015 | 118 | 2015 |
Energy Efficient Routing in Wireless Sensor Networks based on Fuzzy Ant Colony Optimization E Amiri, M Alizadeh, H Keshavarz, M Zamani, T Khodadadi | 97 | 2014 |
Botnet detection based on traffic monitoring HR Zeidanloo, AB Manaf, P Vahdani, F Tabatabaei, M Zamani 2010 International Conference on Networking and Information Technology, 97-101, 2010 | 93 | 2010 |
A genetic-algorithm-based approach for audio steganography M Zamani, A Abdul Manaf, R Ahmad, A Zeki, S Abdullah World Academy of Science, Engineering and Technology 54, 360-363, 2009 | 91 | 2009 |
A secure audio steganography approach M Zamani, A Abdul Manaf, R Ahmad, F Jaryani, H Taherdoost, A Zeki Internet Technology and Secured Transactions, 2009. ICITST 2009 …, 2009 | 88 | 2009 |
Predicting the wind power density based upon extreme learning machine K Mohammadi, S Shamshirband, L Yee, D Petković, M Zamani, S Ch Energy 86, 232-239, 2015 | 83 | 2015 |
A novel approach for rogue access point detection on the client-side S Nikbakhsh, A Abdul Manaf, M Zamani, M Janbeglou Advanced Information Networking and Applications Workshops (WAINA), 2012 …, 2012 | 79 | 2012 |
A Taxonomy of SQL Injection Detection and Prevention Techniques A Sadeghian, M Zamani, A Abdul Manaf International Conference on Informatics and Creative Multimedia 2013 (ICICM’13), 2013 | 69 | 2013 |
Intrusion detection system for the internet of things based on blockchain and multi-agent systems C Liang, B Shanmugam, S Azam, A Karim, A Islam, M Zamani, ... Electronics 9 (7), 1120, 2020 | 64 | 2020 |
An overview of success factors for CRM F Arab, H Selamat, M Zamani 2010 2nd IEEE International Conference on Information and Financial …, 2010 | 64 | 2010 |
A survey on security issues of federated identity in the cloud computing E Ghazizadeh, M Zamani, JA Manan, A Pashang CloudCom, 532-565, 2012 | 62 | 2012 |
SQL Injection Is Still Alive: A Study on SQL Injection Signature Evasion Techniques A Sadeghian, M Zamani, S Ibrahim International Conference on Informatics and Creative Multimedia 2013 (ICICM’13), 2013 | 60 | 2013 |
Robust audio steganography via genetic algorithm M Zamani, H Taherdoost, A Abdul Manaf, R Ahmad, A Zeki Information and Communication Technologies, 2009. ICICT'09. International …, 2009 | 59 | 2009 |
A robust video watermarking technique for the tamper detection of surveillance systems F Arab, SM Abdullah, SZM Hashim, AA Manaf, M Zamani Multimedia Tools and Applications 75 (18), 10855-10885, 2016 | 51 | 2016 |
An approach to improve the robustness of substitution techniques of audio steganography M Zamani, R Ahmad, A Abdul Manaf, A Zeki Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE …, 2009 | 51 | 2009 |
Performance analysis in reactive routing protocols in wireless mobile Ad Hoc networks using DSR, AODV and AOMDV TK Araghi, M Zamani, ABTA Mnaf 2013 International Conference on Informatics and Creative Multimedia, 81-84, 2013 | 50 | 2013 |