Mazdak Zamani
Mazdak Zamani
Felician University
Verified email at FELICIAN.EDU - Homepage
TitleCited byYear
An Overview of Principal Component Analysis
S Karamizadeh, S M. Abdullah, A A. Manaf, M Zamani, A Hooman
Journal of Signal and Information Processing 4 (3B), 173-175, 2013
1262013
A taxonomy of botnet detection techniques
H Rouhani Zeidanloo, M Jorjor Zadeh Shooshtari, P Vahdani Amoli, ...
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE …, 2010
109*2010
Authentication in mobile cloud computing: A survey
M Alizadeh, S Abolfazli, M Zamani, S Baharun, K Sakurai
Journal of Network and Computer Applications 61, 59-80, 2016
912016
A genetic-algorithm-based approach for audio steganography
M Zamani, A Abdul Manaf, R Ahmad, A Zeki, S Abdullah
World Academy of Science, Engineering and Technology 54, 360-363, 2009
762009
A secure audio steganography approach
M Zamani, A Abdul Manaf, R Ahmad, F Jaryani, H Taherdoost, A Zeki
Internet Technology and Secured Transactions, 2009. ICITST 2009 …, 2009
722009
Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks
F Kiani, E Amiri, M Zamani, T Khodadadi, AA Manaf
International Journal of Distributed Sensor Networks 2015, 1-13, 2015
682015
Botnet detection based on traffic monitoring
HR Zeidanloo, AB Manaf, P Vahdani, F Tabatabaei, M Zamani
2010 International Conference on Networking and Information Technology, 97-101, 2010
682010
Energy Efficient Routing in Wireless Sensor Networks based on Fuzzy Ant Colony Optimization
E Amiri, M Alizadeh, H Keshavarz, M Zamani, T Khodadadi
672014
An Introduction to Image Steganography Techniques
A A Jabbar Altaay, S Bin Sahib, M Zamani
Advanced Computer Science Applications and Technologies (ACSAT), 2012 …, 2012
62*2012
A novel approach for rogue access point detection on the client-side
S Nikbakhsh, A Abdul Manaf, M Zamani, M Janbeglou
Advanced Information Networking and Applications Workshops (WAINA), 2012 …, 2012
582012
Predicting the wind power density based upon extreme learning machine
K Mohammadi, S Shamshirband, L Yee, D Petković, M Zamani, S Ch
Energy 86, 232-239, 2015
512015
An overview of success factors for CRM
F Arab, H Selamat, M Zamani
2010 2nd IEEE International Conference on Information and Financial …, 2010
452010
An overview of success factors for CRM
F Arab, H Selamat, M Zamani
2010 2nd IEEE International Conference on Information and Financial …, 2010
452010
A survey on security issues of federated identity in the cloud computing
E Ghazizadeh, M Zamani, JA Manan, A Pashang
CloudCom, 532-565, 2012
442012
Robust audio steganography via genetic algorithm
M Zamani, H Taherdoost, A Abdul Manaf, R Ahmad, A Zeki
Information and Communication Technologies, 2009. ICICT'09. International …, 2009
442009
A Taxonomy of SQL Injection Detection and Prevention Techniques
A Sadeghian, M Zamani, A Abdul Manaf
International Conference on Informatics and Creative Multimedia 2013 (ICICM’13), 2013
432013
An approach to improve the robustness of substitution techniques of audio steganography
M Zamani, R Ahmad, A Abdul Manaf, A Zeki
Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE …, 2009
422009
SQL Injection Is Still Alive: A Study on SQL Injection Signature Evasion Techniques
A Sadeghian, M Zamani, S Ibrahim
International Conference on Informatics and Creative Multimedia 2013 (ICICM’13), 2013
382013
Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID
M Alizadeh, M Salleh, M Zamani, J Shayan, S Karamizadeh
Recent Researches in Communications and Computers, 45-50, 2012
352012
Knots of Substitution Techniques of Audio Steganography
M Zamani, A Abdul Manaf, R Ahmad
The 2009 International Conference on Telecom Technology and Applications …, 2009
342009
The system can't perform the operation now. Try again later.
Articles 1–20