An Overview of Principal Component Analysis S Karamizadeh, S M. Abdullah, A A. Manaf, M Zamani, A Hooman Journal of Signal and Information Processing 4 (3B), 173-175, 2013 | 662 | 2013 |
Authentication in mobile cloud computing: A survey M Alizadeh, S Abolfazli, M Zamani, S Baharun, K Sakurai Journal of Network and Computer Applications 61, 59-80, 2016 | 211 | 2016 |
A taxonomy of botnet detection techniques H Rouhani Zeidanloo, M Jorjor Zadeh Shooshtari, P Vahdani Amoli, ... Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE …, 2010 | 193* | 2010 |
Intrusion detection system for the internet of things based on blockchain and multi-agent systems C Liang, B Shanmugam, S Azam, A Karim, A Islam, M Zamani, ... Electronics 9 (7), 1120, 2020 | 154 | 2020 |
An Introduction to Image Steganography Techniques A A Jabbar Altaay, S Bin Sahib, M Zamani Advanced Computer Science Applications and Technologies (ACSAT), 2012 …, 2012 | 151* | 2012 |
Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks F Kiani, E Amiri, M Zamani, T Khodadadi, AA Manaf International Journal of Distributed Sensor Networks 2015, 1-13, 2015 | 136 | 2015 |
Botnet detection based on traffic monitoring HR Zeidanloo, AB Manaf, P Vahdani, F Tabatabaei, M Zamani 2010 International Conference on Networking and Information Technology, 97-101, 2010 | 109 | 2010 |
Energy Efficient Routing in Wireless Sensor Networks based on Fuzzy Ant Colony Optimization E Amiri, M Alizadeh, H Keshavarz, M Zamani, T Khodadadi | 106 | 2014 |
Predicting the wind power density based upon extreme learning machine K Mohammadi, S Shamshirband, L Yee, D Petković, M Zamani, S Ch Energy 86, 232-239, 2015 | 98 | 2015 |
A genetic-algorithm-based approach for audio steganography M Zamani, A Abdul Manaf, R Ahmad, A Zeki, S Abdullah World Academy of Science, Engineering and Technology 54, 360-363, 2009 | 97 | 2009 |
A secure audio steganography approach M Zamani, A Abdul Manaf, R Ahmad, F Jaryani, H Taherdoost, A Zeki Internet Technology and Secured Transactions, 2009. ICITST 2009 …, 2009 | 95 | 2009 |
A Taxonomy of SQL Injection Detection and Prevention Techniques A Sadeghian, M Zamani, A Abdul Manaf International Conference on Informatics and Creative Multimedia 2013 (ICICM’13), 2013 | 82 | 2013 |
A novel approach for rogue access point detection on the client-side S Nikbakhsh, A Abdul Manaf, M Zamani, M Janbeglou Advanced Information Networking and Applications Workshops (WAINA), 2012 …, 2012 | 82 | 2012 |
An overview of success factors for CRM F Arab, H Selamat, M Zamani 2010 2nd IEEE International Conference on Information and Financial …, 2010 | 71 | 2010 |
SQL Injection Is Still Alive: A Study on SQL Injection Signature Evasion Techniques A Sadeghian, M Zamani, S Ibrahim International Conference on Informatics and Creative Multimedia 2013 (ICICM’13), 2013 | 69 | 2013 |
A survey on security issues of federated identity in the cloud computing E Ghazizadeh, M Zamani, JA Manan, A Pashang CloudCom, 532-565, 2012 | 69 | 2012 |
Pathway of trends and technologies in fall detection: a systematic review R Tanwar, N Nandal, M Zamani, AA Manaf Healthcare 10 (1), 172, 2022 | 68 | 2022 |
Robust audio steganography via genetic algorithm M Zamani, H Taherdoost, A Abdul Manaf, R Ahmad, A Zeki Information and Communication Technologies, 2009. ICICT'09. International …, 2009 | 63 | 2009 |
A robust video watermarking technique for the tamper detection of surveillance systems F Arab, SM Abdullah, SZM Hashim, AA Manaf, M Zamani Multimedia Tools and Applications 75 (18), 10855-10885, 2016 | 62 | 2016 |
A Taxonomy of SQL Injection Attacks A Sadeghian, M Zamani, S Abdullah International Conference on Informatics and Creative Multimedia 2013 (ICICM’13), 2013 | 61 | 2013 |