Touraj Khodadadi
Touraj Khodadadi
Malaysia University of Science and Technology
Verified email at must.edu.my
Title
Cited by
Cited by
Year
Efficient intelligent energy routing protocol in wireless sensor networks
F Kiani, E Amiri, M Zamani, T Khodadadi, A Abdul Manaf
International Journal of Distributed Sensor Networks 11 (3), 618072, 2015
962015
Energy efficient routing in wireless sensor networks based on fuzzy ant colony optimization
E Amiri, H Keshavarz, M Alizadeh, M Zamani, T Khodadadi
International Journal of Distributed Sensor Networks 10 (7), 768936, 2014
862014
Cloud computing: Vision, architecture and Characteristics
FF Moghaddam, MB Rohani, M Ahmadi, T Khodadadi, K Madadipouya
2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC), 1-6, 2015
342015
A survey on wireless mesh networks: Architecture, specifications and challenges
M Eslami, O Karimi, T Khodadadi
2014 IEEE 5th Control and System Graduate Research Colloquium, 219-222, 2014
262014
A prospective study of mobile cloud computing
S Chaeikar
International Journal of Advancements in Computing Technology (IJACT) 5 (11 …, 2013
172013
Code analysis of lightweight encryption algorithms using in RFID systems to improve cipher performance
M Alizadeh, J Shayan, M Zamani, T Khodadadi
2012 IEEE Conference on Open Systems, 1-6, 2012
172012
Evaluation of recognition-based graphical password schemes in terms of usability and security attributes
T Khodadadi, AKMM Islam, S Baharun, S Komaki
International Journal of Electrical and Computer Engineering 6 (6), 2939, 2016
162016
Anomaly detection in online social networks using structure-based technique
A Rezaei, ZM Kasirun, VA Rohani, T Khodadadi
8th International Conference for Internet Technology and Secured …, 2013
162013
Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6
M Alizadeh, S Baharun, M Zamani, T Khodadadi, M Darvishi, ...
Jurnal Teknologi 72 (5), 2015
132015
The effective factors on user acceptance in mobile business intelligence
G Bargshady, K Pourmahdi, P Khodakarami, T Khodadadi, F Alipanah
Jurnal Teknologi 72 (4), 2015
132015
Feasibility of implementing multi-factor authentication schemes in mobile cloud computing
M Alizadeh, WH Hassan, T Khodadadi
2014 5th International Conference on Intelligent Systems, Modelling and …, 2014
132014
A reliable data protection model based on re-encryption concepts in cloud environments
FF Moghaddam, M Vala, M Ahmadi, T Khodadadi, K Madadipouya
2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC), 11-16, 2015
112015
A comparative study of time management and energy consumption in mobile cloud computing
M Ahmadi, N Khanezaei, S Manavi, FF Moghaddam, T Khodadadi
2014 IEEE 5th Control and System Graduate Research Colloquium, 199-203, 2014
112014
VDCI: Variable data classification index to ensure data protection in cloud computing environments
FF Moghaddam, M Yezdanpanah, T Khodadadi, M Ahmadi, M Eslami
2014 IEEE Conference on Systems, Process and Control (ICSPC 2014), 53-57, 2014
102014
Modeling and analysis of novel COVID-19 under fractal-fractional derivative with case study of Malaysia
Z Ali, F Rabiei, K Shah, T Khodadadi
Fractals 29 (01), 2150020, 2021
92021
Security and privacy criteria to evaluate authentication mechanisms in proxy mobile ipv6
M Alizadeh, M Zamani, S Baharun, WH Hassan, T Khodadadi
Jurnal Teknologi 72 (5), 2015
92015
Qualitative analysis of fractal-fractional order COVID-19 mathematical model with case study of Wuhan
Z Ali, F Rabiei, K Shah, T Khodadadi
Alexandria Engineering Journal 60 (1), 477-489, 2021
72021
Fractal-fractional order dynamical behavior of an HIV/AIDS epidemic mathematical model
Z Ali, F Rabiei, K Shah, T Khodadadi
The European Physical Journal Plus 136 (1), 1-17, 2021
72021
A Hybrid Anomaly Classification with Deep Learning (DL) and Binary Algorithms (BA) as Optimizer in the Intrusion Detection System (IDS)
K Atefi, H Hashim, T Khodadadi
2020 16th IEEE International Colloquium on Signal Processing & Its …, 2020
52020
SUAS: Scalable user authentication scheme for secure accessing to cloud-based environments
FF Moghaddam, RR Ravan, T Khodadadi, Y Javadianasl, A Halalzadeh
2014 IEEE Symposium on Computer Applications and Industrial Electronics …, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20