Mazdak Zamani
Mazdak Zamani
New York University - Felician University
Verified email at NYU.EDU
Cited by
Cited by
An Overview of Principal Component Analysis
S Karamizadeh, S M. Abdullah, A A. Manaf, M Zamani, A Hooman
Journal of Signal and Information Processing 4 (3B), 173-175, 2013
Authentication in mobile cloud computing: A survey
M Alizadeh, S Abolfazli, M Zamani, S Baharun, K Sakurai
Journal of Network and Computer Applications 61, 59-80, 2016
A taxonomy of botnet detection techniques
H Rouhani Zeidanloo, M Jorjor Zadeh Shooshtari, P Vahdani Amoli, ...
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE …, 2010
An Introduction to Image Steganography Techniques
A A Jabbar Altaay, S Bin Sahib, M Zamani
Advanced Computer Science Applications and Technologies (ACSAT), 2012 …, 2012
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
C Liang, B Shanmugam, S Azam, A Karim, A Islam, M Zamani, ...
Electronics 9 (7), 1120, 2020
Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks
F Kiani, E Amiri, M Zamani, T Khodadadi, AA Manaf
International Journal of Distributed Sensor Networks 2015, 1-13, 2015
Botnet detection based on traffic monitoring
HR Zeidanloo, AB Manaf, P Vahdani, F Tabatabaei, M Zamani
2010 International Conference on Networking and Information Technology, 97-101, 2010
Energy Efficient Routing in Wireless Sensor Networks based on Fuzzy Ant Colony Optimization
E Amiri, M Alizadeh, H Keshavarz, M Zamani, T Khodadadi
A genetic-algorithm-based approach for audio steganography
M Zamani, A Abdul Manaf, R Ahmad, A Zeki, S Abdullah
World Academy of Science, Engineering and Technology 54, 360-363, 2009
Predicting the wind power density based upon extreme learning machine
K Mohammadi, S Shamshirband, L Yee, D Petković, M Zamani, S Ch
Energy 86, 232-239, 2015
A secure audio steganography approach
M Zamani, A Abdul Manaf, R Ahmad, F Jaryani, H Taherdoost, A Zeki
Internet Technology and Secured Transactions, 2009. ICITST 2009 …, 2009
A novel approach for rogue access point detection on the client-side
S Nikbakhsh, A Abdul Manaf, M Zamani, M Janbeglou
Advanced Information Networking and Applications Workshops (WAINA), 2012 …, 2012
A Taxonomy of SQL Injection Detection and Prevention Techniques
A Sadeghian, M Zamani, A Abdul Manaf
International Conference on Informatics and Creative Multimedia 2013 (ICICM’13), 2013
An overview of success factors for CRM
F Arab, H Selamat, M Zamani
2010 2nd IEEE International Conference on Information and Financial …, 2010
A survey on security issues of federated identity in the cloud computing
E Ghazizadeh, M Zamani, JA Manan, A Pashang
CloudCom, 532-565, 2012
SQL Injection Is Still Alive: A Study on SQL Injection Signature Evasion Techniques
A Sadeghian, M Zamani, S Ibrahim
International Conference on Informatics and Creative Multimedia 2013 (ICICM’13), 2013
Robust audio steganography via genetic algorithm
M Zamani, H Taherdoost, A Abdul Manaf, R Ahmad, A Zeki
Information and Communication Technologies, 2009. ICICT'09. International …, 2009
A robust video watermarking technique for the tamper detection of surveillance systems
F Arab, SM Abdullah, SZM Hashim, AA Manaf, M Zamani
Multimedia Tools and Applications 75 (18), 10855-10885, 2016
Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID
M Alizadeh, M Salleh, M Zamani, J Shayan, S Karamizadeh
Recent Researches in Communications and Computers, 45-50, 2012
A Taxonomy of SQL Injection Attacks
A Sadeghian, M Zamani, S Abdullah
International Conference on Informatics and Creative Multimedia 2013 (ICICM’13), 2013
The system can't perform the operation now. Try again later.
Articles 1–20