Mohammad  Davarpanah Jazi
Mohammad Davarpanah Jazi
Foulad Institute of Technology
Vahvistettu sähköpostiosoite verkkotunnuksessa cc.iut.ac.ir - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
How can we identify hijacked journals?
M Dadkhah, MM Obeidat, MD Jazi, T Sutikno, MA Riyadi
Bulletin of Electrical Engineering and Informatics 4 (2), 83-87, 2015
552015
Privacy in online social networks
M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Computational Social Networks, 87-113, 2012
432012
Text-independent speaker verification using ant colony optimization-based selected features
S Nemati, ME Basiri
Expert Systems with Applications 38 (1), 620-630, 2011
372011
Deep web content mining
S Ajoudanian, MD Jazi
World Academy of Science, Engineering and Technology 49 (1), 501-505, 2009
342009
Characteristics of hijacked journals and predatory publishers: our observations in the academic world
M Dadkhah, T Maliszewski, MD Jazi
Trends in pharmacological sciences 37 (6), 415-418, 2016
322016
Fake conferences for earning real money
M Dadkhah, MD Jazi, S Pacukaj
Mediterranean Journal of Social Sciences 6 (2), 11-11, 2015
292015
Retracted: A novel text-independent speaker verification system using ant colony optimization algorithm
S Nemati, R Boostani, MD Jazi
International Conference on Image and Signal Processing, 421-429, 2008
242008
Retracted: A novel text-independent speaker verification system using ant colony optimization algorithm
S Nemati, R Boostani, MD Jazi
International Conference on Image and Signal Processing, 421-429, 2008
242008
An introduction to journal phishings and their detection approach
M Dadkhah, T Sutikno, MD Jazi, D Stiawan
Telkomnika 13 (2), 373, 2015
232015
Secure payment in E-commerce: Deal with Keyloggers and Phishings
M Dadkhah, MD Jazi
International Journal of Electronics Communication and Computer Engineering …, 2014
182014
CP2: Cryptographic privacy protection framework for online social networks
F Raji, A Miri, MD Jazi
Computers & Electrical Engineering 39 (7), 2282-2298, 2013
182013
Online social network with flexible and dynamic privacy policies
F Raji, A Miri, MD Jazi, B Malek
2011 CSI International Symposium on Computer Science and Software …, 2011
152011
Detecting hijacked journals by using classification algorithms
MA Shahri, MD Jazi, G Borchardt, M Dadkhah
Science and engineering ethics 24 (2), 655-668, 2018
112018
A novel approach to deal with keyloggers
M Dadkhah, MD Jazi
Oriental Journal of Computer Science & Technology 7 (1), 25-28, 2014
112014
Methodology of wavelet analysis in research of dynamics of phishing attacks
M Dadkhah, VV Lyashenko, ZV Deineko, S Shamshirband, MD Jazi
International Journal of Advanced Intelligence Paradigms 12 (3-4), 220-238, 2019
102019
PESCA: a peer‐to‐peer social network architecture with privacy‐enabled social communication and data availability
F Raji, M Davarpanah Jazi, A Miri
IET Information Security 9 (1), 73-80, 2015
92015
A new challenge in the academic world: earning real money and eminence by paper publishing
M Dadkhah, N Elias, MD Jazi, V Christova-Bagdassarian, KH Abu-Elteen
Jordan Journal of Biological Sciences 8 (2), 73-75, 2015
82015
An Introduction to Undetectable Keyloggers with Experimental Testing
M Davarpanah Jazi, AM Ciobotaru, E Barati
International Journal of Computer Communications and Networks (IJCCN) 4 (3), 1-5, 2014
72014
Preserving privacy in online social networks
F Raji, A Miri, MD Jazi
International Symposium on Foundations and Practice of Security, 1-13, 2011
72011
Hiring editorial member for receiving papers from authors
M Dadkhah, A Tarhini, VV Lyashenko, MD Jazi
Mediterranean Journal of Social Sciences 6 (4), 11, 2015
62015
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20