Efficient intelligent energy routing protocol in wireless sensor networks F Kiani, E Amiri, M Zamani, T Khodadadi, A Abdul Manaf International Journal of Distributed Sensor Networks 11 (3), 618072, 2015 | 131 | 2015 |
Energy efficient routing in wireless sensor networks based on fuzzy ant colony optimization E Amiri, H Keshavarz, M Alizadeh, M Zamani, T Khodadadi International Journal of Distributed Sensor Networks 10 (7), 768936, 2014 | 102 | 2014 |
Qualitative analysis of fractal-fractional order COVID-19 mathematical model with case study of Wuhan Z Ali, F Rabiei, K Shah, T Khodadadi Alexandria Engineering Journal 60 (1), 477-489, 2021 | 63 | 2021 |
Cloud computing: Vision, architecture and Characteristics FF Moghaddam, MB Rohani, M Ahmadi, T Khodadadi, K Madadipouya 2015 IEEE 6th control and system graduate research colloquium (ICSGRC), 1-6, 2015 | 49 | 2015 |
A fractional-order mathematical model for COVID-19 outbreak with the effect of symptomatic and asymptomatic transmissions Z Ali, F Rabiei, MM Rashidi, T Khodadadi The European Physical Journal Plus 137 (3), 395, 2022 | 43 | 2022 |
A hybrid anomaly classification with deep learning (DL) and binary algorithms (BA) as optimizer in the intrusion detection system (IDS) K Atefi, H Hashim, T Khodadadi 2020 16th IEEE international colloquium on signal processing & its …, 2020 | 38 | 2020 |
A survey on wireless mesh networks: Architecture, specifications and challenges M Eslami, O Karimi, T Khodadadi 2014 IEEE 5th control and system graduate research colloquium, 219-222, 2014 | 37 | 2014 |
Fractal-fractional order dynamical behavior of an HIV/AIDS epidemic mathematical model Z Ali, F Rabiei, K Shah, T Khodadadi The European Physical Journal Plus 136 (1), 36, 2021 | 36 | 2021 |
Modeling and analysis of novel COVID-19 under fractal-fractional derivative with case study of Malaysia Z Ali, F Rabiei, K Shah, T Khodadadi Fractals 29 (01), 2150020, 2021 | 33 | 2021 |
Evaluation of Recognition-Based Graphical Password Schemes in Terms of Usability and Security Attributes. T Khodadadi, AKM Islam, S Baharun, S Komaki International Journal of Electrical & Computer Engineering (2088-8708) 6 (6), 2016 | 27 | 2016 |
A prospective study of mobile cloud computing MA Mazdak Zamani, Wan Haslina Hassan, Touraj Khodadadi, Saman Shojae Chaeikar International Journal of Advancements in Computing Technology (IJACT) 5 (11 …, 2013 | 23* | 2013 |
Anomaly detection in online social networks using structure-based technique A Rezaei, ZM Kasirun, VA Rohani, T Khodadadi 8th International Conference for Internet Technology and Secured …, 2013 | 20 | 2013 |
Code analysis of lightweight encryption algorithms using in RFID systems to improve cipher performance M Alizadeh, J Shayan, M Zamani, T Khodadadi 2012 IEEE Conference on Open Systems, 1-6, 2012 | 20 | 2012 |
Hybrid pervasive mobile cloud computing: toward enhancing invisibility Z Sanaei, S Abolfazli, T Khodadadi, F Xia Information—An Int’l Interdisciplinary J 16 (11), 8145-8156, 2013 | 18 | 2013 |
The effective factors on user acceptance in mobile business intelligence G Bargshady, K Pourmahdi, P Khodakarami, T Khodadadi, F Alipanah Jurnal Teknologi (Sciences & Engineering) 72 (4), 49-54, 2015 | 17 | 2015 |
Feasibility of implementing multi-factor authentication schemes in mobile cloud computing M Alizadeh, WH Hassan, T Khodadadi 2014 5th International Conference on Intelligent Systems, Modelling and …, 2014 | 16 | 2014 |
Anonymity and untraceability assessment of authentication protocols in proxy mobile IPv6 M Alizadeh, S Baharun, M Zamani, T Khodadadi, M Darvishi, ... Jurnal Teknologi 72 (5), 31-34, 2015 | 15 | 2015 |
VDCI: Variable data classification index to ensure data protection in cloud computing environments FF Moghaddam, M Yezdanpanah, T Khodadadi, M Ahmadi, M Eslami 2014 IEEE Conference on Systems, Process and Control (ICSPC 2014), 53-57, 2014 | 15 | 2014 |
A novel graphical password authentication scheme with improved usability T Khodadadi, Y Javadianasl, F Rabiei, M Alizadeh, M Zamani, ... 2021 4th International symposium on advanced electrical and communication …, 2021 | 14 | 2021 |
A reliable data protection model based on re-encryption concepts in cloud environments FF Moghaddam, M Vala, M Ahmadi, T Khodadadi, K Madadipouya 2015 IEEE 6th control and system graduate research colloquium (ICSGRC), 11-16, 2015 | 14 | 2015 |