A comprehensive android evidence acquisition framework A Sadeghian, M Zamani Multimedia Forensics and Security: Foundations, Innovations, and …, 2017 | 2 | 2017 |
A confidential RFID model to prevent unauthorized access M Gharooni, M Zamani, M Mansourizadeh, S Abdullah Application of Information and Communication Technologies (AICT), 2011 5th …, 2011 | 27 | 2011 |
A Framework to Evaluate the Performance of Video Watermarking Techniques F Arab, M Zamani, S Poger, C Manigault, S Yu 2019 IEEE 2nd International Conference on Information and Computer …, 2019 | 9 | 2019 |
A genetic-algorithm-based approach for audio steganography M Zamani, A Abdul Manaf, R Ahmad, A Zeki, S Abdullah World Academy of Science, Engineering and Technology 54, 360-363, 2009 | 97 | 2009 |
A new method for audio steganography using message integrity MS Atoum, S Ibrahim, G Sulong, M Zamani Journal of Convergence Information Technology 8 (14), 35, 2013 | 26 | 2013 |
A Novel Approach for Audio Watermarking M Zamani, A Abdul Manaf, R Ahmad, A Zeki, P Magalingam 2009 Fifth International Conference on Information Assurance and Security, 83-86, 2009 | 37 | 2009 |
A Novel Approach for Genetic Audio Watermarking M Zamani, A Abdul Manaf, R Ahmad, F Jaryani, H Taherdoost, ... Journal of Information Assurance and Security 5, 102-111, 2010 | 42 | 2010 |
A novel approach for rogue access point detection on the client-side S Nikbakhsh, A Abdul Manaf, M Zamani, M Janbeglou Advanced Information Networking and Applications Workshops (WAINA), 2012 …, 2012 | 82 | 2012 |
A Novel Graphical Password Authentication Scheme with Improved Usability T Khodadadi, Y Javadianasl, F Rabiei, M Alizadeh, M Zamani, ... 2021 4th International Symposium on Advanced Electrical and Communication …, 2021 | 16 | 2021 |
A novel wlan client puzzle against dos attack based on pattern matching A Ordi, M Zamani, N Bashah Idris, A Abdul Manaf, MS Abdullah Mathematical Problems in Engineering 2015, 2015 | 6 | 2015 |
A practical procedure for collecting more volatile information in live investigation of botnet attack Y Javadianasl, AA Manaf, M Zamani Multimedia Forensics and Security: Foundations, Innovations, and …, 2017 | 8 | 2017 |
A Pre-matching Filter to Improve the Query Response Time of Semantic Web Service Discovery K Mohebbi, M Zamani, S Ibrahim Journal of Next Generation Information Technology, 2013 | 12 | 2013 |
A proposed framework for P2P Botnet detection HR Zeidanloo, ABA Manaf, RB Ahmad, M Zamani, SS Chaeikar International Journal of Engineering and Technology 2 (2), 161, 2010 | 37 | 2010 |
A prospective study of mobile cloud computing S Chaeikar International Journal of Advancements in Computing Technology (IJACT) 5 (11 …, 2013 | 22 | 2013 |
A robust video watermarking technique for the tamper detection of surveillance systems F Arab, SM Abdullah, SZM Hashim, AA Manaf, M Zamani Multimedia Tools and Applications 75 (18), 10855-10885, 2016 | 58 | 2016 |
A robust watermark embedding in smooth areas A Zeki, A Abdul Manaf, AA Ibrahim, M Zamani Research Journal of Information Technology 3 (2), 123-131, 2011 | 40 | 2011 |
A secure audio steganography approach M Zamani, A Abdul Manaf, R Ahmad, F Jaryani, H Taherdoost, A Zeki Internet Technology and Secured Transactions, 2009. ICITST 2009 …, 2009 | 95 | 2009 |
A Secure Virtualization Model for Cloud Computing to Defend against DDoS attack S Farahmandian, M Zamani, A Akbarabadi, J Moghimi Zadeh Journal of Next Generation Information Technology, 2013 | 6 | 2013 |
A Survey for Prevention of Black Hole Attacks in Wireless Mobile AdHoc Networks Using Cryptographic Techniques TK Araghi, M Zamani, ABA Manaf, SM Abdullah, SG Lyastani, SK Araghi Latest Trends in Applied Computational Science, 164-169, 2013 | 8* | 2013 |
A Survey for Prevention of Black Hole Attacks in Wireless Mobile Adhoc Networks Using IDS Agents TK Araghi, M Zamani, ABA Manaf, SM Abdullah, H Soltanian Bojnord, ... Latest Trends in Applied Computational Science, 2013 | 17* | 2013 |