关注
Mohammad  Davarpanah Jazi
Mohammad Davarpanah Jazi
Foulad Institute of Technology, Isfahan University of Technonlogy
没有经过验证的电子邮件地址 - 首页
标题
引用次数
引用次数
年份
Characteristics of hijacked journals and predatory publishers: our observations in the academic world
M Dadkhah, T Maliszewski, MD Jazi
Trends in Pharmacological Sciences 37 (6), 415-418, 2016
592016
Methodology of wavelet analysis in research of dynamics of phishing attacks
M Dadkhah, VV Lyashenko, ZV Deineko, S Shamshirband, MD Jazi
International Journal of Advanced Intelligence Paradigms 12 (3-4), 220-238, 2019
582019
How can we identify hijacked journals?
M Dadkhah, MM Obeidat, MD Jazi, T Sutikno, MA Riyadi
Bulletin of Electrical Engineering and Informatics 4 (2), 83-87, 2015
542015
Privacy in online social networks
M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Computational social networks: security and privacy, 87-113, 2012
522012
Text-independent speaker verification using ant colony optimization-based selected features
S Nemati, ME Basiri
Expert Systems with Applications 38 (1), 620-630, 2011
412011
An introduction to journal phishings and their detection approach
M Dadkhah, T Sutikno, MD Jazi, D Stiawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (2), 373-380, 2015
382015
Deep web content mining
S Ajoudanian, MD Jazi
International Journal of Computer and Information Engineering 3 (1), 63-67, 2009
362009
Fake conferences for earning real money
M Dadkhah, MD Jazi, S Pacukaj
Mediterranean Journal os Social Sciences 6, 2015
332015
Detecting hijacked journals by using classification algorithms
M Andoohgin Shahri, MD Jazi, G Borchardt, M Dadkhah
Science and engineering ethics 24, 655-668, 2018
302018
RETRACTED CHAPTER: A Novel Text-Independent Speaker Verification System Using Ant Colony Optimization Algorithm
S Nemati, R Boostani, MD Jazi
Image and Signal Processing: 3rd International Conference, ICISP 2008 …, 2008
252008
CP2: cryptographic privacy protection framework for online social networks
F Raji, A Miri, MD Jazi
Computers & Electrical Engineering 39 (7), 2282-2298, 2013
212013
Secure payment in E-commerce: Deal with Keyloggers and Phishings
M Dadkhah, MD Jazi
International Journal of Electronics Communication and Computer Engineering …, 2014
202014
An introduction to undetectable keyloggers with experimental testing
M Davarpanah Jazi, AM Ciobotaru, E Barati
International Journal of Computer Communications and Networks (IJCCN) 4 (3), 1-5, 2014
182014
Online social network with flexible and dynamic privacy policies
F Raji, A Miri, MD Jazi, B Malek
2011 CSI International Symposium on Computer Science and Software …, 2011
182011
Methodology of the Chaos Theory in research of phishing attacks
M Dadkhah, V Lyashenko, M Jazi
International Journal of Academic Research 7 (1), 169-175, 2015
142015
A novel approach to deal with keyloggers
M Dadkhah, MD Jazi
Oriental Journal of Computer Science & Technology 7 (1), 25-28, 2014
132014
PESCA: a peer‐to‐peer social network architecture with privacy‐enabled social communication and data availability
F Raji, M Davarpanah Jazi, A Miri
IET Information Security 9 (1), 73-80, 2015
122015
Prediction of phishing websites using classification algorithms based on weight of web pages characteristics
M Dadkhah, M Jazi, V Lyashenko
Baku, Azerbaijan, 2014
122014
Developing expert system in order to detect the journal phishing attacks
M Dadkhah, MD Jazi, MS Mobarakeh, V Lyashenko
Journal of Mathematics and Technology 6 (1), 70-73, 2015
112015
A new challenge in the academic world: earning real money and eminence by paper publishing
M Dadkhah, N Elias, MD Jazi, V Christova-Bagdassarian, KH Abu-Elteen
Jordan Journal of Biological Sciences Guest Editorial 8 (2), 2015
92015
系统目前无法执行此操作,请稍后再试。
文章 1–20