Characteristics of hijacked journals and predatory publishers: our observations in the academic world M Dadkhah, T Maliszewski, MD Jazi Trends in Pharmacological Sciences 37 (6), 415-418, 2016 | 59 | 2016 |
Methodology of wavelet analysis in research of dynamics of phishing attacks M Dadkhah, VV Lyashenko, ZV Deineko, S Shamshirband, MD Jazi International Journal of Advanced Intelligence Paradigms 12 (3-4), 220-238, 2019 | 58 | 2019 |
How can we identify hijacked journals? M Dadkhah, MM Obeidat, MD Jazi, T Sutikno, MA Riyadi Bulletin of Electrical Engineering and Informatics 4 (2), 83-87, 2015 | 54 | 2015 |
Privacy in online social networks M Beye, AJP Jeckmans, Z Erkin, P Hartel, RL Lagendijk, Q Tang Computational social networks: security and privacy, 87-113, 2012 | 52 | 2012 |
Text-independent speaker verification using ant colony optimization-based selected features S Nemati, ME Basiri Expert Systems with Applications 38 (1), 620-630, 2011 | 41 | 2011 |
An introduction to journal phishings and their detection approach M Dadkhah, T Sutikno, MD Jazi, D Stiawan TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (2), 373-380, 2015 | 38 | 2015 |
Deep web content mining S Ajoudanian, MD Jazi International Journal of Computer and Information Engineering 3 (1), 63-67, 2009 | 36 | 2009 |
Fake conferences for earning real money M Dadkhah, MD Jazi, S Pacukaj Mediterranean Journal os Social Sciences 6, 2015 | 33 | 2015 |
Detecting hijacked journals by using classification algorithms M Andoohgin Shahri, MD Jazi, G Borchardt, M Dadkhah Science and engineering ethics 24, 655-668, 2018 | 30 | 2018 |
RETRACTED CHAPTER: A Novel Text-Independent Speaker Verification System Using Ant Colony Optimization Algorithm S Nemati, R Boostani, MD Jazi Image and Signal Processing: 3rd International Conference, ICISP 2008 …, 2008 | 25 | 2008 |
CP2: cryptographic privacy protection framework for online social networks F Raji, A Miri, MD Jazi Computers & Electrical Engineering 39 (7), 2282-2298, 2013 | 21 | 2013 |
Secure payment in E-commerce: Deal with Keyloggers and Phishings M Dadkhah, MD Jazi International Journal of Electronics Communication and Computer Engineering …, 2014 | 20 | 2014 |
An introduction to undetectable keyloggers with experimental testing M Davarpanah Jazi, AM Ciobotaru, E Barati International Journal of Computer Communications and Networks (IJCCN) 4 (3), 1-5, 2014 | 18 | 2014 |
Online social network with flexible and dynamic privacy policies F Raji, A Miri, MD Jazi, B Malek 2011 CSI International Symposium on Computer Science and Software …, 2011 | 18 | 2011 |
Methodology of the Chaos Theory in research of phishing attacks M Dadkhah, V Lyashenko, M Jazi International Journal of Academic Research 7 (1), 169-175, 2015 | 14 | 2015 |
A novel approach to deal with keyloggers M Dadkhah, MD Jazi Oriental Journal of Computer Science & Technology 7 (1), 25-28, 2014 | 13 | 2014 |
PESCA: a peer‐to‐peer social network architecture with privacy‐enabled social communication and data availability F Raji, M Davarpanah Jazi, A Miri IET Information Security 9 (1), 73-80, 2015 | 12 | 2015 |
Prediction of phishing websites using classification algorithms based on weight of web pages characteristics M Dadkhah, M Jazi, V Lyashenko Baku, Azerbaijan, 2014 | 12 | 2014 |
Developing expert system in order to detect the journal phishing attacks M Dadkhah, MD Jazi, MS Mobarakeh, V Lyashenko Journal of Mathematics and Technology 6 (1), 70-73, 2015 | 11 | 2015 |
A new challenge in the academic world: earning real money and eminence by paper publishing M Dadkhah, N Elias, MD Jazi, V Christova-Bagdassarian, KH Abu-Elteen Jordan Journal of Biological Sciences Guest Editorial 8 (2), 2015 | 9 | 2015 |