An analysis of patterns of debugging among novice computer science students M Ahmadzadeh, D Elliman, C Higgins Proceedings of the 10th annual SIGCSE conference on Innovation and …, 2005 | 294 | 2005 |
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami IEEE transactions on emerging topics in computing 8 (2), 341-351, 2017 | 213 | 2017 |
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ... Future Generation Computer Systems 90, 94-104, 2019 | 157 | 2019 |
BoTShark: A deep learning approach for botnet traffic detection S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami Cyber Threat Intelligence, 137-153, 2018 | 98 | 2018 |
The Canterbury QuestionBank: Building a repository of multiple-choice CS1 and CS2 questions K Sanders, M Ahmadzadeh, T Clear, SH Edwards, M Goldweber, ... Proceedings of the ITiCSE working group reports conference on Innovation and …, 2013 | 50 | 2013 |
Extracting predictor variables to construct breast cancer survivability model with class imbalance problem S Miri Rostami, M Ahmadzadeh Journal of AI and Data Mining 6 (2), 263-276, 2018 | 25 | 2018 |
Finding gender preferences in e-commerce website design by an experimental approach A Mahzari, M Ahmadzadeh International Journal of Applied Information Systems 5 (2), 2013 | 24 | 2013 |
Analysis of factors that affect the students academic performance-Data Mining Approach N Hajizadeh, M Ahmadzadeh arXiv preprint arXiv:1409.2222, 2014 | 23 | 2014 |
The impact of improving debugging skill on programming ability M Ahmadzadeh, D Elliman, C Higgins Innovation in Teaching and Learning in Information and Computer Sciences 6 …, 2007 | 21 | 2007 |
A dynamic flooding attack detection system based on different classification techniques and using SNMP MIB data S Namvarasl, M Ahmadzadeh International Journal of Computer Networks and Communications Security 2 (9 …, 2014 | 18 | 2014 |
KCMC: A hybrid learning approach for network intrusion detection using K-means clustering and multiple classifiers SV Farrahi, M Ahmadzadeh International Journal of Computer Applications 124 (9), 2015 | 16 | 2015 |
A hybrid data mining model to improve customer response modeling in direct marketing M Daneshmandi, M Ahmadzadeh Indian Journal of Computer Science and Engineering 3 (6), 844-855, 2013 | 15 | 2013 |
Retracted on September 22, 2021 TA Marking Parties: Worth the Price of Pizza? B Harrington, M Ahmadzadeh, N Cheng, EH Wang, V Efimov Proceedings of the 2018 ACM Conference on International Computing Education …, 2018 | 14 | 2018 |
A review on data stream classification approaches S Homayoun, M Ahmadzadeh Journal of Advanced Computer Science & Technology 5 (1), 8-13, 2016 | 14 | 2016 |
Mapping the landscape of peer review in computing education research M Petre, K Sanders, R McCartney, M Ahmadzadeh, C Connolly, ... Proceedings of the working group reports on innovation and technology in …, 2020 | 11 | 2020 |
A hybrid method based on neural networks and a meta-heuristic bat algorithm for stock price prediction M Golmaryami, M Behzadi, M Ahmadzadeh 2015 2nd International Conference on Knowledge-Based Engineering and …, 2015 | 11 | 2015 |
Personalized ATMs: improve ATMs usability A Kamfiroozie, M Ahmadzadeh HCI International 2011–Posters’ Extended Abstracts: International Conference …, 2011 | 10 | 2011 |
Mining robocup log files to predict own and opponent action M Karimi, M Ahmazadeh International Journal of Advanced Research in Computer Science 5 (6), 1-6, 2014 | 9 | 2014 |
JavaMarker: A marking system for Java programs M Ahmadzadeh, S Namvar, M Soltani International Journal of Computer Applications 20 (2), 15-20, 2011 | 9 | 2011 |
A mixed-methods study of novice programmer interaction with python error messages R D'souza, M Bhayana, M Ahmadzadeh, B Harrington Proceedings of the Western Canadian Conference on Computing Education, 1-2, 2019 | 8 | 2019 |