Word of Mouth impact on the adoption of mobile banking in Iran D Mehrad, S Mohammadi Telematics and Informatics 34 (7), 1351-1363, 2017 | 266 | 2017 |
Challenges of higher education related to e-learning in developing countries during COVID-19 spread: a review of the perspectives of students, instructors, policymakers, and … S Zarei, S Mohammadi Environmental science and pollution research 29 (57), 85562-85568, 2022 | 136 | 2022 |
A comparison of link layer attacks on wireless sensor networks S Mohammadi, H Jadidoleslamy arXiv preprint arXiv:1103.5589, 2011 | 115 | 2011 |
An efficient model to improve customer acceptance of mobile banking S Barati, S Mohammadi World Congress on Engineering and Computer Science 2, 20-22, 2009 | 103 | 2009 |
Cloud ERP: Implementation of enterprise resource planning using cloud computing technology EF Kiadehi, S Mohammadi Journal of Basic and Applied Scientific Research 2 (11), 11422-11427, 2012 | 64 | 2012 |
Mining the banking customer behavior using clustering and association rules methods MA Farajian, S Mohammadi International Journal of Industrial Engineering & Production Research 21 (4 …, 2010 | 60 | 2010 |
Review banking on biometric in the world’s banks and introducing a biometric model for Iran’s banking system SS Hosseini, S Mohammadi Journal of Basic and Applied Scientific Research 2 (9), 9152-9160, 2012 | 49 | 2012 |
A comparison of physical attacks on wireless sensor networks S Mohammadi, H Jadidoleslamy International Journal of Peer to Peer Networks 2 (2), 24-42, 2011 | 47 | 2011 |
A new deep learning approach for anomaly base IDS using memetic classifier S Mohammadi, A Namadchian International Journal of Computers Communications & Control 12 (5), 677-688, 2017 | 42 | 2017 |
Privacy preserving big data mining: association rule hiding using fuzzy logic approach GA Afzali, S Mohammadi IET Information Security 12 (1), 15-24, 2018 | 36 | 2018 |
Challenges of user Involvement in Extreme Programming projects S Mohammadi, B Nikkhahan, S Sohrabi International Journal of Software Engineering and Its Applications 3 (1), 19-32, 2009 | 33 | 2009 |
ECC-based biometric signature: A new approach in electronic banking security S Mohammadi, S Abedi 2008 International Symposium on Electronic Commerce and Security, 763-766, 2008 | 33 | 2008 |
Toward an integrated modeling approach for production and delivery operations in flow shop system: trade-off between direct and routing delivery methods R Ramezanian, S Mohammadi, A Cheraghalikhani Journal of Manufacturing Systems 44, 79-92, 2017 | 30 | 2017 |
A comparison of routing attacks on wireless sensor networks S Mohammadi, RE Atani, H Jadidoleslamy organization 4, 21, 2011 | 30 | 2011 |
Enhancing risk management with an efficient risk identification approach S Barati, S Mohammadi 2008 4th IEEE International Conference on Management of Innovation and …, 2008 | 27 | 2008 |
Understanding the relationship strengths in users' activities, review helpfulness and influence RP Mohammadiani, S Mohammadi, Z Malik Computers in Human Behavior 75, 117-129, 2017 | 25 | 2017 |
Compare failure prediction models based on feature selection technique: empirical case from Iran S Ashoori, S Mohammadi Procedia Computer Science 3, 568-573, 2011 | 21 | 2011 |
Honeypots: intrusion deception A Barfar, S Mohammadi ISSA Journal, 28-31, 2007 | 20 | 2007 |
A secure E-tendering system S Mohammadi, H Jahanshahi 2009 IEEE International Conference on Electro/Information Technology, 62-67, 2009 | 19 | 2009 |
A study of major Mobile payment systems' functionality In Europe S Mohammadi, H Jahanshahi 2008 11th International Conference on Computer and Information Technology …, 2008 | 18 | 2008 |