GRANT(PI & MEMBERS)

9

PUBLICATIONS

75

INDEXED PUBLICATION

34

TOTAL STUDENTS

H-INDEXED (SCOPUS)

CITATIONS (SCOPUS)

Grant (PI)

UNIVERSITY FUND
1
TOTAL

Publications

INDEXED PUBLICATION
34
NON-INDEXED PUBLICATION
24
OTHERS PUBLICATION
17
TOTAL

Supervisions

DEGREE
0
MASTER
6
PHD
14
TOTAL

Legend : SPONSOR TYPE OF GRANT

Grant Name Year
A ROBUST TECHNIQUE AGAINST GEOMETRIC ATTACKS FOR DIGITAL VIDEO WATERMARKING
MINISTRY OF EDUCATION Fundamental Research Grant Scheme
2014
A NOVEL MODEL TO ENHANCE THE CLOUD AUTHENTICATION SECURITY BY USING WATERMARKING METHODS
RUG OF UTM Tier 1
2014
appraising the potential risk of digital heritage disaster management resources
RUG OF UTM Flagship
2013
Analysis and assessment of bluetooth vulnerabilities in high end cars
SHORT TERM RESEARCH GRANT FOR ACADEMIC VISITORS Academic Visitor
2012
AN WATERMARKING TOOL FOR E-PASSPORT PROTECTION
SHORT TERM RESEARCH GRANT FOR ACADEMIC VISITORS Academic Visitor
2012
Efficient Digital Image Authentication and Tamper Localization Technique Using Lsb Watermarking
MINISTRY OF EDUCATION Exploratory Research Grant Scheme
2012

Legend : PUBLICATION CATEGORY TYPE OF AUTHORS

Publication Name Year
A Robust Video Watermarking Technique For The Tamper Detection Of Surveillance Systems
MULTIMEDIA TOOLS AND APPLICATIONS
Publication In Web Of Science CO-AUTHOR
2016
Day Of The Year-Based Prediction Of Horizontal Global Solar Radiation By A Neural Network Auto-Regressive Model
THEORETICAL AND APPLIED CLIMATOLOGY
Publication In Web Of Science CO-AUTHOR
2016
Security Analysis Method Of Recognition-Based Graphical Password
JURNAL TEKNOLOGI
Publication In Scopus UTM FIRST AUTHOR
2015
Genetic Algorithm For Fragile Audio Watermarking
TELECOMMUNICATION SYSTEMS
Publication In Web Of Science CORRESPONDING AUTHOR
2015
Security And Privacy Criteria To Evaluate Authentication Mechanisms In Proxy Mobile Ipv6
JURNAL TEKNOLOGI
Publication In Scopus UTM FIRST AUTHOR
2015
Pattern Recognition Techniques: Studies On Appropriate Classifications
LECTURE NOTES IN ELECTRICAL ENGINEERING
Publication In Scopus CO-AUTHOR
2015
Predicting The Wind Power Density Based Upon Extreme Learning Machine
ENERGY
Publication In Web Of Science UTM FIRST AUTHOR
2015
A Novel Wlan Client Puzzle Against Dos Attack On Pattern Matching
MATHEMATICAL PROBLEMS IN ENGINEERING
Publication In Web Of Science CO-AUTHOR
2015
Efficient Intelligent Energy Routing Protocol In Wireless Sensor Networks
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
Publication In Web Of Science UTM FIRST AUTHOR
2015
Trusted Computing Strengthens Cloud Authentication
SCIENTIFIC WORLD JOURNAL
Publication In Web Of Science UTM FIRST AUTHOR
2014
Sql Injection Vulnerability General Patch Using Header Sanitization
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, AND CONTROL TECHNOLOGY I4CT 2014
Proceedings UTM FIRST AUTHOR
2014
Pattern Recognition Techniques: Studies On Appropriate Classifications
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES
Publication In Scopus CO-AUTHOR
2014
An Access Control Framework In An Ad Hoc Network Infrastructure
LECTURE NOTES IN ELECTRICAL ENGINEERING
Publication In Web Of Science UTM FIRST AUTHOR
2014
Energy Efficient Routing In Wireless Sensor Networks Based On Fuzzy Ant Colony Optimization
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
Publication In Web Of Science UTM FIRST AUTHOR
2014
Sql Injection Vulnerability General Patch Using Header Sanitization
I4CT 2014 - 1ST INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY
Publication In Scopus UTM FIRST AUTHOR
2014
Ultimatch-Nl: A Web Service Matchmaker Based On Multiple Semantic Filters
PLOS ONE
Publication In Web Of Science CO-AUTHOR
2014
Detecting And Preventing Ddos Attacks In Botnets By The Help Of Self Triggered Black Holes
2014 ASIA-PACIFIC CONFERENCE ON COMPUTER AIDED SYSTEM ENGINEERING, APCASE 2014
Publication In Scopus UTM FIRST AUTHOR
2014
Secure Openid Authentication Model By Using Trusted Computing
ABSTRACT AND APPLIED ANALYSIS
Publication In Scopus CORRESPONDING AUTHOR
2014
Voip Architecture And Cost Optimization In Utm
RECENT ADVANCES IN APPLIED COMPUTER SCIENCE AND DIGITAL SERVICES
Proceedings CORRESPONDING AUTHOR
2013
An Overview On Methods To Detect Port Scanning Attacks In Cloud Computing
RECENT ADVANCES IN KNOWLEDGE ENGINEERING AND SYSTEMS SCIENCE
Proceedings CORRESPONDING AUTHOR
2013
A Secure Model For Prevention Of Black Hole Attack In Wireless Mobile Ad Hoc Networks
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE
Proceedings CORRESPONDING AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Cryptographic Techniques
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE
Proceedings CORRESPONDING AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE
Proceedings CORRESPONDING AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Ids Agents
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE
Proceedings CORRESPONDING AUTHOR
2013
Current Issues Of Voip Adoption In Utm
RECENT ADVANCES IN APPLIED COMPUTER SCIENCE AND DIGITAL SERVICES
Proceedings CORRESPONDING AUTHOR
2013
Multimedia Data Hiding Evaluation Metrics
RECENT RESEARCHES IN INFORMATION SCIENCE AND APPLICATIONS
Proceedings UTM FIRST AUTHOR
2013
An Introduction To Watermarking Techniques
RECENT ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING
Proceedings UTM FIRST AUTHOR
2013
A Survey On Methods To Defend Against Ddos Attack In Cloud Computing
RECENT ADVANCES IN KNOWLEDGE ENGINEERING AND SYSTEMS SCIENCE
Proceedings CORRESPONDING AUTHOR
2013
Review Of Digital Watermarking Techniques
1ST TECHNOLOGY, EDUCATION, AND SCIENCE INTERNATIONAL CONFERENCE (TESIC) 2013
Proceedings CO-AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13)
Proceedings UTM FIRST AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13)
Proceedings UTM FIRST AUTHOR
2013
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Ad Hoc Networks Using Ids Agents
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13)
Proceedings CO-AUTHOR
2013
A Secure Model For Prevention Of Black Hole Attack In Wireless Mobile Ad Hoc Networks
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13)
Conference Paper UTM FIRST AUTHOR
2013
Improving The Capacity Of Watermarking Techniques By Using Block Truncation Coding
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS
Journal Article Non Citation-Indexed CO-AUTHOR
2013
A New Method For Audio Steganography Using Message Integrity
JOURNAL OF CONVERGENCE INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed CO-AUTHOR
2013
An Overview Of Holistic Face Recognition
JOURNAL OF RESEARCH COMMUNICATION TECHNOLOGY
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Identity Theft Methods And Fraud Types
INTERNATIONAL JOURNAL OF INFORMATION PROCESSING AND MANAGEMENT
Journal Article Non Citation-Indexed CO-AUTHOR
2013
An Enhanced Rfid Confidentiality Protection Model Based On Trusted Authentication
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2013
A Secure Virtualization Model For Cloud Computing To Defend Against Ddos Attack
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2013
Client To Client Attacks Protection In Cloud Computing By A Secure Virtualization Model
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed UTM FIRST AUTHOR
2013
Determining The Threshold Of Pixel Correlativity Analysis
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2013
A Prospective Study Of Mobile Cloud Computing
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Electronic Voting Systems For European Union Countries
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2013
Using Three Levels Dwt To Increase Robustness Against Geometrical Attacks
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY
Journal Article Non Citation-Indexed CO-AUTHOR
2013
E-Commerce And Identity Theft Issues
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Effective Measures For Evaluation Of Sql Injection Detection And Prevention Tools
JOURNAL OF CONVERGENCE INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Partial Smooth Region Photos Statistical Steganalysis
INTERNATIONAL JOURNAL OF INFORMATION PROCESSING AND MANAGEMENT
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2013
Wide Flat Region Photos Statistical Steganalysis
JOURNAL OF CONVERGENCE INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2013
Edgy Photos Statistical Steganalysis
ADVANCES IN INFORMATION SCIENCES AND SERVICE SCIENCES
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2013
Wide Smooth Region Photos Statistical Steganalysis
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed CORRESPONDING AUTHOR
2013
A Pre-Matching Filter To Improve The Query Response Time Of Semantic Web Service Discovery
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY
Journal Article Non Citation-Indexed CO-AUTHOR
2013
An Overview Of Principal Component Analysis
JOURNAL OF SIGNAL AND INFORMATION PROCESSING
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Using Three Levels Dwt To Increase Robustness Against Geometrical Attacks
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY(IJACT)
Journal Article Non Citation-Indexed CO-AUTHOR
2013
An Overview Of Principal Component Analysis
JOURNAL OF SIGNAL AND INFORMATION PROCESSING
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Improving The Capacity Of Watermarking Techniques By Using Block Truncation Coding
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS(JDCTA)
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Using Three Levels Dwt To Increase Robustness Against Geometrical Attacks
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY(IJACT)
Journal Article Non Citation-Indexed CO-AUTHOR
2013
Pixel Correlation Behavior In Different Themes
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE
Publication In Scopus UTM FIRST AUTHOR
2013
Performance Analysis In Reactive Routing Protocols In Wireless Mobile Ad Hoc Networks Using Dsr, Aodv And Aomdv
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013)
Publication In Scopus CORRESPONDING AUTHOR
2013
Implementation And Evaluation Of Lightweight Encryption Algorithms Suitable For Rfid
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2013
Sql Injection Is Still Alive: A Study On Sql Injection Signature Evasion Techniques
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013)
Publication In Scopus CORRESPONDING AUTHOR
2013
Security Threats In Online Social Networks
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013)
Publication In Scopus CORRESPONDING AUTHOR
2013
A Taxonomy Of Sql Injection Attacks
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013)
Publication In Scopus CORRESPONDING AUTHOR
2013
A Taxonomy Of Sql Injection Detection And Prevention Techniques
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013)
Publication In Scopus CORRESPONDING AUTHOR
2013
Statistical Steganalysis Of Four Photo Themes Before Embedding
PROCEEDINGS - 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES, ACSAT 2013
Publication In Scopus UTM FIRST AUTHOR
2013
Correlation Analysis Of The Four Photo Themes In Five Layers
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE
Publication In Scopus UTM FIRST AUTHOR
2013
A Novel Approach For Rogue Access Point Detection On The Client-Side
PROCEEDINGS - 26TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS, WAINA 2012
Publication In Scopus CO-AUTHOR
2012
An Overview On Audio Steganography Techniques
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS
Publication In Scopus CORRESPONDING AUTHOR
2012
Mazdak Technique For Psnr Estimation In Audio Steganography
APPLIED MECHANICS AND MATERIALS
Publication In Scopus UTM FIRST AUTHOR
2012
Mazdak Technique For Psnr Estimation In Audio Steganography
4TH INTERNATIONAL CONFERENCE ON MECHANICAL AND ELECTRICAL TECHNOLOGY, ICMET 2012
Publication In Scopus CORRESPONDING AUTHOR
2012
A Novel Approach For Rouge Access Point Detection On Client
26TH CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS 2012
Conference Paper CO-AUTHOR
2012
A Robust Watermark Embedding In Smooth Areas
RESEARCH JOURNAL OF INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2011
Botnet Detection Based On Traffic Monitoring
INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY
Publication In Scopus CO-AUTHOR
2011
Integration Of Chaotic Map And Confusion Technique For Color Medical Image Encryption
PROCEEDING - 6TH INTERNATIONAL CONFERENCE ON DIGITAL CONTENT, MULTIMEDIA TECHNOLOGY AND ITS APPLICATIONS, IDC2010
Publication In Scopus CO-AUTHOR
2010
A Proposed Framework For P2p Botnet Detection
IACSIT INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY (IJET)
Journal Article Non Citation-Indexed CO-AUTHOR
2010
Capacity And Quality Improvement In Reversible Image Watermarking Approach
PROCEEDING - 6TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, NCM 2010
Publication In Scopus CO-AUTHOR
2010

Legend : IP CATEGORY IP LEVEL

Intellectual Property Name Grant Register No. IP Level IP Category

Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL

Supervision List
ATEFEH TAJPOUR
A RISK AND PROTECTIVE BEHAVIOR MODEL FOR IDENTITY THEFT PREVENTION IN BUSINESS TO CONSUMER E-COMMERCE USERS
PHD GRADUATED CO-SUPERVISOR 2015
SAMAN SHOJAE CHAEIKAR
PIXEL SIMILARITY WEIGHT FOR STATISTICAL IMAGE STEGANALYSIS
PHD GRADUATED SUPERVISOR 2015
ALI ORDI
DNA-BASED CLIENT PUZZLE FOR WLAN ASSOCIATION PROTOCOL AGAINST CONNECTION REQUEST FLOODING
PHD GRADUATED SUPERVISOR 2016
SASAN KARAMIZADEH
ENHANCED ILLUMINATION SCHEME FOR FACE RECOGNITION
PHD GRADUATED CO-SUPERVISOR 2016
AMIR HESAM YARIBAKHT
ROBUST COLOR IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND CAT FACE TRANSFORM
PHD GRADUATED CO-SUPERVISOR 2020
MARIANA BINTI MD HASHIM

MASTER GRADUATED SUPERVISOR 2014
SEYEDMOHAMMADBAGHER SHAFIEINASAB LANGERO

MASTER GRADUATED SUPERVISOR 2014
FARZAM ABBASAGHABABAZADEH

MASTER GRADUATED SUPERVISOR 2014