GRANT(PI & MEMBERS)
9
PUBLICATIONS
75
INDEXED PUBLICATION
34
TOTAL STUDENTS
H-INDEXED (SCOPUS)
CITATIONS (SCOPUS)
Grant (PI)
UNIVERSITY FUND
1
TOTAL
Publications
INDEXED PUBLICATION
34
NON-INDEXED PUBLICATION
24
OTHERS PUBLICATION
17
TOTAL
Supervisions
MASTER
6
PHD
14
TOTAL
Legend : SPONSOR TYPE OF GRANT
Grant Name | Year |
---|---|
A ROBUST TECHNIQUE AGAINST GEOMETRIC ATTACKS FOR DIGITAL VIDEO WATERMARKING Fundamental Research Grant Scheme |
2014 |
A NOVEL MODEL TO ENHANCE THE CLOUD AUTHENTICATION SECURITY BY USING WATERMARKING METHODS RUG OF UTM Tier 1 |
2014 |
appraising the potential risk of digital heritage disaster management resources RUG OF UTM Flagship |
2013 |
Analysis and assessment of bluetooth vulnerabilities in high end cars SHORT TERM RESEARCH GRANT FOR ACADEMIC VISITORS Academic Visitor |
2012 |
AN WATERMARKING TOOL FOR E-PASSPORT PROTECTION SHORT TERM RESEARCH GRANT FOR ACADEMIC VISITORS Academic Visitor |
2012 |
Efficient Digital Image Authentication and Tamper Localization Technique Using Lsb Watermarking Exploratory Research Grant Scheme |
2012 |
Legend : PUBLICATION CATEGORY TYPE OF AUTHORS
Publication Name | Year |
---|---|
A Robust Video Watermarking Technique For The Tamper Detection Of Surveillance Systems
MULTIMEDIA TOOLS AND APPLICATIONS Publication In Web Of Science CO-AUTHOR |
2016 |
Day Of The Year-Based Prediction Of Horizontal Global Solar Radiation By A Neural Network Auto-Regressive Model
THEORETICAL AND APPLIED CLIMATOLOGY Publication In Web Of Science CO-AUTHOR |
2016 |
Security Analysis Method Of Recognition-Based Graphical Password
JURNAL TEKNOLOGI Publication In Scopus UTM FIRST AUTHOR |
2015 |
Genetic Algorithm For Fragile Audio Watermarking
TELECOMMUNICATION SYSTEMS Publication In Web Of Science CORRESPONDING AUTHOR |
2015 |
Security And Privacy Criteria To Evaluate Authentication Mechanisms In Proxy Mobile Ipv6
JURNAL TEKNOLOGI Publication In Scopus UTM FIRST AUTHOR |
2015 |
Pattern Recognition Techniques: Studies On Appropriate Classifications
LECTURE NOTES IN ELECTRICAL ENGINEERING Publication In Scopus CO-AUTHOR |
2015 |
Predicting The Wind Power Density Based Upon Extreme Learning Machine
ENERGY Publication In Web Of Science UTM FIRST AUTHOR |
2015 |
A Novel Wlan Client Puzzle Against Dos Attack On Pattern Matching
MATHEMATICAL PROBLEMS IN ENGINEERING Publication In Web Of Science CO-AUTHOR |
2015 |
Efficient Intelligent Energy Routing Protocol In Wireless Sensor Networks
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS Publication In Web Of Science UTM FIRST AUTHOR |
2015 |
Trusted Computing Strengthens Cloud Authentication
SCIENTIFIC WORLD JOURNAL Publication In Web Of Science UTM FIRST AUTHOR |
2014 |
Sql Injection Vulnerability General Patch Using Header Sanitization
INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, AND CONTROL TECHNOLOGY I4CT 2014 Proceedings UTM FIRST AUTHOR |
2014 |
Pattern Recognition Techniques: Studies On Appropriate Classifications
ARPN JOURNAL OF ENGINEERING AND APPLIED SCIENCES Publication In Scopus CO-AUTHOR |
2014 |
An Access Control Framework In An Ad Hoc Network Infrastructure
LECTURE NOTES IN ELECTRICAL ENGINEERING Publication In Web Of Science UTM FIRST AUTHOR |
2014 |
Energy Efficient Routing In Wireless Sensor Networks Based On Fuzzy Ant Colony Optimization
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS Publication In Web Of Science UTM FIRST AUTHOR |
2014 |
Sql Injection Vulnerability General Patch Using Header Sanitization
I4CT 2014 - 1ST INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY Publication In Scopus UTM FIRST AUTHOR |
2014 |
Ultimatch-Nl: A Web Service Matchmaker Based On Multiple Semantic Filters
PLOS ONE Publication In Web Of Science CO-AUTHOR |
2014 |
Detecting And Preventing Ddos Attacks In Botnets By The Help Of Self Triggered Black Holes
2014 ASIA-PACIFIC CONFERENCE ON COMPUTER AIDED SYSTEM ENGINEERING, APCASE 2014 Publication In Scopus UTM FIRST AUTHOR |
2014 |
Secure Openid Authentication Model By Using Trusted Computing
ABSTRACT AND APPLIED ANALYSIS Publication In Scopus CORRESPONDING AUTHOR |
2014 |
Voip Architecture And Cost Optimization In Utm
RECENT ADVANCES IN APPLIED COMPUTER SCIENCE AND DIGITAL SERVICES Proceedings CORRESPONDING AUTHOR |
2013 |
An Overview On Methods To Detect Port Scanning Attacks In Cloud Computing
RECENT ADVANCES IN KNOWLEDGE ENGINEERING AND SYSTEMS SCIENCE Proceedings CORRESPONDING AUTHOR |
2013 |
A Secure Model For Prevention Of Black Hole Attack In Wireless Mobile Ad Hoc Networks
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE Proceedings CORRESPONDING AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Cryptographic Techniques
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE Proceedings CORRESPONDING AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE Proceedings CORRESPONDING AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Ids Agents
LATEST TRENDS IN APPLIED COMPUTATIONAL SCIENCE Proceedings CORRESPONDING AUTHOR |
2013 |
Current Issues Of Voip Adoption In Utm
RECENT ADVANCES IN APPLIED COMPUTER SCIENCE AND DIGITAL SERVICES Proceedings CORRESPONDING AUTHOR |
2013 |
Multimedia Data Hiding Evaluation Metrics
RECENT RESEARCHES IN INFORMATION SCIENCE AND APPLICATIONS Proceedings UTM FIRST AUTHOR |
2013 |
An Introduction To Watermarking Techniques
RECENT ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING Proceedings UTM FIRST AUTHOR |
2013 |
A Survey On Methods To Defend Against Ddos Attack In Cloud Computing
RECENT ADVANCES IN KNOWLEDGE ENGINEERING AND SYSTEMS SCIENCE Proceedings CORRESPONDING AUTHOR |
2013 |
Review Of Digital Watermarking Techniques
1ST TECHNOLOGY, EDUCATION, AND SCIENCE INTERNATIONAL CONFERENCE (TESIC) 2013 Proceedings CO-AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13) Proceedings UTM FIRST AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Adhoc Networks Using Trusted Neighbor Nodes
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13) Proceedings UTM FIRST AUTHOR |
2013 |
A Survey For Prevention Of Black Hole Attacks In Wireless Mobile Ad Hoc Networks Using Ids Agents
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13) Proceedings CO-AUTHOR |
2013 |
A Secure Model For Prevention Of Black Hole Attack In Wireless Mobile Ad Hoc Networks
12TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE (ACACOS '13) Conference Paper UTM FIRST AUTHOR |
2013 |
Improving The Capacity Of Watermarking Techniques By Using Block Truncation Coding
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
A New Method For Audio Steganography Using Message Integrity
JOURNAL OF CONVERGENCE INFORMATION TECHNOLOGY Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
An Overview Of Holistic Face Recognition
JOURNAL OF RESEARCH COMMUNICATION TECHNOLOGY Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Identity Theft Methods And Fraud Types
INTERNATIONAL JOURNAL OF INFORMATION PROCESSING AND MANAGEMENT Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
An Enhanced Rfid Confidentiality Protection Model Based On Trusted Authentication
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2013 |
A Secure Virtualization Model For Cloud Computing To Defend Against Ddos Attack
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2013 |
Client To Client Attacks Protection In Cloud Computing By A Secure Virtualization Model
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY Journal Article Non Citation-Indexed UTM FIRST AUTHOR |
2013 |
Determining The Threshold Of Pixel Correlativity Analysis
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2013 |
A Prospective Study Of Mobile Cloud Computing
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Electronic Voting Systems For European Union Countries
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2013 |
Using Three Levels Dwt To Increase Robustness Against Geometrical Attacks
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
E-Commerce And Identity Theft Issues
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Effective Measures For Evaluation Of Sql Injection Detection And Prevention Tools
JOURNAL OF CONVERGENCE INFORMATION TECHNOLOGY Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Partial Smooth Region Photos Statistical Steganalysis
INTERNATIONAL JOURNAL OF INFORMATION PROCESSING AND MANAGEMENT Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2013 |
Wide Flat Region Photos Statistical Steganalysis
JOURNAL OF CONVERGENCE INFORMATION TECHNOLOGY Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2013 |
Edgy Photos Statistical Steganalysis
ADVANCES IN INFORMATION SCIENCES AND SERVICE SCIENCES Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2013 |
Wide Smooth Region Photos Statistical Steganalysis
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY Journal Article Non Citation-Indexed CORRESPONDING AUTHOR |
2013 |
A Pre-Matching Filter To Improve The Query Response Time Of Semantic Web Service Discovery
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
An Overview Of Principal Component Analysis
JOURNAL OF SIGNAL AND INFORMATION PROCESSING Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Using Three Levels Dwt To Increase Robustness Against Geometrical
Attacks
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY(IJACT) Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
An Overview Of Principal Component Analysis
JOURNAL OF SIGNAL AND INFORMATION PROCESSING Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Improving The Capacity Of Watermarking Techniques By Using Block
Truncation Coding
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS(JDCTA) Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Using Three Levels Dwt To Increase Robustness Against Geometrical
Attacks
INTERNATIONAL JOURNAL OF ADVANCEMENTS IN COMPUTING TECHNOLOGY(IJACT) Journal Article Non Citation-Indexed CO-AUTHOR |
2013 |
Pixel Correlation Behavior In Different Themes
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE Publication In Scopus UTM FIRST AUTHOR |
2013 |
Correlation Analysis Of The Four Photo Themes In Five Layers
COMMUNICATIONS IN COMPUTER AND INFORMATION SCIENCE Publication In Scopus UTM FIRST AUTHOR |
2013 |
Performance Analysis In Reactive Routing Protocols In Wireless Mobile Ad Hoc Networks Using Dsr, Aodv And Aomdv
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013) Publication In Scopus CORRESPONDING AUTHOR |
2013 |
Implementation And Evaluation Of Lightweight Encryption Algorithms Suitable For Rfid
JOURNAL OF NEXT GENERATION INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2013 |
Sql Injection Is Still Alive: A Study On Sql Injection Signature Evasion Techniques
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013) Publication In Scopus CORRESPONDING AUTHOR |
2013 |
Security Threats In Online Social Networks
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013) Publication In Scopus CORRESPONDING AUTHOR |
2013 |
A Taxonomy Of Sql Injection Attacks
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013) Publication In Scopus CORRESPONDING AUTHOR |
2013 |
A Taxonomy Of Sql Injection Detection And Prevention Techniques
INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA 2013 (ICICM2013) Publication In Scopus CORRESPONDING AUTHOR |
2013 |
Statistical Steganalysis Of Four Photo Themes Before Embedding
PROCEEDINGS - 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES, ACSAT 2013 Publication In Scopus UTM FIRST AUTHOR |
2013 |
A Novel Approach For Rogue Access Point Detection On The Client-Side
PROCEEDINGS - 26TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS, WAINA 2012 Publication In Scopus CO-AUTHOR |
2012 |
An Overview On Audio Steganography Techniques
INTERNATIONAL JOURNAL OF DIGITAL CONTENT TECHNOLOGY AND ITS APPLICATIONS Publication In Scopus CORRESPONDING AUTHOR |
2012 |
Mazdak Technique For Psnr Estimation In Audio Steganography
APPLIED MECHANICS AND MATERIALS Publication In Scopus UTM FIRST AUTHOR |
2012 |
Mazdak Technique For Psnr Estimation In Audio Steganography
4TH INTERNATIONAL CONFERENCE ON MECHANICAL AND ELECTRICAL TECHNOLOGY, ICMET 2012 Publication In Scopus CORRESPONDING AUTHOR |
2012 |
A Novel Approach For Rouge Access Point Detection On Client
26TH CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS 2012 Conference Paper CO-AUTHOR |
2012 |
A Robust Watermark Embedding In Smooth Areas
RESEARCH JOURNAL OF INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2011 |
Botnet Detection Based On Traffic Monitoring
INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY Publication In Scopus CO-AUTHOR |
2011 |
Integration Of Chaotic Map And Confusion Technique For Color Medical Image Encryption
PROCEEDING - 6TH INTERNATIONAL CONFERENCE ON DIGITAL CONTENT, MULTIMEDIA TECHNOLOGY AND ITS APPLICATIONS, IDC2010 Publication In Scopus CO-AUTHOR |
2010 |
A Proposed Framework For P2p Botnet Detection
IACSIT INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY (IJET) Journal Article Non Citation-Indexed CO-AUTHOR |
2010 |
Capacity And Quality Improvement In Reversible Image Watermarking Approach
PROCEEDING - 6TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, NCM 2010 Publication In Scopus CO-AUTHOR |
2010 |
Legend : IP CATEGORY IP LEVEL
Intellectual Property Name | Grant Register No. | IP Level | IP Category |
---|
Legend : SESSION LEVEL OF STUDY STATUS SUPERVISION LEVEL
Supervision List |
---|
ATEFEH TAJPOUR A RISK AND PROTECTIVE BEHAVIOR MODEL FOR IDENTITY THEFT PREVENTION IN BUSINESS TO CONSUMER E-COMMERCE USERS PHD GRADUATED CO-SUPERVISOR 2015 |
SAMAN SHOJAE CHAEIKAR PIXEL SIMILARITY WEIGHT FOR STATISTICAL IMAGE STEGANALYSIS PHD GRADUATED SUPERVISOR 2015 |
ALI ORDI DNA-BASED CLIENT PUZZLE FOR WLAN ASSOCIATION PROTOCOL AGAINST CONNECTION REQUEST FLOODING PHD GRADUATED SUPERVISOR 2016 |
SASAN KARAMIZADEH ENHANCED ILLUMINATION SCHEME FOR FACE RECOGNITION PHD GRADUATED CO-SUPERVISOR 2016 |
AMIR HESAM YARIBAKHT ROBUST COLOR IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND CAT FACE TRANSFORM PHD GRADUATED CO-SUPERVISOR 2020 |
SEYEDMOHAMMADBAGHER SHAFIEINASAB LANGERO MASTER GRADUATED SUPERVISOR 2014 |
FARZAM ABBASAGHABABAZADEH MASTER GRADUATED SUPERVISOR 2014 |
MARIANA BINTI MD HASHIM MASTER GRADUATED SUPERVISOR 2014 |