BibTeX records: Mazdak Zamani

download as .bib file

@article{DBLP:journals/fi/PilaniaTZM22,
  author       = {Urmila Pilania and
                  Rohit Tanwar and
                  Mazdak Zamani and
                  Azizah Abdul Manaf},
  title        = {Framework for Video Steganography Using Integer Wavelet Transform
                  and {JPEG} Compression},
  journal      = {Future Internet},
  volume       = {14},
  number       = {9},
  pages        = {254},
  year         = {2022},
  url          = {https://doi.org/10.3390/fi14090254},
  doi          = {10.3390/FI14090254},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/PilaniaTZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccoms/ArabZKACK22,
  author       = {Farnaz Arab and
                  Mazdak Zamani and
                  Sasan Karamizadeh and
                  Mojtaba Alizadeh and
                  Saman Shojae Chaeikar and
                  Touraj Khodadadi},
  title        = {Comparison of Data Hiding Techniques for Video Watermarking Applications},
  booktitle    = {7th International Conference on Computer and Communication Systems,
                  {ICCCS} 2022, Wuhan, China, April 22-25, 2022},
  pages        = {168--173},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICCCS55155.2022.9846251},
  doi          = {10.1109/ICCCS55155.2022.9846251},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccoms/ArabZKACK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcnc/TanwarSZVK19,
  author       = {Rohit Tanwar and
                  Kulvinder Singh and
                  Mazdak Zamani and
                  Amit Verma and
                  Prashant Kumar},
  title        = {An Optimized Approach for Secure Data Transmission Using Spread Spectrum
                  Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer},
  journal      = {J. Comput. Networks Commun.},
  volume       = {2019},
  pages        = {5124364:1--5124364:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5124364},
  doi          = {10.1155/2019/5124364},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcnc/TanwarSZVK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcnc/KavianpourSAZSB19,
  author       = {Sanaz Kavianpour and
                  Bharanidharan Shanmugam and
                  Sami Azam and
                  Mazdak Zamani and
                  Ganthan Narayana Samy and
                  Friso De Boer},
  title        = {A Systematic Literature Review of Authentication in Internet of Things
                  for Heterogeneous Devices},
  journal      = {J. Comput. Networks Commun.},
  volume       = {2019},
  pages        = {5747136:1--5747136:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5747136},
  doi          = {10.1155/2019/5747136},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcnc/KavianpourSAZSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChaeikarZMZ18,
  author       = {Saman Shojae Chaeikar and
                  Mazdak Zamani and
                  Azizah Bt Abdul Manaf and
                  Akram M. Zeki},
  title        = {{PSW} statistical {LSB} image steganalysis},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {1},
  pages        = {805--835},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-016-4273-6},
  doi          = {10.1007/S11042-016-4273-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ChaeikarZMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icin/AlizadehTSBAZZC17,
  author       = {Mojtaba Alizadeh and
                  Mohammad Hesam Tadayon and
                  Kouichi Sakurai and
                  Sabariah Baharun and
                  Hiroaki Anada and
                  Mazdak Zamani and
                  Akram M. Zeki and
                  Shehzad Ashraf Chaudhry and
                  Muhammad Khurram Khan},
  editor       = {No{\"{e}}l Crespi and
                  Antonio Manzalini and
                  Stefano Secci},
  title        = {Comments and improvements of "HOTA: Handover optimized ticket-based
                  authentication in network-based mobility management"},
  booktitle    = {20th Conference on Innovations in Clouds, Internet and Networks, {ICIN}
                  2017, Paris, France, March 7-9, 2017},
  pages        = {112--116},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICIN.2017.7899399},
  doi          = {10.1109/ICIN.2017.7899399},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icin/AlizadehTSBAZZC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jece/ZamaniEL16,
  author       = {Mazdak Zamani and
                  Isao Echizen and
                  Arash Habibi Lashkari},
  title        = {Innovations in Communications Security},
  journal      = {J. Electr. Comput. Eng.},
  volume       = {2016},
  pages        = {4743084:1},
  year         = {2016},
  url          = {https://doi.org/10.1155/2016/4743084},
  doi          = {10.1155/2016/4743084},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jece/ZamaniEL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AlizadehAZBS16,
  author       = {Mojtaba Alizadeh and
                  Saeid Abolfazli and
                  Mazdak Zamani and
                  Sabariah Baharun and
                  Kouichi Sakurai},
  title        = {Authentication in mobile cloud computing: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {61},
  pages        = {59--80},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2015.10.005},
  doi          = {10.1016/J.JNCA.2015.10.005},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AlizadehAZBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ArabAHMZ16,
  author       = {Farnaz Arab and
                  Shahidan M. Abdullah and
                  Siti Zaiton Mohd Hashim and
                  Azizah Abdul Manaf and
                  Mazdak Zamani},
  title        = {A robust video watermarking technique for the tamper detection of
                  surveillance systems},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {18},
  pages        = {10855--10885},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2800-5},
  doi          = {10.1007/S11042-015-2800-5},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ArabAHMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/KianiAZKM15,
  author       = {Farzad Kiani and
                  Ehsan Amiri and
                  Mazdak Zamani and
                  Touraj Khodadadi and
                  Azizah Abdul Manaf},
  title        = {Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {618072:1--618072:13},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/618072},
  doi          = {10.1155/2015/618072},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/KianiAZKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/ZamaniM15,
  author       = {Mazdak Zamani and
                  Azizah Bt Abdul Manaf},
  title        = {Genetic algorithm for fragile audio watermarking},
  journal      = {Telecommun. Syst.},
  volume       = {59},
  number       = {3},
  pages        = {291--304},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11235-014-9936-x},
  doi          = {10.1007/S11235-014-9936-X},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/ZamaniM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/AmiriKAZK14,
  author       = {Ehsan Amiri and
                  Hassan Keshavarz and
                  Mojtaba Alizadeh and
                  Mazdak Zamani and
                  Touraj Khodadadi},
  title        = {Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy
                  Ant Colony Optimization},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/768936},
  doi          = {10.1155/2014/768936},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/AmiriKAZK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grmse/JabbarSZ13,
  author       = {Alaa A. Jabbar and
                  Shahrin bin Sahib and
                  Mazdak Zamani},
  editor       = {Fuling Bian and
                  Yichun Xie and
                  Xiaohui Cui and
                  Yixin Zeng},
  title        = {Correlation Analysis of the Four Photo Themes in Five Layers},
  booktitle    = {Geo-Informatics in Resource Management and Sustainable Ecosystem -
                  International Symposium, {GRMSE} 2013, Wuhan, China, November 8-10,
                  2013, Proceedings, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {398},
  pages        = {211--222},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45025-9\_23},
  doi          = {10.1007/978-3-642-45025-9\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/grmse/JabbarSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grmse/JabbarSZ13a,
  author       = {Alaa A. Jabbar and
                  Shahrin bin Sahib and
                  Mazdak Zamani},
  editor       = {Fuling Bian and
                  Yichun Xie and
                  Xiaohui Cui and
                  Yixin Zeng},
  title        = {Pixel Correlation Behavior in Different Themes},
  booktitle    = {Geo-Informatics in Resource Management and Sustainable Ecosystem -
                  International Symposium, {GRMSE} 2013, Wuhan, China, November 8-10,
                  2013, Proceedings, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {398},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45025-9\_24},
  doi          = {10.1007/978-3-642-45025-9\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/grmse/JabbarSZ13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/NikbakhshMZJ12,
  author       = {Somayeh Nikbakhsh and
                  Azizah Bt Abdul Manaf and
                  Mazdak Zamani and
                  Maziar Janbeglou},
  editor       = {Leonard Barolli and
                  Tomoya Enokido and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {A Novel Approach for Rogue Access Point Detection on the Client-Side},
  booktitle    = {26th International Conference on Advanced Information Networking and
                  Applications Workshops, {WAINA} 2012, Fukuoka, Japan, March 26-29,
                  2012},
  pages        = {684--687},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/WAINA.2012.108},
  doi          = {10.1109/WAINA.2012.108},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/NikbakhshMZJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/GhazizadehZMP12,
  author       = {Eghbal Ghazizadeh and
                  Mazdak Zamani and
                  Jamalul{-}lail Ab Manan and
                  Abolghasem Pashang},
  title        = {A survey on security issues of federated identity in the cloud computing},
  booktitle    = {4th {IEEE} International Conference on Cloud Computing Technology
                  and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6,
                  2012},
  pages        = {532--565},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CloudCom.2012.6427513},
  doi          = {10.1109/CLOUDCOM.2012.6427513},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/GhazizadehZMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GhazizadehZMKT12,
  author       = {Eghbal Ghazizadeh and
                  Mazdak Zamani and
                  Jamalul{-}lail Ab Manan and
                  Reza Khaleghparast and
                  Ali Taherian},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A trust based model for federated identity architecture to mitigate
                  identity theft},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {376--381},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470834/},
  timestamp    = {Thu, 10 Mar 2022 09:31:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/GhazizadehZMKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/baip/ZamaniMAJCZ10,
  author       = {Mazdak Zamani and
                  Azizah Bt Abdul Manaf and
                  Rabiah Bt Ahmad and
                  Farhang Jaryani and
                  Saman Shojae Chaeikar and
                  Hossein Rouhani Zeidanloo},
  editor       = {Vinu V. Das and
                  R. Vijayakumar and
                  Narayan C. Debnath and
                  Janahanlal Stephen and
                  Natarajan Meghanathan and
                  Suresh Sankaranarayanan and
                  P. M. Thankachan and
                  Ford Lumban Gaol and
                  Nessy Thankachan},
  title        = {Genetic Audio Watermarking},
  booktitle    = {Information Processing and Management - International Conference on
                  Recent Trends in Business Administration and Information Processing,
                  {BAIP} 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {70},
  pages        = {514--517},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12214-9\_90},
  doi          = {10.1007/978-3-642-12214-9\_90},
  timestamp    = {Thu, 01 Jun 2017 18:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/baip/ZamaniMAJCZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncm/AbdullahMZ10,
  author       = {Shahidan M. Abdullah and
                  Azizah A. Manaf and
                  Mazdak Zamani},
  title        = {Capacity and quality improvement in reversible image watermarking
                  approach},
  booktitle    = {International Conference on Networked Computing and Advanced Information
                  Management, {NCM} 2010, Sixth International Joint Conference on INC,
                  {IMS} and {IDC:} {INC} 2010: International Conference on Networked
                  Computing, {IMS} 2010: International Conference on Advanced Information
                  Management and Service, {IDC} 2010: International Conference on Digital
                  Content, Multimedia Technology and its Applications, Seoul, Korea,
                  August 16-18, 2010},
  pages        = {81--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5572351/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ncm/AbdullahMZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZamaniMAZM09,
  author       = {Mazdak Zamani and
                  Azizah Bt Abdul Manaf and
                  Rabiah Bt Ahmad and
                  Akram M. Zeki and
                  Pritheega Magalingam},
  title        = {A Novel Approach for Audio Watermarking},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {83--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.22},
  doi          = {10.1109/IAS.2009.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZamaniMAZM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gem/ZamaniMAZA09,
  author       = {Mazdak Zamani and
                  Azizah Bt Abdul Manaf and
                  Rabiah Bt Ahmad and
                  Akram M. Zeki and
                  Shahidan M. Abdullah},
  editor       = {Hamid R. Arabnia and
                  Ashu M. G. Solo},
  title        = {Genetic Algorithm as an Approach to Resolve the Problems of Substitution
                  Techniques of Audio Steganography},
  booktitle    = {Proceedings of the 2009 International Conference on Genetic and Evolutionary
                  Methods, {GEM} 2009, July 13-16, 2009, Las Vegas Nevada, {USA}},
  pages        = {170--175},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Mon, 20 Sep 2010 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gem/ZamaniMAZA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZamaniMAJTZ09,
  author       = {Mazdak Zamani and
                  Azizah Bt Abdul Manaf and
                  Rabiah Bt Ahmad and
                  Farhang Jaryani and
                  Hamed Taherdoost and
                  Akram M. Zeki},
  title        = {A secure audio steganography approach},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402644},
  doi          = {10.1109/ICITST.2009.5402644},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZamaniMAJTZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics