default search action
Shahriar Mohammadi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j15]Sogand Dehghan, Rojiar Pir Mohammadiani, Shahriar Mohammadi:
The credibility assessment of Twitter/X users based organization objectives by heterogeneous resources in big data life cycle. Comput. Hum. Behav. 162: 108428 (2025) - 2024
- [j14]Mahdi Yadegari, Shahriar Mohammadi, Amir H. Masoumi:
Technology adoption: an analysis of the major models and theories. Technol. Anal. Strateg. Manag. 36(6): 1096-1110 (2024) - 2023
- [j13]Shahriar Mohammadi, Mehdi Babagoli:
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling. Int. J. Inf. Sec. 22(5): 1177-1195 (2023) - 2021
- [j12]Forough Sadat Mirkarimzade Tafti, Shahriar Mohammadi, Mehdi Babagoli:
A new NFC mobile payment protocol using improved GSM based authentication. J. Inf. Secur. Appl. 62: 102997 (2021) - 2020
- [j11]Shahriar Mohammadi, Amin Namadchian:
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism. ISC Int. J. Inf. Secur. 12(1): 44-54 (2020)
2010 – 2019
- 2019
- [j10]Shahriar Mohammadi, Fatemeh Amiri:
An Efficient Hybrid Self-Learning Intrusion Detection System Based on Neural Networks. Int. J. Comput. Intell. Appl. 18(1): 1950001:1-1950001:19 (2019) - 2018
- [j9]Golnar Assadat Afzali, Shahriar Mohammadi:
Privacy preserving big data mining: association rule hiding using fuzzy logic approach. IET Inf. Secur. 12(1): 15-24 (2018) - 2017
- [j8]Rojiar Pir Mohammadiani, Shahriar Mohammadi, Zaki Malik:
Understanding the relationship strengths in users' activities, review helpfulness and influence. Comput. Hum. Behav. 75: 117-129 (2017) - [j7]Shahriar Mohammadi, Amin Namadchian:
A New Deep Learning Approach for Anomaly Base IDS using Memetic Classifier. Int. J. Comput. Commun. Control 12(5): 677-688 (2017) - [j6]Daniel Mehrad, Shahriar Mohammadi:
Word of Mouth impact on the adoption of mobile banking in Iran. Telematics Informatics 34(7): 1351-1363 (2017) - 2012
- [j5]Shahriar Mohammadi, Sina Golara, Nasim Mousavi:
Selecting Adequate Security Mechanisms in E-Business Processes Using Fuzzy TOPSIS. Int. J. Fuzzy Syst. Appl. 2(1): 35-53 (2012) - [j4]Shahriar Mohammadi, Vahid Allahvakil, Mojtaba Khaghani:
Effect of Network Traffic on IPS Performance. J. Information Security 3(2): 162-168 (2012) - [i3]Ehsan Saboori, Shahriar Mohammadi:
Anonymous Communication in Peer-to-Peer Networks for providing more Privacy and Security. CoRR abs/1208.3192 (2012) - [i2]Ehsan Saboori, Shahriar Mohammadi, Shafigh Parsazad:
A new scheduling algorithm for server farms load balancing. CoRR abs/1209.0851 (2012) - 2011
- [j3]Mandana Farzaneh, Shahriar Mohammadi:
Role of common website features on providing a secure news website: an empirical approach. Int. J. Multim. Intell. Secur. 2(3/4): 320-338 (2011) - [j2]Ali Habibi Badrabadi, Mohammad Jafar Tarokh, Shahriar Mohammadi:
Service Oriented Enterprise and Contracted Profit Sharing. Int. J. Syst. Serv. Oriented Eng. 2(2): 77-95 (2011) - [j1]Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy:
A Comparison of Link Layer Attacks on Wireless Sensor Networks. J. Information Security 2(2): 69-84 (2011) - [c8]Sarah Ashoori, Shahriar Mohammadi:
Compare failure prediction models based on feature selection technique: empirical case from Iran. WCIT 2011: 568-573 - [i1]Shahriar Mohammadi, Hossein Jadidoleslamy:
A Comparison of Link Layer Attacks on Wireless Sensor Networks. CoRR abs/1103.5589 (2011) - 2010
- [c7]Shahriar Mohammadi, Soulmaz Pourdavar:
Penetration test: A case study on remote command execution security hole. ICDIM 2010: 412-416
2000 – 2009
- 2009
- [c6]Shahriar Mohammadi, Ali Khalili, Sarah Ashoori:
Using an Enterprise Mashup Infrastructure for Just-in-Time Management of Situational Projects. ICEBE 2009: 3-10 - [c5]Kiyana Zolfaghar, Arash Barfar, Shahriar Mohammadi:
A framework for online counter terrorism. ICITST 2009: 1-5 - 2008
- [c4]Hamidreza Amouzegar, Shahriar Mohammadi, Mohammad Jafar Tarokh, Anahita Naghilouye Hidaji:
A New Approach on Interactive SOA Security Model Based on Automata. ACIS-ICIS 2008: 667-671 - [c3]Ali Khalili, Shahriar Mohammadi:
Using Logically Hierarchical Meta Web Services to Support Accountability in Mashup Services. APSCC 2008: 410-415 - [c2]Shahriar Mohammadi, Sanaz Abedi:
ECC-Based Biometric Signature: A New Approach in Electronic Banking Security. ISECS 2008: 763-766 - [c1]Shahriar Mohammadi, Parisa Yaghoubi:
Analysis of Revealed Comparative Advantage in the E-service market. SoSE 2008: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint